Skip Navigation LinksMichael Noel - Combatting Cyberthreats with Microsoft Defender 365

Predavanje

Combatting Cyberthreats with Microsoft Defender 365

, Level: 300 Cloud; Security

The dramatic rise in the number and severity of cyber-threats faced by organizations today has led to a proliferation of countermeasure IT security tool-sets. In many cases, these security tools operate independently from each other and can lead to siloed alerting and monitoring making it difficult for IT staff to effectively identify threats and mitigate them before they become major issues.

Microsoft Defender 365 suite of cloud security tools consolidates multiple security tool-sets under a single management interface and provides for end-to-end security, allowing administrators to quickly identify and contain threats. Rather than constantly being on the defensive, Defender 365 provides for the ability to proactively hunt for vulnerabilities and potential bad actors while they are still making lateral moves within your environment, allowing IT cybersecurity the ability to stay one step ahead of increasingly sophisticated hackers.

This session takes an in-depth look at the tools that are part of the Microsoft Defender 365 suite, including Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft Defender for Identity and more. Discover how to better control, audit, and manage your organization’s data in both the cloud and on-premises infrastructure.

• Explore the various tool-sets and capabilities built into Microsoft 365 Defender, including Cloud Access Security Broker (CASB) functionality, endpoint threat detection and management, and sophisticated on-premises real-time threat prevention tools.
• Examine how real-time threats can overwhelm more traditional threat management systems and how an intuitive ‘single pane of glass’ view of threat detection and management can greatly improve the odds of stopping sophisticated cyber-attacks.
• Understand how Microsoft licensing for Microsoft Defender 365 is structured and how you can take advantage of these security tools for little or even no cost in some scenarios.

 
 
Michael Noel