Mar 08 2021
- last edited on
May 24 2021
In the Microsoft Cloud App Security and Power BI teams (two of the named leaders in the Cloud Access Security Broker (CASB), and Analytics and BI markets, respectively), we have identified an opportunity to provide an even more comprehensive solution. By bringing these two technologies together, we provide security administrators the tools they need to safely onboard business users to a large cloud workload such as Power BI (which has become an even greater key service for businesses in “work-from-home” mode during the COVID-19 crisis), while enjoying peace of mind with respect to the threats and risks inherent in using cloud services.
Check it out at http://aka.ms/mcasninja!
We figured out that watching short videos is sometimes the best way and use of our customers time to learn about our products and innovations... So... we created a video series!
In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization. We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.
After a customer has connected Microsoft Defender for Identity to Microsoft 365 Defender one of the benefits is the ability to query the Defender for Identity activities. In this blog we showcase two customer use cases that took advantage of the Advanced Hunting functionality available today.
Follow these step by step guides to help you get started in configuring Teams DLP, Endpoint DLP and Insider Risk in your organization!
We have some exciting news to share about our Microsoft Cloud App Security documentation updates. Last year, we released the ability to deploy Real Time Controls using any identity provider (IdP). After receiving initial feedback from our customers and the field, the top three most requested IdPs were PingOne, Okta, and AD FS. The configuration can be tricky. We thought publishing an example for each IdP would be useful for our users. We are happy to announce that all three guides are now LIVE!
This blog lists key admin components that will be deprecated and describes how this impacts the admin.
This blog gives an end-to-end use case example on how a GCC-H admin can migrate their parent label and sublabel with its corresponding protection template from the AIP Portal to the Security and Compliance Center. Additional information about label migration can be found in our official documentation.
We have developed a 4-phased approach to 1) Enable, 2) Empower, 3) Differentiate, and 4) Transform your journey to Microsoft Teams leveraging Microsoft 365 security and compliance tools.