{"id":98328,"date":"2021-10-04T13:00:53","date_gmt":"2021-10-04T20:00:53","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=98328"},"modified":"2025-07-03T04:59:34","modified_gmt":"2025-07-03T11:59:34","slug":"windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/","title":{"rendered":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">As the world has changed over the past 18-months, companies have been wrestling with ways to keep employees and data protected as they support new ways of hybrid working. We built <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/business\/windows-11-security\" target=\"_blank\" rel=\"noopener\">Windows 11<\/a> to be the most secure Windows yet with built-in chip to cloud protection that ensures company assets stay secure no matter where work happens.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">Seventy-five percent of software decision-makers feel that the move to hybrid work leaves their organization more vulnerable to security threats.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-threat-intelligence-journey-to-build-in-protection\">The threat intelligence journey to build in protection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The expansion of both remote and hybrid workplaces brings new opportunities to organizations. But the expansion of&nbsp;access, increased number of endpoints, and desire for employees to work from anywhere on any device&nbsp;has&nbsp;also introduced new threats and risks.&nbsp;In 2020, Microsoft protected customers from 30 billion email threats, 6 billion threats to endpoint devices, and processed more than 30 billion authentications. Yet most employees still struggle to avoid clicking phishing links in email, spoofed websites, and more. The National Institute of Standards and Technology (NIST) shows a more than five-fold increase in hardware attacks over three years, and Microsoft\u2019s initial <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/30\/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats\/\" target=\"_blank\" rel=\"noopener\">Security Signals report<\/a> found that more than 80 percent of Vice Presidents and above admitted to experiencing a hardware attack in the last two years.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We designed Windows 11 for today&#8217;s hybrid workplace. With Windows 11, hardware and software work together for protection from the central processing unit (CPU) all the way to the cloud so our customers can enable hybrid productivity and high-quality employee experiences without compromising security.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">\u201cIn this new hybrid work environment, more information is being handled outside the confines of the traditional office and outside the control of IT departments. This creates new, acute security challenges and makes it more important than ever to add as many layers of protection as possible to keep devices secure. Hardware protections are a key component to instilling a higher degree of confidence that devices haven\u2019t been compromised.\u201d\u2014Michael Mattioli, Vice President, Goldman Sachs<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"windows-11-security-by-default\">Windows 11: Security by default<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">NIST shows a more than five-fold increase in hardware attacks over three years, and Microsoft\u2019s initial <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/30\/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats\/\" target=\"_blank\" rel=\"noopener\">Security Signals report<\/a> found that more than 80 percent of Vice Presidents and above admitted to experiencing a hardware attack in the last two years. To address the increasing sophistication and number of attacks against firmware\/hardware, we partnered with manufacturers to create a new class of Secured-core PCs in 2019 and a new security-specific processor in 2020, the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/11\/17\/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs\/#:~:text=Meet%20the%20Microsoft%20Pluton%20processor%20%E2%80%93%20The%20security,us%20connected%20and%20productive%20across%20work%20and%20life.\" target=\"_blank\" rel=\"noopener\">Microsoft Pluton<\/a>, that redefines Windows security at the CPU. In Secured-core PCs, hardware-backed security features are enabled by default without any action required by the user or IT. Secured-core PCs were initially designed for highly targeted industries like financial services and healthcare with mission-critical roles that handle company IP, customer Personal Identifiable Information (PII), sensitive government data, financial information, or patient history. But as the move to hybrid work becomes the new normal and the threat landscape becomes more complex, the need to apply better security features from chip to cloud becomes a high priority.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">Eighty percent of security decision-makers believe software alone is not enough protection from emerging threats.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">We leveraged our learnings from secured-core PCs and brought them to Windows 11. The new hardware security requirements that come with Windows 11 are designed to build a foundation that is even stronger and more resilient to attacks. Windows 11 isolates software from hardware. This isolation helps protect access\u2014from encryption keys and user credentials to other sensitive data\u2014behind a hardware barrier, so malware and attackers can\u2019t access or tamper with that data during the boot process. And Windows 11 requires hardware that can enable even more protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot. The combination of these features has been shown to reduce malware by 60 percent on tested devices. All <a href=\"https:\/\/blogs.windows.com\/windows-insider\/2021\/06\/28\/update-on-windows-11-minimum-system-requirements\/\" target=\"_blank\" rel=\"noopener\">Windows 11 supported CPUs<\/a> have an embedded Trusted Platform Module (TPM) chip, support secure boot, and support virtualization-based security (VBS) and specific VBS capabilities, fully turned on out-of-the-box.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">Windows 11: Powerful security from chip to cloud. For a comprehensive view of the Windows 11 security investments, see the <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWMyFE\" target=\"_blank\" rel=\"noopener\">Windows 11 Security book<\/a>.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enhanced-hardware-and-operating-system-security\">Enhanced hardware&nbsp;and&nbsp;operating system security<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">With&nbsp;hardware-based&nbsp;isolation&nbsp;security&nbsp;that begins&nbsp;at&nbsp;the&nbsp;chip,&nbsp;Windows 11&nbsp;stores sensitive data&nbsp;behind additional security barriers, separated from the operating system.&nbsp;As a result, information&nbsp;including encryption keys and user credentials are protected&nbsp;from unauthorized access and tampering.&nbsp;In Windows&nbsp;11,&nbsp;hardware&nbsp;and&nbsp;software work together to protect&nbsp;the operating system,&nbsp;with&nbsp;VBS and&nbsp;Secure&nbsp;Boot built-in&nbsp;and&nbsp;enabled by default&nbsp;on&nbsp;new CPUs. Even&nbsp;if bad actors get in, they don\u2019t get far.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"robust-application-security-and-privacy-controls\">Robust application security&nbsp;and privacy controls<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">To help keep personal and business information protected and private, Windows 11 has multiple layers of application security to safeguard critical data and code integrity. Application isolation and controls, code integrity, privacy controls, and least-privilege principles enable developers to build in security and privacy from the ground up. This integrated security protects against breaches and malware, helps keep data private, and gives IT administrators the controls they need.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"secured-identities\">Secured&nbsp;identities<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Passwords are inconvenient to use and prime targets for cybercriminals\u2014and they\u2019ve been an important part of digital security for years. That changes with the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\/passwordless-authentication\" target=\"_blank\" rel=\"noopener\">passwordless protection<\/a> available with Windows 11. After a secure authorization process, credentials are protected behind layers of hardware and software security, giving users secure, passwordless access to their applications and cloud services.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"connecting-to-cloud-services\">Connecting&nbsp;to cloud services<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Windows 11 security enables policies, controls, procedures, and technologies that work together&nbsp;to protect&nbsp;your&nbsp;devices,&nbsp;data, applications,&nbsp;and&nbsp;identities&nbsp;from anywhere. Microsoft offers comprehensive cloud services for identity,&nbsp;storage,&nbsp;and access management in addition to the&nbsp;tools to attest that any Windows device connecting to your network is trustworthy.&nbsp;You can also&nbsp;enforce&nbsp;compliance and conditional access&nbsp;with&nbsp;a&nbsp;modern&nbsp;device management (MDM)&nbsp;service&nbsp;such as Microsoft Intune&nbsp;that works with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/#overview\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Active Directory<\/a>&nbsp;to control access&nbsp;to&nbsp;applications and data&nbsp;through the cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-11-76545367432?&amp;ef_id=Cj0KCQjwwNWKBhDAARIsAJ8Hkhd_Qm3v0bleV0ccvtRNGvCMLzJ1jNhDDuzJ-I9f7RGuv0nLfi2PSSAaAgAmEALw_wcB:G:s&amp;OCID=AID2200834_SEM_Cj0KCQjwwNWKBhDAARIsAJ8Hkhd_Qm3v0bleV0ccvtRNGvCMLzJ1jNhDDuzJ-I9f7RGuv0nLfi2PSSAaAgAmEALw_wcB:G:s&amp;gclid=Cj0KCQjwwNWKBhDAARIsAJ8Hkhd_Qm3v0bleV0ccvtRNGvCMLzJ1jNhDDuzJ-I9f7RGuv0nLfi2PSSAaAgAmEALw_wcB#0\" target=\"_blank\" rel=\"noopener\">Windows 11<\/a> rises to the challenge of modern threats of hybrid computing and enables customers to get ultimate productivity and intuitive experiences without compromising security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For customers who aren\u2019t ready to transition to new devices, the baseline security features in Windows 11 are also available on Windows 10, which will remain supported <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flifecycle%2Fproducts%2Fwindows-10-home-and-pro&amp;data=04%7C01%7Cv-amysledge%40microsoft.com%7Cb176aa883b864cba41e308d97e2341a2%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637679512172351626%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=GxHZZyvsNn%2F2c%2FG340OQRWL9k27ui7eFZ5PmW9YJ12o%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">through October 14, 2025<\/a>. We are committed to supporting Windows 10 customers and offering choices in their computing journey.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">See how to <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/get-windows-11\" target=\"_blank\" rel=\"noopener\">upgrade to Windows 11<\/a> now.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Read more about comprehensive <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/business\/windows-11-security\" target=\"_blank\" rel=\"noopener\">Windows 11 security<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/blogs.windows.com\/windowsexperience\/2021\/06\/24\/introducing-windows-11\/\" target=\"_blank\" rel=\"noopener\">Panos Panay, Chief Product Officer, Windows + Devices, Introduces Windows 11<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Watch the <a href=\"https:\/\/youtu.be\/tg9QUrnVFho\" target=\"_blank\" rel=\"noopener\">Windows 11 Security show, Microsoft Mechanics<\/a>.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the world has changed over the past 18-months, companies have been wrestling with ways to keep employees and data protected as they support new ways of hybrid working. We built Windows 11 to be the most secure Windows yet with built-in chip to cloud protection that ensures company assets stay secure no matter where work happens.<\/p>\n","protected":false},"author":106,"featured_media":98529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3824,3819],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[],"topic":[3665,3682],"coauthors":[2766],"class_list":["post-98328","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-hybrid-work","tag-windows","content-type-news","topic-analyst-reports","topic-secure-remote-work","review-flag-1694638265-576","review-flag-1694638265-83","review-flag-6-1694638266-691","review-flag-anywh-1694638264-237","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"As the world has changed over the past 18-months, companies have been wrestling with ways to keep employees and data protected as they support new ways of hybrid working. We built Windows 11 to be the most secure Windows yet with built-in chip to cloud protection that ensures company assets stay secure no matter where work happens.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-04T20:00:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T11:59:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Offensive Research &amp; Security Engineering (MORSE)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Offensive Research &amp; Security Engineering (MORSE)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-offensive-research-security-engineering-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Offensive Research & Security Engineering (MORSE)\"}],\"headline\":\"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work\",\"datePublished\":\"2021-10-04T20:00:53+00:00\",\"dateModified\":\"2025-07-03T11:59:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\"},\"wordCount\":1198,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\",\"keywords\":[\"Hybrid work\",\"Windows\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\",\"name\":\"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\",\"datePublished\":\"2021-10-04T20:00:53+00:00\",\"dateModified\":\"2025-07-03T11:59:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png\",\"width\":1200,\"height\":675,\"caption\":\"Horizontal format of an attract image of Surface Pro 7+ in laptop mode with black typepad on a desk. Windows 11 screen shown.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1\",\"name\":\"Emma Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"caption\":\"Emma Jones\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/","og_locale":"en_US","og_type":"article","og_title":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog","og_description":"As the world has changed over the past 18-months, companies have been wrestling with ways to keep employees and data protected as they support new ways of hybrid working. We built Windows 11 to be the most secure Windows yet with built-in chip to cloud protection that ensures company assets stay secure no matter where work happens.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-10-04T20:00:53+00:00","article_modified_time":"2025-07-03T11:59:34+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","type":"image\/png"}],"author":"Microsoft Offensive Research & Security Engineering (MORSE)","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","twitter_misc":{"Written by":"Microsoft Offensive Research & Security Engineering (MORSE)","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-offensive-research-security-engineering-team\/","@type":"Person","@name":"Microsoft Offensive Research & Security Engineering (MORSE)"}],"headline":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work","datePublished":"2021-10-04T20:00:53+00:00","dateModified":"2025-07-03T11:59:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/"},"wordCount":1198,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","keywords":["Hybrid work","Windows"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/","name":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","datePublished":"2021-10-04T20:00:53+00:00","dateModified":"2025-07-03T11:59:34+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled.png","width":1200,"height":675,"caption":"Horizontal format of an attract image of Surface Pro 7+ in laptop mode with black typepad on a desk. Windows 11 screen shown."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/04\/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows 11 offers chip to cloud protection to meet the new security challenges of hybrid work"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1","name":"Emma Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c","url":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","caption":"Emma Jones"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/98328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=98328"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/98328\/revisions"}],"predecessor-version":[{"id":141009,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/98328\/revisions\/141009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/98529"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=98328"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=98328"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=98328"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=98328"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=98328"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=98328"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=98328"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=98328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}