Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Credit to Author: Todd VanderArk| Date: Tue, 03 Dec 2019 17:00:21 +0000

Gartner has named Microsoft Security a Leader in five Magic Quadrants, which demonstrates balanced progress and effort in all execution and vision categories.

The post Microsoft Security—a Leader in 5 Gartner Magic Quadrants appeared first on Microsoft Security.

Read more

Zero Trust strategy—what good looks like

Credit to Author: Todd VanderArk| Date: Mon, 11 Nov 2019 17:00:11 +0000

Zero Trust is a model that will ultimately be infused throughout your enterprise and should inform virtually all access decisions and interactions between systems.

The post Zero Trust strategy—what good looks like appeared first on Microsoft Security.

Read more

Preparing your enterprise to eliminate passwords

Credit to Author: Todd VanderArk| Date: Thu, 11 Jul 2019 22:00:16 +0000

If you’re a CIO, a CISO, or any other exec at a company who is thinking about digital security, the user name/password paradigm is more than a hassle, it’s a true security challenge, which keeps many of us up at night. Today, I’m outlining the basic steps necessary to eliminate passwords, with the acknowledgement that we’re still on the journey. I believe we’ve mapped out the right path, but we aren’t finished yet.

The post Preparing your enterprise to eliminate passwords appeared first on Microsoft Security.

Read more

5 principles driving a customer-obsessed identity strategy at Microsoft

Credit to Author: Todd VanderArk| Date: Mon, 24 Jun 2019 16:00:52 +0000

The cloud era has fundamentally changed the way businesses must think about security and identity. Learn the five principles driving the customer-obsessed identity strategy at Microsoft.

The post 5 principles driving a customer-obsessed identity strategy at Microsoft appeared first on Microsoft Security.

Read more

Decentralized identity and the path to digital privacy

Credit to Author: Todd VanderArk| Date: Wed, 15 May 2019 13:00:30 +0000

Security is the central challenge of the digital age. Our digital lives have moved into the cloud. People now use multiple devices to connect to multiple applications through many different networks. Just about everything is connected to the internet, where threats remain constant and evolving. In this distributed, heterogeneous environment, however, there’s still only one “you.” That’s why decentralized identity is the best path to security.

The post Decentralized identity and the path to digital privacy appeared first on Microsoft Security.

Read more