{"id":15691,"date":"2019-07-02T08:00:34","date_gmt":"2019-07-02T16:00:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/02\/news-9439\/"},"modified":"2019-07-02T08:00:34","modified_gmt":"2019-07-02T16:00:34","slug":"news-9439","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/02\/news-9439\/","title":{"rendered":"Microsoft\u2019s Threat &#038; Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time"},"content":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Tue, 02 Jul 2019 16:00:13 +0000<\/strong><\/p>\n<p>I&#8217;m excited to announce that Microsoft\u2019s Threat &amp; Vulnerability Management solution is generally available as of June 28! We have been working closely with customers for more than a year to incorporate their real needs and feedback to better address vulnerability management. Our goal is to empower defenders with the tools they need to better protect against evolving threats, and we believe this solution will help provide that additional visibility and agility they need.<\/p>\n<p>Threat &amp; Vulnerability Management (TVM) is a built-in capability in Microsoft Defender Advanced Threat Protection (ATP) that uses a risk-based approach to discover, prioritize, and remediate endpoint vulnerabilities and misconfigurations. With Microsoft Defender ATP\u2019s Threat &amp; Vulnerability Management, customers benefit from:<\/p>\n<ul>\n<li>Continuous discovery of vulnerabilities and misconfigurations<\/li>\n<li>Prioritization based on business context and dynamic threat landscape<\/li>\n<li>Correlation of vulnerabilities with endpoint detection and response (EDR) alerts to expose breach insights<\/li>\n<li>Machine-level vulnerability context during incident investigations<\/li>\n<li>Built-in remediation processes through unique integration with Microsoft Intune and Microsoft System Center Configuration Manager<\/li>\n<\/ul>\n<p>Traditional vulnerability scanning only happens periodically, leaving organizations with security blind spots between scans. The one-size-fits-all approach that these traditional solutions use ignores critical business-specific context, as well as the dynamic threat landscape. This is coupled with the fact that mitigation of vulnerabilities is a manual process, often across teams, that can take days, weeks, or months to complete. This leaves a window of opportunity for attackers and puts our defenders in a tough spot.<\/p>\n<p>To address these challenges Microsoft partnered with a dozen enterprise customers on the design and creation of this new Threat &amp; Vulnerability Management solution. One of them is Telit, a global leader in IoT enablement offering end-to-end IoT solutions, including enterprise-grade hardware, connectivity, platform, and consulting services. Telit already had a well-defined vulnerability management program in place, but said they were missing several critical capabilities, including visibility, prioritization, and remediation.<\/p>\n<p>Our design partners play a key role throughout the entire process, from planning and building to operationalizing and maturing the product so we can deliver the best experience. Many of our customers have existing vulnerability management programs, so we knew that to have them switch to Microsoft we would need a disruptive approach to vulnerability management. From private preview to general availability and beyond, our key goals were to bridge the gap between Security and IT roles in threat protection, to reduce time to threat resolution while enabling real-time prioritization and risk reduction based on the evolving threat landscape and business context. The team continues to incorporate feedback from customers and partners, adding these new capabilities on a monthly basis.<\/p>\n<div class=\"fluid-iframe\" style=\"\">\n<div class=\"wds-base64-el\" data-tag=\"CQk8aWZyYW1lIGlkPSJwYmllbWJlZCIgc3JjPSdodHRwczovL3d3dy5taWNyb3NvZnQuY29tL2VuLXVzL3ZpZGVvcGxheWVyL2VtYmVkL1JFM2hJZUonPjwvaWZyYW1lPg==\"><\/div>\n<\/p><\/div>\n<h4 style=\"text-align: center;\"><em>\u201cTelit\u2019s previous threat and vulnerability solutions were limited to on-premises connected endpoints. Moving to Microsoft\u2019s TVM cloud-based solution provides us much better visibility into roaming endpoints with a continuous assessment, especially when our endpoints are connected to untrusted networks.\u201d<br \/> &#8212; Itzik Menashe, VP of IT &amp; Information Security, Telit<\/em><\/h4>\n<p style=\"text-align: left;\">Working together with Telit, we quickly understood that the current prioritization norm is not enough to properly reduce risk in an organization. We consulted with our partners on a new risk-based approach, which is focused on continuous discovery of vulnerabilities and misconfigurations and correlated those insights with context specific to their business and the dynamic threat landscape.<\/p>\n<p style=\"text-align: left;\">Microsoft\u2019s built-in, end-to-end remediation process helps Telit bridge the gap between their security and operations teams. The unique integration with Microsoft Intune allows their security team to create remediation requests with a click of a button, and the operations team receives the requests automatically with all relevant information and can start the remediation process right away. The security team can then watch their exposure score drop in real time as remediation progresses.<\/p>\n<h4 style=\"text-align: center;\"><em>\u201cMicrosoft\u2019s TVM provides Telit with an easy-to-use solution that incorporates strong discovery capabilities, a risk-based approach to prioritization, and an effective remediation process. With this solution we are able to cover a large number of endpoints using a very small team of security engineers.\u201d<br \/> &#8212; Mor Asher, Global IT and Information Security Manager, Telit<\/em><\/h4>\n<p style=\"text-align: left;\">The product experience and ease of implementation was a big driver for Telit and thousands of <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/728222-kellergroup-enterpriseandsecurity-uk\">other active customers<\/a> to start using Microsoft Defender ATP Threat &amp; Vulnerability Management. Telit had Microsoft Defender ATP\u2019s TVM up and running within seconds.<\/p>\n<div class=\"fluid-iframe\" style=\"\">\n<div class=\"wds-base64-el\" data-tag=\"CQk8aWZyYW1lIGlkPSJwYmllbWJlZCIgc3JjPSdodHRwczovL3d3dy5taWNyb3NvZnQuY29tL2VuLXVzL3ZpZGVvcGxheWVyL2VtYmVkL1JFM2hWaEEnPjwvaWZyYW1lPg==\"><\/div>\n<\/p><\/div>\n<p style=\"text-align: left;\">To learn more about threat and vulnerability management watch our video that walks you through the experience.<\/p>\n<p style=\"text-align: left;\">If you already have Microsoft Defender ATP, the TVM solution is <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/next-gen-threat-and-vuln-mgt\">now available<\/a> within your ATP portal. If you would like to sign up for a trial of Microsoft Defender ATP including TVM, <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/windows\/microsoft-defender-atp\">sign up here<\/a>.<\/p>\n<p style=\"text-align: left;\">We\u2019re excited for our customers to evaluate this new solution and are looking forward to continued feedback.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/02\/microsofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time\/\">Microsoft\u2019s Threat &#038; Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/02\/microsofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Tue, 02 Jul 2019 16:00:13 +0000<\/strong><\/p>\n<p>I&#8217;m excited to announce that Microsoft\u2019s Threat &#38; Vulnerability Management solution is generally available as of June 28! We have been working closely with customers for more than a year to incorporate their real needs and feedback to better address vulnerability management. Our goal is to empower defenders with the tools they need to better&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/02\/microsofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time\/\">Microsoft\u2019s Threat &#038; Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,21482,21484,17187,21486,21483,22164,21496],"class_list":["post-15691","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-endpoint-security","tag-microsoft-defender-atp","tag-security-intelligence","tag-threat-and-vulnerability-management","tag-threat-protection","tag-tvm","tag-windows-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15691"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15691\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15691"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}