Today I am excited to tell you that Microsoft Advanced Threat Analytics (ATA) is generally available.
In our last blog post , Idan shared his thoughts about why we need a new approach for identifying cyber-security incidents, and how Microsoft ATA is designed to help you detect suspicious user and entity activities, known malicious attacks and security issues. He also provided information about the network topology and listed all the new capabilities we added for general availability.
Idan's team has spent a ton of design and development time to make sure ATA has a simple, straightforward and fast deployment process. This video shows you just how easy it's to deploy ATA in your environment and provides you step-by-step guidance:GA evaluation bits and implement ATA in your organization. We have a discussion forum where you can post your questions and feedback. We will respond to you as quickly as possible. If you are interested in the latest updates or improvements, you should make sure to follow Idan on Twitter: @IdanPlotnik . You can also email him questions or feedback directly , or send your feedback directly to the group . Going forward, we will post updates and releases about Advanced Threat Analytics at the dedicated ATA blog . We know how much pain cyber-security attacks are causing you. As a team, our goal is to innovate and help you protect your organization from these advanced attacks. And as always, we're looking forward to receiving any feedback or suggestions you have. Best regards,
Alex Simons (Twitter: @Alex_A_Simons )
Director of Program Management
Microsoft Identity and Security Services Division
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.