Home
%3CLINGO-SUB%20id%3D%22lingo-sub-363057%22%20slang%3D%22en-US%22%3EThis%20week%20at%20RSA%20-%20event%20summary%20and%20key%20takeaways%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-363057%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EHey%20there!%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EI%20spent%20the%20week%20at%20RSA%20with%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20an%20incredible%20group%20of%20customers%2C%20industry%20partners%2C%20and%20lots%20of%20great%20people%20from%20the%20Microsoft%20security%20and%20identity%20teams.%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3ERSA%20is%20one%20of%20the%20pre-eminent%20security%20conferences%2C%20and%20I%20always%20love%20walking%20the%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E(seemingly%20ever-expanding)%20show%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efloor%20to%20see%20the%20great%20stuff%20the%20industry%20is%20coming%20up%20with%2C%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20talking%20strategy%20with%20analysts%2C%20and%20hearing%20from%20the%20many%20amazing%20CISOs%20who%20are%20holding%20the%20fort%20for%20their%20companies.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIt%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewas%20a%20great%20week%20for%20the%20Identity%20team%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%93%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Ewe%20all%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehad%20a%20chance%20to%20interact%20with%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20present%20and%20prospective%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20customers%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20and%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20partners%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20Here%20are%20some%20of%20my%20take-aways%20from%20the%20event%3A%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3E1%20%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3EZero%20Trust%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20is%20top-of-mind%20for%20security%20professional%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3E!%3C%2FSPAN%3E%3C%2FI%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosof%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Et%E2%80%99s%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIdentity%20Security%20and%20Protection%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20team%20builds%20the%20tech%20that%20intercepts%20and%20disrupts%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ealmost%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E400M%20criminal%20login%20attem%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Epts%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20daily%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20%E2%80%93%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Earound%2012%20billion%20a%20month%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20up%20more%20than%20an%20order%20of%20magnitude%20from%20a%20few%20years%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20ago%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E!%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAt%20RSA%2C%20I%20had%20a%20chance%20to%20meet%20with%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efellow%20defenders%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20responsible%20for%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efighting%20this%20rising%20tide%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20for%20their%20own%20organizations.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EBack%20in%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EDecember%2C%20I%20had%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fzero-trust-part-1-identity-and-access-management%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3Eblogged%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20about%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIdentity%E2%80%99s%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Epivotal%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erole%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ein%20Zero%20Trust%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20A%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Et%20RSA%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EI%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehad%20a%20chance%20to%20carry%20forward%20that%20discussion%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIt%20was%20great%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehearing%20from%20customers%20who%20had%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eeliminated%20their%20traditional%20network%20and%20VPN%20approach%20and%20embraced%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Edigital%20transformation%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20and%20were%20using%20all%20the%20signals%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20control%20points%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efrom%20endpoints%2C%20authentication%2C%20and%20apps%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20to%20massively%20enhance%20security%20*and*%20productivity%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ein%20their%20organizations.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20Great%20security%20extends%20the%20horizon%20of%20productivity.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWe%20also%20had%20a%20blast%20presenting%20some%20of%20the%20latest%20strides%20we%E2%80%99ve%20made%20in%20this%20space.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWe%E2%80%99re%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Egiving%20you%20more%20and%20more%20tools%20to%20manage%20security%20in%20%3C%2FSPAN%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eyour%3C%2FSPAN%3E%3C%2FI%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20transformation%20-%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ERead%20on!%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20aria-level%3D%221%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23000000%22%3EA%20unified%20security%20operations%20portal%20across%20your%20hybrid%20identities%26nbsp%3B%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%20aria-level%3D%221%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAt%20Ignite%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20we%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eannounced%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ework%20we%20are%20doing%20to%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehelp%20identity%20and%20security%20professionals%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eintegrat%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ee%20Azure%20AD%20Identit%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ey%20Protection%E2%80%99s%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ecloud%20auth%20signals%20and%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAzure%20ATP%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%99s%20view%20of%20on%20prem%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erisks%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20This%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eis%20key%20to%20identify%20and%20mitigate%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erisks%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efrom%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20target%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eed%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20identities%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Edetect%20and%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Earrest%20lateral%20movement%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewithin%20your%20on-premises%20infrastructure.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAt%20RSA%2C%20we%20were%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Epsyched%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20to%20announce%20the%20preview%20of%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Eev%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Een%20more%20cool%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ecapabilities%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%3A%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%20aria-setsize%3D%22-1%22%20data-leveltext%3D%22%251.%22%20data-font%3D%22%22%20data-listid%3D%222%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EA%20unified%20SecOps%20portal%20that%20brings%20together%20identity%20security%20signals%20from%20across%20the%20Microsoft%20365%20suite%20with%20the%20aim%20of%20consolidating%20user%20insights%20into%20a%20single%20pane%20of%20glass%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20%E2%80%93%20check%20out%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funifiedsecops%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3Ehttps%3A%2F%2Faka.ms%2Funifiedsecops%3C%2FSPAN%3E%3C%2FA%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Eto%20learn%20more!%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A0%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20aria-setsize%3D%22-1%22%20data-leveltext%3D%22%251.%22%20data-font%3D%22%22%20data-listid%3D%222%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAn%20investigation%20priority%20score%20that%20helps%20you%20%3C%2FSPAN%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eprioritize%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20your%20remediation%20backlog%20by%20providing%20you%20with%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Evisibility%20into%20users%20that%20could%20pose%20the%20greatest%20risk%20to%20your%20organization%20should%20they%20be%20compromised%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20To%20get%20started%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20visit%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Finvestigationpriority%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3Ehttps%3A%2F%2Faka.ms%2Finvestigationpriority%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20now%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E!%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A0%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%20aria-level%3D%221%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20aria-level%3D%221%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23000000%22%3EMore%20powerful%20CASB%20powered%20in-session%20controls%20in%20Azure%20AD%20conditional%20access%20and%20signals%20in%20Azure%20AD%20Identity%20Protection%26nbsp%3B%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%20aria-level%3D%221%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAzure%20AD%20Conditional%20Access%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eis%20a%20great%20tool%20for%20determining%20t%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehe%20conditions%20in%20which%20sessions%20will%20be%20granted%20%3C%2FSPAN%3E%3CI%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20%3C%2FSPAN%3E%3C%2FI%3E%3CSPAN%20data-contrast%3D%22auto%22%3Econtrolling%20behavior%20of%20the%20session%20itself.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EOne%20great%20example%20of%20this%20is%20using%20Azure%20AD%20Conditional%20Access%20to%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erequire%20Microsoft%20Cloud%20App%20Security.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIn%20order%20to%20help%20conditional%20access%20admins%20to%20make%20the%20most%20out%20of%20the%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esession%20controls%20that%20Microsoft%20Cloud%20App%20Security%20enables%20within%20Azure%20AD%2C%20we%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%99ve%20added%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ethe%20ability%20to%20configure%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%20Cloud%20App%20Security%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esession%20policies%20directly%20in%20Azure%20AD%20conditional%20access%20including%3A%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%20aria-setsize%3D%22-1%22%20data-leveltext%3D%22%251.%22%20data-font%3D%22%22%20data-listid%3D%221%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMonitor%20only%20-%20where%20sessions%20will%20be%20monitored%20for%20in-session%20activities%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20aria-setsize%3D%22-1%22%20data-leveltext%3D%22%251.%22%20data-font%3D%22%22%20data-listid%3D%221%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EBlock%20download%20-%20based%20on%20conditions%20including%20compliant%20device%20and%20partner%20access%20and%2C%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20aria-setsize%3D%22-1%22%20data-leveltext%3D%22%251.%22%20data-font%3D%22%22%20data-listid%3D%221%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ECustom%20policies%20%E2%80%93%20to%20limit%20actions%20such%20as%20download%20based%20on%20the%20sensitivity%20of%20data%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A0%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWe%20also%20announced%20the%20private%20preview%20of%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20signals%20integration%20into%20Identity%20Protection.%20This%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eintegrates%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3EMCAS%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erisk%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esignals%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewith%20Identity%20Protection%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eto%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Egive%20IT%20admins%20a%20more%20complete%20view%20of%20risk%20when%20they%20are%20investigating%20users%20and%20sign-ins.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETo%20learn%20more%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20about%20these%20advancements%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20please%20visit%20the%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FEnterprise-Mobility-Security%2FMicrosoft-Cloud-App-Security-RSAC-2019%2Fba-p%2F360860%22%20target%3D%22_self%22%3E%3CSPAN%3EMCAS%20RSA%20blog%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23000000%22%3EPublic%20preview%20of%20Azure%20Sentinel%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Sentinel%20is%20our%20new%20cloud-native%20solution%20that%20reimagines%20what%20a%20SIEM%20can%20provide%20for%20security%20analytics.%20Azure%20Sentinel%20aggregates%20security%20data%20across%20your%20enterprise%20to%20provide%20machine%20learning%20powered%20detection%20capabilities%2C%20hunting%20to%20preempt%20attacks%2C%20automation%20of%20threat%20response%2C%20and%20robust%20visualization.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EThe%20great%20news%20for%20the%20Identity%20community%20is%20that%20Azure%20AD%20integrates%20with%20Azure%20Sentinel%20out-of-the-box%2C%20providing%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ENative%20integration%20of%20Azure%20AD%20Identity%20Protection%2C%20Azure%20AD%20audit%20logs%2C%20and%20Azure%20AD%20sign-in%20logs%2C%20in%20addition%20to%20other%20Microsoft%20services%20and%20third-party%20data%20sources%20via%20API%20or%20agent%20with%20built-in%20dashboards%20for%20Azure%20AD%20sign-ins%20and%20audit%20logs%20to%20spot%20anomalies%20over%20time%3B%3C%2FLI%3E%0A%3CLI%3EConfigurable%20%3CSTRONG%3Eautomated%3C%2FSTRONG%3E%20%3CSTRONG%3Ethreat%20responses%20for%20identity%20risks%3C%2FSTRONG%3E%20using%20security%20playbooks%2C%20enabling%20IT%20admins%20to%20leverage%20Azure%20Log%20Apps%20to%20set%20pre-defined%20criteria%20to%20automatically%20respond%20to%20threats.%20For%20example%2C%20you%20can%20set%20an%20alert%20to%20be%20automatically%20sent%20to%20a%20Teams%20channel%20when%20a%20risky%20sign-in%20is%20detected%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EVisualization%3C%2FSTRONG%3E%20of%20events%20and%20alerts%20over%20time%20and%20potential%20malicious%20events%20(such%20as%20traffic%20from%20known%20malicious%20IP%20addresses)%2C%20giving%20IT%20admins%20an%20at%20a%20glance%20view%20at%20their%20security%20status%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3ETo%20learn%20more%2C%20go%20to%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fazuresentinel%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fazuresentinel%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3E%3CEM%3E2.%20Customers%20want%20to%20overcome%20the%20challenge%20of%20having%20multiple%20disconnected%20security%20solutions%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EOne%20of%20the%20big%20challenges%20in%20security%20today%20is%20that%20the%20sheer%20number%20of%20solutions%20in%20the%20typical%20enterprise%20IT%20environment.%20One%20customer%20I%20spoke%20to%20had%20over%2060%20security%20solutions%20(believe%20it%20or%20not%2C%20this%20is%20pretty%20common).%20They%20said%20that%20these%20solutions%20do%20not%20integrate%20well%20and%20talk%20to%20each%20other%20%E2%80%93%20gaps%20which%20open%20up%20security%20vulnerabilities%20of%20their%20own.%20Upgrades%20and%20maintenance%20of%20multiple%20solutions%20are%20expensive%20and%20present%20even%20more%20opportunities%20to%20expose%20vulnerabilities.%20Many%20of%20our%20customers%20are%20struggling%20to%20figure%20out%20how%20many%20of%20those%20solutions%20are%20really%20helping%20and%20looking%20to%20simplify%20their%20environments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20great%20industry%20standards%20like%20SCIM%202.0%2C%20Identity%20can%20be%20a%20powerful%20tool%20to%20integrate%20your%20controls%20%E2%80%93%20here%E2%80%99s%20an%20example%20of%20how%20we%20are%20working%20with%20our%20rich%20partner%20ecosystem%20to%20help%20secure%20identities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23000000%22%3E%3CSTRONG%3EAzure%20AD%20integration%20with%20Zscaler%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%E2%80%99m%20excited%20to%20announce%20our%20integration%20with%20Zscaler!%20With%20both%20Azure%20AD%20and%20Zscaler%20supporting%20the%20SCIM%202.0%20standard%2C%20you%20can%20use%20the%20Azure%20AD%20provisioning%20service%20to%20automate%20the%20lifecycle%20of%20user%20and%20group%20accounts%2C%20giving%20you%20a%20more%20secure%20and%20scalable%20way%20to%20allow%20user%20access%20to%20Zscaler%20applications.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%2C%20visit%20our%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FAutomated-user-provisioning-for-Zscaler-now-in-public-preview%2Fba-p%2F357184%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Eblog%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CEM%3E%3CSTRONG%3E3.%20Customers%20have%20an%20eye%20out%20for%20the%20next%20BIG%20thing%20in%20Identity!%20%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBetter%20security%3F%20Empowered%20users%3F%20Yes%20please!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EPassword-less%20Login%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20are%20continuing%20our%20drive%20to%20eliminate%20passwords%2C%20as%20captured%20in%20my%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FAzure-AD-Ignite-Recap-3-start-your-journey-to-password-less%2Fba-p%2F331439%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Elast%20blog%3C%2FA%3E%20on%20passwordless%20auth%20progress%20%E2%80%93%20and%20it%20seems%20y%E2%80%99all%20are%20watching%20every%20step%20of%20the%20way!%20I%20heard%20a%20ton%20of%20enthusiasm%20and%20eagerness%20for%20phone%20app%20sign%20in%2C%20and%20in%20an%20important%20step%20forward%20the%20WebAuthN%20part%20of%20FIDO2%20ratified%20on%20Monday%20%E2%80%93%20learn%20more%20about%20the%20FIDO2%20standard%20at%20the%20%3CA%20href%3D%22https%3A%2F%2Ffidoalliance.org%2Ffido2%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EFIDO%20site%3C%2FA%3E%2C%20and%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.w3.org%2FTR%2Fwebauthn-1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EW3C%20WebAuthN%20%3CEM%3Erecommendation%3C%2FEM%3E%3C%2FA%3E!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDecentralized%20Identity%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EI%20chatted%20with%20several%20identity%20leaders%20and%20influencers%20about%20the%20potential%20decentralized%20identity%20has%20to%20-%20as%20Pam%20and%20Preeti%20put%20it%20in%20their%20excellent%20talk%20Thursday%20morning%20-%20change%20the%20way%20we%20think%20about%20identity%20for%20decades%20to%20come!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20style%3D%22width%3A%20300px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F86145i5497BC3EAB58AD57%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22RSApost1.jpg%22%20title%3D%22RSApost1.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EPrivacy%2C%20empowerment%2C%20and%20agency%20are%20key%20aspects%20of%20a%20good%20identity%20system%2C%20and%20through%20Pam%20and%20Preeti%20the%20Identity%20team%20had%20the%20privilege%20of%20sharing%20the%20latest%20in%20Decentralized%20Identity%20thinking%20and%20mechanisms.%20As%20a%20distributed%20ledger%20without%20a%20central%20authority%2C%20Blockchain%20can%20be%20used%20to%20durably%20and%20transparently%20anchor%20trust%20for%20digital%20identities.%20The%20talk%20showed%20some%20great%20scenarios%20that%20bring%20the%20kind%20of%20empowerment%20your%20expect%20from%20your%20non-digital%20transactions%20into%20your%20digital%20life%20-%20agency%20over%20your%20identity%20which%20aims%20to%20keep%20you%20firmly%20in%20control%20of%20your%20own%20data%2C%20who%20gets%20to%20see%20it%2C%20and%20what%20they%20get%20to%20do%20with%20it.%20It%E2%80%99s%20an%20exciting%20peek%20into%20the%20future%20of%20digital%20identities%20and%20being%20able%20to%20use%20open%20standards%20and%20privacy-respecting%20tools%20for%20verifying%20claims%20and%20securing%20transactions.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F86146iC8B8DFEF1292AEB8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22RSApost2.jpg%22%20title%3D%22RSApost2.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESee%20more%20on%20what%20was%20presented%20in%20this%20session%20here%20-%20%3CA%20href%3D%22https%3A%2F%2Fpublished-prd.lanyonevents.com%2Fpublished%2Frsaus19%2FsessionsFiles%2F13674%2FIDY-R03-Decentralized-Identity-No-Promises-Edition.pdf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fpublished-prd.lanyonevents.com%2Fpublished%2Frsaus19%2FsessionsFiles%2F13674%2FIDY-R03-Decentralized-Identity-No-Promises-Edition.pdf%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELots%20of%20fun%20stuff%20for%20you%20to%20check%20out%20%E2%80%93%20stay%20safe!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-Alex%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-363057%22%20slang%3D%22en-US%22%3E%3CP%3ERSA%20is%20one%20of%20the%20pre-eminent%20security%20conferences%2C%20and%20I%20always%20love%20walking%20the%20(seemingly%20ever-expanding)%20show%20floor%20to%20see%20the%20great%20stuff%20the%20industry%20is%20coming%20up%20with%2C%20talking%20strategy%20with%20analysts%2C%20and%20hearing%20from%20the%20many%20amazing%20CISOs%20who%20are%20holding%20the%20fort%20for%20their%20companies.%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-363057%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-364024%22%20slang%3D%22en-US%22%3ERe%3A%20This%20week%20at%20RSA%20-%20event%20summary%20and%20key%20takeaways%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-364024%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20there%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F15060%22%20target%3D%22_blank%22%3E%40Alexey%20Goncharov%3C%2FA%3E%20-%20I%20waited%20a%20few%20days%20to%20answer%20to%20give%20RSA%20time%20to%20post%2C%20but%20I%20still%20don't%20see%20any%20video%20links%20to%20the%20talk.%20I%20also%20don't%20recall%20seeing%20any%20cameras%20in%20the%20room%20%3A(%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-363415%22%20slang%3D%22en-US%22%3ERe%3A%20This%20week%20at%20RSA%20-%20event%20summary%20and%20key%20takeaways%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-363415%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F221690%22%20target%3D%22_blank%22%3E%40Alex%20Weinert%3C%2FA%3E%2C%20Thanks%20for%20the%20post.%20I'm%20curious%20has%20the%20%22Decentralized%20Identity%22%20session%20been%20recorded%2C%20is%20it%20possible%20to%20get%20access%20to%20it%20to%20watch%20it%20offline%3F%3C%2FLINGO-BODY%3E
Microsoft

Hey there! 

 

I spent the week at RSA with an incredible group of customers, industry partners, and lots of great people from the Microsoft security and identity teams. RSA is one of the pre-eminent security conferences, and I always love walking the (seemingly ever-expanding) show floor to see the great stuff the industry is coming up with, talking strategy with analysts, and hearing from the many amazing CISOs who are holding the fort for their companies. 

 

It was a great week for the Identity team we all had a chance to interact with present and prospective customers and partners. Here are some of my take-aways from the event:  

 

1 . Zero Trust is top-of-mind for security professionals! 

Microsoft’s Identity Security and Protection team builds the tech that intercepts and disrupts almost 400M criminal login attempts dailyaround 12 billion a month, up more than an order of magnitude from a few years ago! At RSA, I had a chance to meet with fellow defenders responsible for fighting this rising tide for their own organizations. Back in December, I had blogged about Identity’s pivotal role in Zero Trust. At RSA, I had a chance to carry forward that discussion. It was great hearing from customers who had eliminated their traditional network and VPN approach and embraced digital transformation, and were using all the signals and control points from endpoints, authentication, and apps to massively enhance security *and* productivity in their organizations. Great security extends the horizon of productivity. 

 

We also had a blast presenting some of the latest strides we’ve made in this space. We’re giving you more and more tools to manage security in your transformation - Read on! 

 

A unified security operations portal across your hybrid identities 

 

At Ignite we announced work we are doing to help identity and security professionals integrate Azure AD Identity Protection’s cloud auth signals and Azure ATP’s view of on prem risks. This is key to identify and mitigate risks from targeted identities and detect and arrest lateral movement within your on-premises infrastructure. At RSA, we were psyched to announce the preview of even more cool capabilities 

 

  1. A unified SecOps portal that brings together identity security signals from across the Microsoft 365 suite with the aim of consolidating user insights into a single pane of glass – check out https://aka.ms/unifiedsecops to learn more! 
  2. An investigation priority score that helps you prioritize your remediation backlog by providing you with visibility into users that could pose the greatest risk to your organization should they be compromised. To get started, visit https://aka.ms/investigationpriority now! 

 

More powerful CASB powered in-session controls in Azure AD conditional access and signals in Azure AD Identity Protection 

 

Azure AD Conditional Access is a great tool for determining the conditions in which sessions will be granted and controlling behavior of the session itself. One great example of this is using Azure AD Conditional Access to require Microsoft Cloud App Security. In order to help conditional access admins to make the most out of the session controls that Microsoft Cloud App Security enables within Azure AD, we’ve added the ability to configure Microsoft Cloud App Security session policies directly in Azure AD conditional access including:  

  1. Monitor only - where sessions will be monitored for in-session activities
  2. Block download - based on conditions including compliant device and partner access and,
  3. Custom policies – to limit actions such as download based on the sensitivity of data 

We also announced the private preview of Microsoft Cloud App Security (MCAS) signals integration into Identity Protection. This integrates MCAS risk signals with Identity Protection to give IT admins a more complete view of risk when they are investigating users and sign-ins. 

 

To learn more about these advancements, please visit the MCAS RSA blog 

 

Public preview of Azure Sentinel

 

Azure Sentinel is our new cloud-native solution that reimagines what a SIEM can provide for security analytics. Azure Sentinel aggregates security data across your enterprise to provide machine learning powered detection capabilities, hunting to preempt attacks, automation of threat response, and robust visualization.

The great news for the Identity community is that Azure AD integrates with Azure Sentinel out-of-the-box, providing:

  1. Native integration of Azure AD Identity Protection, Azure AD audit logs, and Azure AD sign-in logs, in addition to other Microsoft services and third-party data sources via API or agent with built-in dashboards for Azure AD sign-ins and audit logs to spot anomalies over time;
  2. Configurable automated threat responses for identity risks using security playbooks, enabling IT admins to leverage Azure Log Apps to set pre-defined criteria to automatically respond to threats. For example, you can set an alert to be automatically sent to a Teams channel when a risky sign-in is detected
  3. Visualization of events and alerts over time and potential malicious events (such as traffic from known malicious IP addresses), giving IT admins an at a glance view at their security status

To learn more, go to https://aka.ms/azuresentinel

 

2. Customers want to overcome the challenge of having multiple disconnected security solutions

One of the big challenges in security today is that the sheer number of solutions in the typical enterprise IT environment. One customer I spoke to had over 60 security solutions (believe it or not, this is pretty common). They said that these solutions do not integrate well and talk to each other – gaps which open up security vulnerabilities of their own. Upgrades and maintenance of multiple solutions are expensive and present even more opportunities to expose vulnerabilities. Many of our customers are struggling to figure out how many of those solutions are really helping and looking to simplify their environments.

 

Using great industry standards like SCIM 2.0, Identity can be a powerful tool to integrate your controls – here’s an example of how we are working with our rich partner ecosystem to help secure identities.

 

Azure AD integration with Zscaler

 

I’m excited to announce our integration with Zscaler! With both Azure AD and Zscaler supporting the SCIM 2.0 standard, you can use the Azure AD provisioning service to automate the lifecycle of user and group accounts, giving you a more secure and scalable way to allow user access to Zscaler applications.

 

To learn more, visit our blog.

 

3. Customers have an eye out for the next BIG thing in Identity!

 

Better security? Empowered users? Yes please!

 

Password-less Login

We are continuing our drive to eliminate passwords, as captured in my last blog on passwordless auth progress – and it seems y’all are watching every step of the way! I heard a ton of enthusiasm and eagerness for phone app sign in, and in an important step forward the WebAuthN part of FIDO2 ratified on Monday – learn more about the FIDO2 standard at the FIDO site, and check out the W3C WebAuthN recommendation!

 

Decentralized Identity

I chatted with several identity leaders and influencers about the potential decentralized identity has to - as Pam and Preeti put it in their excellent talk Thursday morning - change the way we think about identity for decades to come!

 

RSApost1.jpg

Privacy, empowerment, and agency are key aspects of a good identity system, and through Pam and Preeti the Identity team had the privilege of sharing the latest in Decentralized Identity thinking and mechanisms. As a distributed ledger without a central authority, Blockchain can be used to durably and transparently anchor trust for digital identities. The talk showed some great scenarios that bring the kind of empowerment your expect from your non-digital transactions into your digital life - agency over your identity which aims to keep you firmly in control of your own data, who gets to see it, and what they get to do with it. It’s an exciting peek into the future of digital identities and being able to use open standards and privacy-respecting tools for verifying claims and securing transactions.

RSApost2.jpg

 

See more on what was presented in this session here - https://published-prd.lanyonevents.com/published/rsaus19/sessionsFiles/13674/IDY-R03-Decentralized-I...

 

Lots of fun stuff for you to check out – stay safe!

 

-Alex

2 Comments
Occasional Contributor
@Alex Weinert, Thanks for the post. I'm curious has the "Decentralized Identity" session been recorded, is it possible to get access to it to watch it offline?
Microsoft

Hey there @Alexey Goncharov - I waited a few days to answer to give RSA time to post, but I still don't see any video links to the talk. I also don't recall seeing any cameras in the room :(