Event banner
Ask Microsoft Anything: Security Service Edge (SSE)
Event Ended
Wednesday, Aug 14, 2024, 09:00 AM PDTEvent details
Ask Microsoft Anything about securing access to any app or resource, from anywhere. Our panel of experts will answer you questions about Microsoft Entra Internet Access, Microsoft Entra Private Acces...
Heather_Poulsen
Updated May 14, 2025
Heather_Poulsen
Community Manager
Aug 14, 2024We hope you're looking forward to this AMA! Feel free to post your questions early here in the Comments—and please post one Comment per question to make it easy for our product team members to see them all. Thank you!
- NeilB965Aug 14, 2024Occasional ReaderFor entra Private Access: how do we setup the network security and access for cloud hosted resources, in the case of a severless resource/s (like a sql db)
- NeilB965Aug 14, 2024Occasional ReaderAny hints on when the ios GSA-enabled defender application will be Generally Available?
- NeilB965Aug 14, 2024Occasional ReaderWe use defender for endpoint (along with all the MS related products). Is it recommeneded to use GSA - Entra Internet Access when we already have defender smartscreen accomplishing much of the blocked categories?
- Faustin07Aug 14, 2024Occasional ReaderQuestion 1: What are the main challenges you are currently facing in managing enterprise data security? Question 2: Can you share best practices for maintaining compliance with data security regulations in a multi-cloud environment? Question 3: How do you see digital identity technologies evolving over the next few years? Question 4: What measures does your team recommend to prepare for emerging cybersecurity threats, such as AI-based attacks? Question 5: What tools or resources do you recommend for organizations to strengthen their security posture while ensuring a good user experience? Question 6: How does your team address the challenges related to identity and access management for remote or hybrid workers? Question 7: What are the key performance indicators you monitor to assess the effectiveness of security and compliance strategies?