Skip to main content
Skip to main content
Microsoft
Security
Security
Security
Home
Solutions
Solutions overview
Secure remote work
Zero Trust
Identity & access management
Identity and access management
Protect against identity compromise
Seamless user experiences
Unified identity and access management
Simplified identity governance
Secure seamless access to all your apps
Decentralized identity, blockchain and privacy
Threat protection
Information protection
Cloud security
Products
App and email security
Microsoft Defender for Office 365
Microsoft Cloud App Security
Azure Key Vault
Azure Dedicated HSM
Compliance
Insider risk management
Information protection and governance
Advanced eDiscovery
Compliance management
Endpoint security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Azure IoT Central
Azure Sphere
Identity and access management
Azure Active Directory
SSO solution: Secure app access with single sign-on
Multifactor authentication (MFA)
Conditional Access
Identity protection
Privileged Identity Management (PIM)
External identities
Passwordless Authentication
Network security
Azure Application Gateway
Azure VPN Gateway
Azure DDoS Protection
Azure Firewall manager
Azure Front-door
Azure Web Application Firewall
Security posture
Azure Security Center
Microsoft Secure Score
SIEM and XDR
Azure Sentinel
Microsoft 365 Defender
Azure Defender
SIEM and XDR overview
Operations
Partners
Partners Overview
Find a partner
Security Association
Government partners
Industry Alliances
Resources
Solorigate detection guidance
Security fundamentals
Webcasts, whitepapers & more
Security Technical Content Library
Intelligence
Events
Security blog
Trust Center
Trust Center
Security
Privacy
Compliance
Service Trust Portal
More
All Microsoft
Microsoft 365
Azure
Office 365
Dynamics 365
Power Platform
Windows 10
Products & Services
Windows Server
Enterprise Mobility + Security
Power BI
Teams
Visual Studio
Microsoft Advertising
Emerging Technologies
AI
Internet of Things
Azure Cognitive Services
Quantum
Microsoft HoloLens
Mixed Reality
Developer & IT
Docs
Developer Center
Windows Dev Center
Windows IT Pro Center
FastTrack
Power Platform
Partner
Partner Network
Solution Providers
Partner Center
Cloud Hosting
Industries
Education
Financial services
Government
Health
Manufacturing & resources
Retail
Other
Security
Licensing
AppSource
Azure Marketplace
Events
Research
View Sitemap
Search
Search Microsoft.com
Cancel
Sign in
bars
Category filters menu
Recent articles
Products and solutions
See all
Azure Active Directory
Azure Defender
Azure Information Protection
Azure Sentinel
Microsoft 365 Defender
Microsoft 365 Security
Microsoft Authenticator
See all
Azure Active Directory
Azure Defender
Azure Information Protection
Azure Sentinel
Microsoft 365 Defender
Microsoft 365 Security
Microsoft Authenticator
Microsoft Cloud App Security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Microsoft Graph Security API
Office 365 Security
Secure Score
Windows Security
XDR
Microsoft Cloud App Security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Microsoft Graph Security API
Office 365 Security
Secure Score
Windows Security
XDR
Topics
See all
AI and machine learning
Automation
Cloud Access Security Broker
Compliance
Cybersecurity policy
Data governance
See all
AI and machine learning
Automation
Cloud Access Security Broker
Compliance
Cybersecurity policy
Data governance
Email security
Encryption
Endpoint security
GDPR
Identity and access management
Incident response
Information/data protection
Email security
Encryption
Endpoint security
GDPR
Identity and access management
Incident response
Information/data protection
IoT
Mobile security
Network security
Phishing
Ransomware
Security deployment
Security intelligence
IoT
Mobile security
Network security
Phishing
Ransomware
Security deployment
Security intelligence
Security management
Security operations
Security strategies
SIEM
Threat protection
XDR
Zero trust
Security management
Security operations
Security strategies
SIEM
Threat protection
XDR
Zero trust
Series
See all
CISO series
Compliance
Identity and access management
Integrated Threat Protection
IoT security
Microsoft Detection and Response Team (DART)
See all
CISO series
Compliance
Identity and access management
Integrated Threat Protection
IoT security
Microsoft Detection and Response Team (DART)
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Secure remote work
Security deployment
Voice of the community
Voice of the customer
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Secure remote work
Security deployment
Voice of the community
Voice of the customer
Related blogs
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Endpoint Management
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Endpoint Management
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
Subscribe
Featured image for Securing and governing data in a new hybrid work reality
March 2, 2021
Securing and governing data in a new hybrid work reality
New Microsoft compliance capabilities enable you to extend data protection and governance across apps, endpoints, and platforms to keep your people collaborative and productive, while ensuring your most valuable asset—your data—remains secure and compliant wherever it lives.
Read more
Securing and governing data in a new hybrid work reality
Featured image for Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
February 4, 2021
Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and each plays a critical role in an enterprise data protection strategy.
Read more
Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
Featured image for Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
January 6, 2021
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of relevant regulatory information, they must report it within the required time frame. The size and scope of this reporting effort can be massive. Using Microsoft 365 Advanced Audit and Advanced eDiscovery to better understand the scope of the breach can minimize the burden on customers as well as the financial and reputational cost to the organization.
Read more
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
Featured image for Enable secure remote work, address regulations and uncover new risks with Microsoft Compliance
September 22, 2020
Enable secure remote work, address regulations and uncover new risks with Microsoft Compliance
A recent Microsoft poll of Chief Information Security Officers (CISOs) revealed that providing secure remote access to resources, apps, and data is their top concern.
Read more
Enable secure remote work, address regulations and uncover new risks with Microsoft Compliance
Featured image for Preventing data loss and mitigating risk in today’s remote work environment
July 21, 2020
Preventing data loss and mitigating risk in today’s remote work environment
New solutions and features—like the new Endpoint Data Loss Prevention—help organizations to protect against data loss and other risks, especially in remote work scenarios.
Read more
Preventing data loss and mitigating risk in today’s remote work environment
Featured image for What’s new in Microsoft 365 Compliance and Risk Management
June 11, 2020
What’s new in Microsoft 365 Compliance and Risk Management
Check out some of the investments we’ve made to help you to get the most out of Microsoft 365 Compliance and take a more integrated approach to secure, protect, and manage your data, while mitigating risk.
Read more
What’s new in Microsoft 365 Compliance and Risk Management
Featured image for Data governance matters now more than ever
April 30, 2020
Data governance matters now more than ever
Today we are excited to announce the general availability of Microsoft 365 Records Management, which can help organizations to secure and govern their most critical data.
Read more
Data governance matters now more than ever
Featured image for Protecting your data and maintaining compliance in a remote work environment
April 6, 2020
Protecting your data and maintaining compliance in a remote work environment
Business continuity is an imperative, and you must rely on your employees to stay connected and productive outside of the traditional digital borders of business. In doing so, identifying and managing potential risks within the organization is critical to safeguarding your data and intellectual property (IP), while supporting a positive company culture.
Read more
Protecting your data and maintaining compliance in a remote work environment
Featured image for Guarding against supply chain attacks—Part 3: How software becomes compromised
March 11, 2020
Guarding against supply chain attacks—Part 3: How software becomes compromised
Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.
Read more
Guarding against supply chain attacks—Part 3: How software becomes compromised
Featured image for Guarding against supply chain attacks—Part 2: Hardware risks
February 3, 2020
Guarding against supply chain attacks—Part 2: Hardware risks
Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft’s role in reducing hardware-based attacks.
Read more
Guarding against supply chain attacks—Part 2: Hardware risks
Featured image for Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution
January 29, 2020
Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution
A cyber-risk assessment is crucial to any organization’s risk management strategy.
Read more
Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution
Featured image for Data privacy is about more than compliance—it’s about being a good world citizen
January 28, 2020
Data privacy is about more than compliance—it’s about being a good world citizen
Data Privacy Day is a great time to assess your company privacy policies to ensure you comply with local and regional regulations.
Read more
Data privacy is about more than compliance—it’s about being a good world citizen
1
2
3
Next