Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Security

Understanding Microsoft Defender for Endpoint and How It Protects Your Data

with 1 Comment by Ru Campbell

Microsoft Defender for Endpoint (MDE, previously known as Microsoft Defender Advanced Threat Protection) is Microsoft's endpoint security platform that goes far and beyond the traditional anti-malware engine and firewall to protect against the modern cybersecurity threats an organization faces.  An evolving solution since it was first announced in 2016, MDE is part of the Microsoft… Read More

Microsoft Azure Sentinel gets SAP Support, Plus UEBA and Entity Pages Reach GA

by Russell Smith

Last week Microsoft announced improvements to its cloud-native SIEM product, Azure Sentinel. In an effort to make Sentinel more efficient for Security Operations (SecOps) teams, Microsoft has improved the quality of rules and includes more innate intelligence out-of-the-box. There's also built-in support for SAP in preview. Plus, other features like UEBA and entity pages, which… Read More

Windows Server 2022 Secured-Core and Azure Hybrid Services Block Kernel Level Attacks

by Russell Smith

Microsoft announced at its Ignite conference earlier this year that it is extending its Secured-Core initiative to Windows Server 2022. Currently available for selected Windows 10 devices, Secured-Core requires hardware to meet new standards that follow isolation best practices and to have minimal trust of firmware. Microsoft says that Secured-Core devices are intended for industries… Read More

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: