Microsoft - Nov 23, 2021
Microsoft Ignite 2021 - Part I: Security.

by Michael Stachowski

At the beginning of November, it was that time again: Microsoft Ignite. In case you aren't familiar with the format, Ignite is an annual technology convention where the vendor present new products and existing products' new features. This year, Microsoft presented more than 90 new services and updates including for its Azure cloud platform, enterprise software Dynamics 365, collaboration solution Microsoft Teams, and productivity suite Microsoft 365.

written by

Michael Stachowski
Business Development Manager

E-Mail: michael.stachowski@bechtle.com

In a three-part series, my colleague Florian Vees and I will introduce the key updates to modern working, Azure, and security-starting with a topic that's on everyone's lips more than ever: Security!

Defender for Cloud.

Microsoft kicked off in this sector with some exciting news: Microsoft Defender for Cloud provides support for multi-cloud environments. Defender for Cloud was previously simply a combination of Azure Security Center and Azure Defender, and as the names suggests, was purely designed to secure Azure environments. In accordance with the new name, Microsoft has expanded protection to cover all cloud vendors, meaning that AWS customers, for example, can expect the same level of protection they know from the Azure world.

More information: Microsoft Defender for Cloud - an introduction.

Microsoft Defender for Endpoint Plan 1.

Onto the next piece of news. If you use Microsoft 365 E3, you'll probably know this common problem: All Windows 10 and Windows 11 devices are protected by Microsoft Defender but there is no way to manage it from a management console. Microsoft has listened to community feedback and tweaked it so that the Defender can be managed via the Defender Security Center.

If you want to find out about the differences between Defender for Endpoint Plan 1 and 2, see here for more information: Compare Microsoft Defender for Endpoint Plan 1 to Plan 2.

Vulnerability Management for Android and iOS Devices.

Previously, Microsoft Defender for Endpoint iOS and Android apps were only equipped with rudimentary features, making it even more gratifying that the updates ensure vulnerability management in both systems. For Android, the new features support both operating system and Android-based in-app vulnerabilities. OS-based vulnerabilities are covered for iOS devices.

Microsoft Endpoint Data Loss Protection and Insider Risk Management for macOS in Preview.

Microsoft Endpoint Data Loss Protection (DLP) and Microsoft Insider Risk Management are now available on the macOS as previews. With DLP, customers can identify sensitive content such as medical documents or intellectual property in files and documents and implement DLP guidelines to prevent unauthorised sharing and use. Data outflow is a very high risk for companies nowadays. Insider Risk Management enables companies to define additional guidelines to detect and defend against indicators for high-risk user behaviour and unauthorised or malicious user data activity.

For more information: Drive efficiency and accelerate time to action in managing insider risks - Microsoft Tech Community

Microsoft Defender for Business coming soon to Preview.

Microsoft Defender for Business is the new endpoint security solution, initially as a preview and planned for companies with up to 300 employees. The solution helps protect against complex cyber-attacks. It's specially developed for SMEs (Bechtle was actually one of the instigators in close contact with the development group) and targets security threats-including malware and ransomware for Windows, macOS, iOS, and Android devices. Microsoft Defender for Business is available both as a stand-alone product and as part of Microsoft 365 Business Premium.

For more information:Introducing Microsoft Defender for Business.

Share article

Published on Nov 23, 2021.
19Nov
Information Security Management Systems - A key topic.
Information security and IT security - They're essentially the same thing, right? Think again. Although both terms are often used interchangeably, there is a wealth of difference between them. IT security describes primarily the handling of technical systems, i.e. hardware and software. Information security on the other hand denotes the entire company including staff, processes and even the building's architecture, which demonstrates quite clearly that information security is a key topic and it affects every single employee. An Information Security Management System (ISMS) can help to keep an overview of these complicated factors and their interplay.
Read
09Nov
Sustainability starts with design - How HP develops resource-saving products.
Businessmen have always said that purchasing is the key to profits, but this idea falls short in today's world as surveys are increasingly showing that companies and consumers are less likely to to be motivated to make a purchase just because the price is low. Instead, sustainability is growing in importance, with consumers wanting to know how a product was manufactured, how transparent the supply chain is, what working conditions are like at production facilities, and how CO2-neutral the production process is. Modern companies think ahead, always have an eye on the big picture and face up to their sustainability responsibilities.
Read
21Oct
Prime your network for the future with SASE and SD-WAN.
The demands placed on data centres are on the rise, as are threats to corporate security. Companies need a software-based and secure wide-area network-and hence a radical rethink of their network concepts, with SASE and SD-WAN at the core.
Read
21Oct
Whaling - Phishing attacks on upper management.
Whaling is always good for controversy. In this instance, however, the whales in question aren't the aquatic marine mammals, but upper-level managers. Whaling is the name given to a specific form of phishing targeting high-profile end users. We'll be looking at how cybercriminals can cause extensive damage through whaling, how these attacks tend to unfold, and what businesses can do to protect themselves.
Read
14Oct
Five Questions for Sonja Saß, IT forensics specialist at Bechtle
Sonja Saß has been working as an IT forensics specialist at the IT system house in Chemnitz for two and a half years. Born in Hamburg, she developed an interest in forensics at an early age. She first learned to apply the whole thing in the digital environment during her studies. In this interview, Sonja gives us an insight into her increasingly important job and tells us which skills are indispensable for it.
Read
05Oct
Email security at schools and universities - With Trend Micro solutions.
Teachers and lecturers alike write and receive countless e-mails per day, and this means of communication constitutes a large amount of document exchange. Homework is sent to teachers or presentations by students to the professor for review. Cyber criminals regularly attack the e-mail systems of educational facilities, as these are often high-performance and their users generate a lot of mail. Another point is that these systems depend on powerful network connections and that very often free mail server systems are used.
Read
23Sep
Erneuerung & Wandel - Microsoft stellt neue Surface Hardware vor.
This page is currently not available in the selected language.
Read
21Sep
Cybersecurity-Know-how für Geschäftsführende. Teil 4.2: Cybersecurity als Business Enabler im Bereich Operational Technology (OT).
This page is currently not available in the selected language.
Read
13Sep
MFA/2FA/OTP - Secure authentication in the age of the cloud.
Employees' identities have become the top risk factor and one thing is clear-the coronavirus pandemic has significantly increased the attack surface for cyberattacks and many businesses' IT departments are facing an uphill battle. One risk that has been pushed back into the spotlight thanks to the trend towards working from home, is the wide-spread use of weak passwords.
Read
07Sep
Cybersecurity expertise for managing directors. Part 4.1 - Strategic cybersecurity.
The majority of the time, cybersecurity is considered a necessary evil that soaks up money. However, when properly understood and leveraged, cybersecurity can give businesses a real competitive edge. Management need to completely rethink their attitude to cybersecurity so that the opportunities it presents are in the foreground. By looking at it from a different perspective, new possibilities for the strategic development of your own business to make it fit for the future emerge. Are you ready for strategic cybersecurity?
Read
More posts

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Bechtle AG published this content on 23 November 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 23 November 2021 14:49:02 UTC.