2017-11-24

bga68comp: (Default)
Defense in depth:
Enterprise Mobility + Security advanced protection capabilities

by Alex Weinert, Microsoft Identity Services, @alex_t_weinert



Оригинал:
http://info.microsoft.com/rs/157-GQE-382/images/Defense_In_Depth_Enterprise%20Mobility_and_Security_61517.pdf

Глубокая защита: обеспечение безопасности предприятия с помощью расширенных возможностей защиты

Establish a defensible fortress to protect your organization’s integrity and operations with Microsoft Enterprise Mobility + Security

What do guards in red coats and bearskin hats have in common with Microsoft Enterprise Mobility + Security (EMS)? Sartorial choices aside, quite a bit. Both establish multiple, reinforcing defensive rings that are tightly integrated with the systems they protect. Both provide visibility into existing and emerging vulnerabilities. And both enable better insights by giving you the ability to monitor and control activity.

Read Defense in Depth: Enterprise Mobility + Security Advanced Protection Capabilities to learn about the defensive rings built into EMS, including:


  • Azure Active Directory Identity Protection Security Reports: watchmen in the towers

  • Azure Active Directory Risk-Based Conditional Access: guards at the gate

  • Microsoft Cloud Application Security: security escorts

  • Advanced Threat Analytics: your watchman in the treasury

  • Azure Active Directory Privileged Identity Management: the keeper of the keys

  • Azure Information Protection: mounted cavalry that protects treasure in transit

  • Microsoft Intune Mobile Device Management and Mobile Application Management: protector of the armory


bga68comp: (Default)

Get risk-driven identity and access
management insights from Forrester




Оригинал:
http://info.microsoft.com/rs/157-GQE-382/images/Forrester_s_Risk_Driven_I.PDF

Protect against new and unknown threats with risk-based identity and access management

Traditional identity and access management tools have a come a long way in the past five years, but they still have notable shortcomings when it comes to customer experience, threat defense, and policy management. To mitigate these issues and get better, holistic, layered controls, Forrester proposes taking a risk-based approach to identity and access management.

Forrester’s Risk-Driven Identity and Access Management Process Framework outlines how you can use risk-based identity and access management to:


  • Protect against new and unknown threats

  • Alleviate policy management burdens

  • Make your employees happier

Forrester’s framework also provides a simple, coherent self-assessment. Based on the gaps it identifies, you can redefine your organization’s processes to manage identity and access risk more effectively.

Profile

bga68comp: (Default)
bga68comp

January 2026

S M T W T F S
    123
45678 910
1112131415 1617
18 19 20212223 24
25262728293031

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated 2026-01-24 22:56
Powered by Dreamwidth Studios