The significant increase in mobile data usage, cloud adoption, digitization, and personal devices in the enterprise brings new opportunities and security risks. Microsoft uses many Microsoft 365 security technologies to help ensure a productive and secure environment for the company and our customers. Together, these Microsoft 365 security tools enable us to strengthen authentication, employ conditional access, better protect data, and automate threat protection—all while streamlining our security management through a tightly integrated set of tools.
Enterprises are constantly challenged to better protect their data wherever it resides: on-premises and in the cloud. At Microsoft, we’ve adopted the Azure Information Protection scanner as our primary solution to automatically protect on-premises data stores. By combining the scanner with Office 365 Data Loss Prevention and Azure Information Protection, we’re providing end-to-end discovery, custom labeling, and automated protection of all sensitive data, irrespective of when it was created or where it is stored—even in PDFs and RMS-encrypted files.
Microsoft security experts answer questions about how we protect information at Microsoft. We developed and implemented a data classification schema that consists of five labels to help protect data and documents. They describe how we use the labels, our efforts to educate people about classifying data and preventing data loss, and tools for automating information protection.
As malicious threats evolve, companies add multilayer security and take a defense-in-depth approach as they strive to protect their enterprises. One element in our network security strategy at Microsoft is the secure admin workstation (SAW). These limited-use client computers—built on Windows 10—help protect high-risk environments from security risks such as malware, phishing, and pass-the-hash attacks, and they provide secure access to restricted environments.
If it’s done right, security can enable all of the other aspects of digital transformation. See how improved security processes can enable enterprises to be more creative, innovative, and remain competitive in the last of our six-part series on enterprise security.