New Blog Post | Threat and Vulnerability Management now supports all major platforms

%3CLINGO-SUB%20id%3D%22lingo-sub-2348771%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Threat%20and%20Vulnerability%20Management%20now%20supports%20all%20major%20platforms%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2348771%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1620833342040.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F280276i0D9CF1F347948662%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1620833342040.jpeg%22%20alt%3D%22JasonCohen1892_0-1620833342040.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F05%2F11%2Fthreat-and-vulnerability-management-now-supports-all-major-platforms%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EThreat%20and%20Vulnerability%20Management%20now%20supports%20all%20major%20platforms%20-%20Microsoft%20Security%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fthreat-vulnerability-management%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%E2%80%99s%20Threat%20and%20Vulnerability%20Management%3C%2FA%3E%3CSPAN%3E%26nbsp%3B(TVM)%20capabilities%20play%20a%20crucial%20role%20in%20monitoring%20an%20organization%E2%80%99s%20overall%20security%20posture%2C%20with%20devices%20being%20a%20key%20entry%20point%20for%20compromise%20if%20left%20exposed.%20It%20equips%20customers%20with%20real-time%20insights%20into%20risk%20with%20continuous%20vulnerability%20discovery%2C%20intelligent%20prioritization%20that%20takes%20business%20and%20threat%20context%20into%20account%2C%20and%20the%20ability%20to%20seamlessly%20remediate%20vulnerabilities%20with%20a%20single%20click.%20The%20recent%20%26nbsp%3BNobelium%20attack%20is%20only%20one%20example%20of%20a%20critical%20vulnerability%2C%20where%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F01%2F14%2Fincreasing-resilience-against-solorigate-and-other-sophisticated-attacks-with-microsoft-defender%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETVM%20enabled%20customers%20to%20identify%20affected%20devices%20in%20their%20environment%20and%20take%20immediate%20action%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2348771%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1620833342040.jpeg

Threat and Vulnerability Management now supports all major platforms - Microsoft Security

Microsoft’s Threat and Vulnerability Management (TVM) capabilities play a crucial role in monitoring an organization’s overall security posture, with devices being a key entry point for compromise if left exposed. It equips customers with real-time insights into risk with continuous vulnerability discovery, intelligent prioritization that takes business and threat context into account, and the ability to seamlessly remediate vulnerabilities with a single click. The recent  Nobelium attack is only one example of a critical vulnerability, where TVM enabled customers to identify affected devices in their environment and take immediate action.

0 Replies