{"id":89023,"date":"2019-03-04T09:00:45","date_gmt":"2019-03-04T09:00:45","guid":{"rendered":""},"modified":"2025-06-30T07:03:21","modified_gmt":"2025-06-30T14:03:21","slug":"helping-security-professionals-do-more-better","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/","title":{"rendered":"Helping security professionals do more, better"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">I\u2019m on my way to the RSA Conference in San Francisco, California, and am looking forward to connecting with our customers and partners there. We have a lot to talk about. Last week, Ann Johnson <a href=\"https:\/\/blogs.microsoft.com\/?p=52558214\" target=\"_blank\" rel=\"noopener noreferrer\">announced<\/a> two new services that we now offer to help empower our customers as they deal with the industry-wide cybersecurity talent crunch: <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Azure Sentinel<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Threat Experts<\/a>. Today, I\u2019m excited to share more news about our work in security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"leading-integration-across-the-industry\">Leading integration across the industry<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In the face of the cybersecurity talent shortage, our customers are increasingly reliant on their tools working together. We are part of a broad, heterogeneous ecosystem of technology providers, and we take seriously our responsibility to lead integration across them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019ve made progress to report on three fronts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">There are now 50 partners participating in the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/partnerships\/intelligent-security-association\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Intelligent Security Association<\/a>, a group of technology providers who have integrated their solutions with Microsoft products to provide customers better protection, detection, and response. New members include: Sophos, Citrix, Adobe, and Symantec.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The <a href=\"https:\/\/aka.ms\/graphsecurityrsa2019\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Graph Security API<\/a> now has new capabilities that allow you to share threat indicators to extend detection, easily invoke powerful investigation and remediation activities, and build better connected security apps and workflows without the need to code.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Active Directory (Azure AD)<\/a>, which already provides authentication for more than 810,000 applications for our enterprise customers, now integrates with several Zscaler applications. With both Azure AD and Zscaler supporting the SCIM 2.0 standard, our joint customers can now use the Azure AD provisioning service to automate the lifecycle of user and group accounts, giving you a more secure and scalable way to allow user access to Zscaler applications.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"added-security-controls-for-azure-and-microsoft-365\">Added security controls for Azure and Microsoft 365<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In our own security products, we continue to invest heavily in capabilities that take advantage of the cloud and artificial intelligence (AI) to empower your team and let them focus on the most important tasks to protect against threats and keep information secure. We made several key strides in security to strengthen protection for our customers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Threat intelligence-based filtering is now available for <a href=\"https:\/\/aka.ms\/threatintel-fw\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Firewall<\/a>. This addition enables customers to alert or deny traffic from\/to malicious IP addresses and domains based on the near real-time data feed powered by the Microsoft Intelligent Security Graph.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Security Center<\/a> now leverages machine learning to reduce the attack surface of internet-facing virtual machines, and its application controls have been extended to Linux and on-premises servers. The network map in Azure Security Center extends support for Virtual Network peering, a commonly used networking configuration in which traffic flows between Azure Virtual Networks through the Microsoft backbone.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/technology\/threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Threat Protection<\/a> now provides automated investigation and remediation in the Microsoft Security Center, a unified console that helps SecOps teams spend their limited time on the most high-value tasks, like proactive hunting and strategic improvements.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">We are extending our unique, native integration between <a href=\"https:\/\/www.microsoft.com\/en-us\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security<\/a> and Azure AD conditional access. Out-of-the box templates now enable organizations to configure some of our most popular policies, such as blocking the download of sensitive content in real-time, within seconds.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">New native capabilities in the Microsoft Office 365 version of Office client applications help document and email authors apply the right classification and sensitivity labels, helping you ensure information is protected in accordance with your organization\u2019s policies.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"securing-the-internet-of-things-iot\">Securing the Internet of Things (IoT)<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">IoT deployments can help organizations cut costs with predictive maintenance or to create new revenue streams from connected products. Unfortunately, the security pro talent shortage makes it difficult to successfully plan the IoT security controls necessary. We worked with the Industrial Internet Consortium to produce a new <a href=\"https:\/\/aka.ms\/SMMannouncement\" target=\"_blank\" rel=\"noopener noreferrer\">IoT Security Maturity Model<\/a> that provides clear industry best practices for evaluating your IoT risk profile and planning the remediation you need. We\u2019ve also added a new deployment method to Azure Sphere to help you reduce risk across your entire fleet of IoT devices. The new <a href=\"https:\/\/aka.ms\/guardianmodulesannounce\" target=\"_blank\" rel=\"noopener noreferrer\">guardian modules built on Azure Sphere<\/a> bring the security of Azure Sphere to brownfield IoT devices, allowing your business groups to complete IoT deployments without increasing risk for your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"connect-with-us-at-rsa\">Connect with us at RSA<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">I\u2019m proud to be part of the team driving all this innovation, but technology is not a silver bullet. Its role is simply to empower you\u2014the defenders. On Wednesday, March 6, at 10:30 AM PST, Ann Johnson will speak in her keynote about other ways we, as an industry, can empower people. I encourage you to attend, if you\u2019re at the conference. You can learn more about Microsoft security at booth 6059. We\u2019d love to connect with you there, or in one of the sessions we\u2019ll be leading\u2014find out more about our activities at <a href=\"https:\/\/www.microsoft.com\/rsa\" target=\"_blank\" rel=\"noopener noreferrer\">microsoft.com\/rsa<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.<\/p>\n","protected":false},"author":58,"featured_media":89073,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3809],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3692,3702,3703,3720,3726],"topic":[3684,3685],"coauthors":[1935],"class_list":["post-89023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-security-strategies","content-type-news","product-microsoft-defender","product-microsoft-defender-for-cloud-apps","product-microsoft-entra","product-microsoft-entra-id","product-microsoft-security-experts","product-microsoft-sentinel","topic-security-operations","topic-siem-and-xdr","review-flag-1694638265-576","review-flag-2-1694638266-864","review-flag-6-1694638266-691","review-flag-artif-1694638272-22","review-flag-inter-1694638272-721","review-flag-iot-1694638272-473","review-flag-machi-1694638272-641","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Helping security professionals do more, better | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Helping security professionals do more, better | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-04T09:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T14:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob Lefferts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Lefferts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/\",\"@type\":\"Person\",\"@name\":\"Rob Lefferts\"}],\"headline\":\"Helping security professionals do more, better\",\"datePublished\":\"2019-03-04T09:00:45+00:00\",\"dateModified\":\"2025-06-30T14:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\",\"keywords\":[\"Security strategies\"],\"articleSection\":[\"Azure Information Protection\",\"Azure Security\",\"Cybersecurity\",\"IoT\",\"Microsoft 365\",\"Microsoft Defender for Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\",\"name\":\"Helping security professionals do more, better | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\",\"datePublished\":\"2019-03-04T09:00:45+00:00\",\"dateModified\":\"2025-06-30T14:03:21+00:00\",\"description\":\"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png\",\"width\":1200,\"height\":600,\"caption\":\"Image of two coworkers collaborating over a laptop.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Helping security professionals do more, better\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/44adef6aa53a7d430b58253967a345fc\",\"name\":\"toddvanderark\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=gc2b78c9e21c32e078cfbb84751cefe73\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=g\",\"caption\":\"toddvanderark\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/toddvanderark\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Helping security professionals do more, better | Microsoft Security Blog","description":"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/","og_locale":"en_US","og_type":"article","og_title":"Helping security professionals do more, better | Microsoft Security Blog","og_description":"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-03-04T09:00:45+00:00","article_modified_time":"2025-06-30T14:03:21+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","type":"image\/png"}],"author":"Rob Lefferts","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","twitter_misc":{"Written by":"Rob Lefferts","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/","@type":"Person","@name":"Rob Lefferts"}],"headline":"Helping security professionals do more, better","datePublished":"2019-03-04T09:00:45+00:00","dateModified":"2025-06-30T14:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","keywords":["Security strategies"],"articleSection":["Azure Information Protection","Azure Security","Cybersecurity","IoT","Microsoft 365","Microsoft Defender for Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/","name":"Helping security professionals do more, better | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","datePublished":"2019-03-04T09:00:45+00:00","dateModified":"2025-06-30T14:03:21+00:00","description":"Learn how Microsoft\u2019s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/03\/Helping-security-professionals-do-more-better-BANNER.png","width":1200,"height":600,"caption":"Image of two coworkers collaborating over a laptop."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/03\/04\/helping-security-professionals-do-more-better\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Helping security professionals do more, better"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/44adef6aa53a7d430b58253967a345fc","name":"toddvanderark","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=gc2b78c9e21c32e078cfbb84751cefe73","url":"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5233f1cc5a41d21f0cdd35f5e8fe0fcc12bcf9d1453efd3a58b6a1ea41987f65?s=96&d=microsoft&r=g","caption":"toddvanderark"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/toddvanderark\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89023"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89023\/revisions"}],"predecessor-version":[{"id":140872,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89023\/revisions\/140872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89073"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89023"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=89023"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89023"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89023"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=89023"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=89023"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89023"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}