{"id":92311,"date":"2020-12-03T08:00:12","date_gmt":"2020-12-03T16:00:12","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92311"},"modified":"2025-06-25T04:43:36","modified_gmt":"2025-06-25T11:43:36","slug":"manage-govern-and-get-more-value-out-of-your-data-with-azure-purview","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/","title":{"rendered":"Manage, govern, and get more value out of your data with Azure Purview"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Data is the currency of today\u2019s economy. Data is being created faster than ever in more locations than organizations can track. In fact, <a href=\"https:\/\/blogs.idc.com\/2019\/09\/04\/how-idcs-industry-cloudpath-saaspath-surveys-can-inform-your-cloud-saas-strategy\/\" target=\"_blank\" rel=\"noopener noreferrer\">IDC has predicted<\/a> that global data will grow to more than 175 zettabytes by 2025. To put that into context, that\u2019s 175 trillion 1GB USB drives. At the same time, businesses are under significant pressure to turn that data into timely and trustworthy insights, while also maintaining regulatory compliance requirements. But to truly get the insights you need, while keeping up with compliance requirements, you need to know what data you have, where it resides, and how to govern it. For most organizations, this creates arduous ongoing challenges.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We want to help companies overcome that challenge. Many of you already use Microsoft Information Protection to help you to protect the sensitive data that resides in Microsoft 365 and have asked us to extend the reach of Microsoft Information Protection beyond Microsoft 365 to cover more of your digital estate. Today we are excited to announce <a href=\"https:\/\/aka.ms\/AAa5tzo\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Azure Purview<\/strong><\/a>, a unified data governance service that sets the foundation for data governance across your operational and analytical data estate that is <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/shape-your-future-with-data-and-analytics\/\" target=\"_blank\" rel=\"noopener noreferrer\">available today in preview<\/a>. Let\u2019s dive into what that means for your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"manage-and-govern-your-data-with-azure-purview\">Manage and govern your data with Azure Purview<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Purview enables you to map, catalog, understand, classify, and manage your operational and analytical data\u2014whether on-premises, across your multicloud environment, or within SaaS applications.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With Azure Purview Data Map, you can automate the metadata scanning of on-premises, multicloud, and SaaS data and applications so that you can find and classify this data using built-in, custom classifiers, and Microsoft Information Protection sensitivity labels. With Purview Data Catalog, you can now search, understand the underlying sensitivity, and view how data is being used across the organization with data lineage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"building-on-the-power-of-microsoft-information-protection\">Building on the power of Microsoft Information Protection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, we have long invested in developing information protection solutions for our customers. We started with Microsoft Information Protection, a built-in, intelligent, unified, and extensible solution that understands and classifies your data, keeps it protected, and prevents data loss across Microsoft 365 Apps (including Word, PowerPoint, Excel, Outlook), services (such as Microsoft Teams, SharePoint, Exchange, Power BI), third-party SaaS applications, and more\u2014on-premises or in the cloud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Purview builds on the same sensitivity labels and data classification taxonomy in Microsoft Information Protection. By extending Microsoft Information Protection\u2019s sensitivity labels with Azure Purview, organizations can now automatically discover, classify, and get insight into sensitivity across a broader range of data sources such as SQL Server, SAP, Teradata, Azure Data Services, and Amazon AWS S3, helping to minimize compliance risk. For more details about how Microsoft Information Protection and Azure Purview work together, check out <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/microsoft-information-protection-and-microsoft-azure-purview\/ba-p\/1957481\" target=\"_blank\" rel=\"noopener noreferrer\">this Tech Community blog<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/12\/MIP-sensitivity-labels.gif\" alt=\"Animated GIF of two computer screens showing MIP and Purview\" class=\"wp-image-92320\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Microsoft 365 compliance center and Azure Purview Studio show how an organization&#8217;s labels are used consistently across data types and data locations.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Governing your data, wherever it lives, is more critical than ever before, and we are committed to helping you every step of the way. To get started right now with Microsoft Information Protection, you can sign up for a <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\/compliance-solutions#midpagectaregion\" target=\"_blank\" rel=\"noopener noreferrer\">trial&nbsp;of&nbsp;Microsoft 365&nbsp;E5<\/a>&nbsp;or navigate to the&nbsp;<a href=\"https:\/\/sip.compliance.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365&nbsp;compliance center<\/a>. To start using the preview of Azure Purview, visit the <a href=\"https:\/\/aka.ms\/AzurePurview\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Purview<\/a> page.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we are excited to announce Azure Purview, a unified data governance service that sets the foundation for data governance across your operational and analytical data estate.<\/p>\n","protected":false},"author":98,"featured_media":92312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3742],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3710],"topic":[3871,3683],"coauthors":[2291],"class_list":["post-92311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-azure","content-type-news","product-microsoft-purview","topic-built-in-security","topic-security-management","review-flag-idc-1694638272-695"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-03T16:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T11:43:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alym Rayani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alym Rayani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alym-rayani\/\",\"@type\":\"Person\",\"@name\":\"Alym Rayani\"}],\"headline\":\"Manage, govern, and get more value out of your data with Azure Purview\",\"datePublished\":\"2020-12-03T16:00:12+00:00\",\"dateModified\":\"2025-06-25T11:43:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\"},\"wordCount\":601,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\",\"keywords\":[\"Azure\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\",\"name\":\"Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\",\"datePublished\":\"2020-12-03T16:00:12+00:00\",\"dateModified\":\"2025-06-25T11:43:36+00:00\",\"description\":\"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Female developer working on the go from the office breakroom or kitchen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Manage, govern, and get more value out of your data with Azure Purview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/9c10dd9a794f14184fafbeade157693f\",\"name\":\"Lauren Goodwin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g1fe78ec631dc1c5ad67c9427b64917b2\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g\",\"caption\":\"Lauren Goodwin\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-lgoodw\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog","description":"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/","og_locale":"en_US","og_type":"article","og_title":"Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog","og_description":"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-12-03T16:00:12+00:00","article_modified_time":"2025-06-25T11:43:36+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","type":"image\/jpeg"}],"author":"Alym Rayani","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","twitter_misc":{"Written by":"Alym Rayani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alym-rayani\/","@type":"Person","@name":"Alym Rayani"}],"headline":"Manage, govern, and get more value out of your data with Azure Purview","datePublished":"2020-12-03T16:00:12+00:00","dateModified":"2025-06-25T11:43:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/"},"wordCount":601,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","keywords":["Azure"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/","name":"Manage, govern, and get more value out of your data with Azure Purview | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","datePublished":"2020-12-03T16:00:12+00:00","dateModified":"2025-06-25T11:43:36+00:00","description":"Sensitivity labels taxonomy is the same across Microsoft Information Protection and Azure Purview.\u201d","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/12\/CLO20b_Sylvie_canteen_003-scaled.jpg","width":2560,"height":1707,"caption":"Female developer working on the go from the office breakroom or kitchen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/03\/manage-govern-and-get-more-value-out-of-your-data-with-azure-purview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Manage, govern, and get more value out of your data with Azure Purview"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/9c10dd9a794f14184fafbeade157693f","name":"Lauren Goodwin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g1fe78ec631dc1c5ad67c9427b64917b2","url":"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/809ce5343010b74e0bf6165864b7a2e6527e751e31bbe66d30f5d571e3e80963?s=96&d=microsoft&r=g","caption":"Lauren Goodwin"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-lgoodw\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/98"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=92311"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92311\/revisions"}],"predecessor-version":[{"id":140294,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92311\/revisions\/140294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/92312"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=92311"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=92311"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=92311"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=92311"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=92311"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=92311"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=92311"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=92311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}