Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Microsoft launches new cyber security features and tools

29/03/2016 by

W1siziisijiwmtyvmdmvmjkvmtmvmtavmtqvmy9nawnyb3nvznqgbg9nbybhbmqgzw1ibgvtlmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Microsoft has announced new features for its Office 365 and Azure cloud service as part of its renewed focus on improving the management and transparency of cyber security. Microsoft spokesperson Reed Turner claims the software and products will enable enterprise customers to evolve “their security posture from a simple protect-recovery model to more holistic posture that includes protect, detect and respond capabilities.”

The most notable aspects of the security plan include additional management and reporting options in the Azure Security Centre so users are also able to change and scale their policies depending on the type of workload. Also, a new power BI Dashboard for better security analytics enables enterprises to set up and filter security alerts so they can discover and respond to attack patterns and trends accordingly.

There will also be an updated Microsoft Operations Management Suite that provides more in-depth information and details, and a new Office 365 mobile security app called Microsoft Cloud App Security. The final key addition is Azure Directory Identity Protection, which was previewed for the first time in early March and aims to leverage Microsoft’s own mass of data to detect suspicious end-user activities.

The tech giant’s latest approach to security reflects the realities of a digital age that has now shifted towards mobile and the cloud. Microsoft has said that it is now aiming to invest in several major areas: Intelligent security graph, secure platform and working with partners. The new features will also improve security in cloud apps such as Salesforce and ServiceNow, and will provide SMEs and large corporations with the agility they require to secure their applications, personal data, devices and infrastructure – whether it is on premise, in the cloud or part of a hybrid solution.

VMware has also recently highlighted the on-going struggles facing IT security management with a new whitepaper about universities. VMware’s research shows that 36% of UK universities are the victims of a cyber attack every hour, while 83% believe the hacks and exploits are becoming increasingly sophisticated and targeted. It also highlighted a growing threat from within as almost two thirds of CIOs said that domestic students pose a threat to internal data.

The study by the virtualisation and cloud infrastructure provider also shows that enterprises need to adopt a holistic approach to security in order to combat threats, according to UK HE-Shared Services director Paul Hopkins. He concluded: “They must take a holistic approach to security, striking a balance to ensure critical research data is adequately protected without prohibiting or impeding researchers.”

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

 

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...