Welcome everyone! My name is James Key and I’ll be your guide as we take a journey through the possibilities of holistic cloud protection with the Microsoft 365 security stack. I am a Premier Field Engineer at Microsoft who specializes in Microsoft 365 security and compliance. During my four years I have been blessed to work for an amazing organization and alongside a stellar group of colleagues. My passion is security and compliance, so I joke constantly about having the best job in the world where I get paid to have fun each day. Security at each organization is a unique puzzle where you have different technologies, infrastructure, people and processes that make implementing security like trying to solve a Rubik Cube.
As organizations continue to migrate to the cloud it is imperative that everyone understand how to provide modern security against constantly evolving threats. Data stored in the cloud has become one of the most important assets of an organization and protecting it is key. Malicious threats can come from many different sources and having a holistic approach will increase your overall security posture.
During this six-part blog series, we will take a journey around how to protect your organization using the Microsoft 365 security stack as we deep dive into the four pillars of security, each with their own separate article.
The goal of this series is to provide a comprehensive security overview and show how the integration of security features within the Microsoft 365 security stack provide holistic security within the Microsoft eco-system and when interacting with third party solutions. The four pillars that we will discuss are:
Identity (Click here for Part II of series):
Your identity is how you are uniquely identified in your organization and ultimately how you authenticate to access your organization’s data. An identity could be a member within your organization or a guest like a contractor/vendor. During the second article in this blog series we will focus on identity security and review the below topics:
Devices: (Click here for Part III of the series)
Your device is where you access your application and your data. Whether this is a corporate-owned device or a personal device; there must be security in place to protect what is on that device. During the third article in this blog series we will focus on device security and review the below topics:
Apps: (Click here for Part IV of the series)
Your applications are where you interact with data. This can be through platforms like Windows, Mac, iOS or Android devices while using applications like Office ProPlus or Microsoft Edge browser. During the fourth article in this blog series we will focus on application security and review the below areas:
Data: (Click here for Part V of the series)
Your data is where you may have sensitive information related to individuals at your organization, confidential proprietary processes, or information related to your customers. This data may be stored in the Office 365 cloud, on devices or shared with external users through third-party solutions. During the fifth article in this blog series we will focus on data security and review the below areas:
After taking a deep dive into each of the four pillars of security, there will be a sixth conclusion article that showcases the integration of the Microsoft 365 security stack and how it provides increased security posture for both the Microsoft eco-system and when working with third-party solutions.
With that said, please ensure your seat belt is fastened tightly and get ready for an exciting journey into the holistic approach to cloud protection with the Microsoft 365 security stack!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.