{"id":23109,"date":"2023-10-11T12:01:00","date_gmt":"2023-10-11T20:01:00","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/11\/news-16839\/"},"modified":"2023-10-11T12:01:00","modified_gmt":"2023-10-11T20:01:00","slug":"news-16839","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/11\/news-16839\/","title":{"rendered":"Expanded Microsoft Security Experts offerings provide comprehensive protection"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Security Experts and Rani Lofstrom| Date: Mon, 09 Oct 2023 16:00:00 +0000<\/strong><\/p>\n<p>Since we first introduced <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\">Microsoft Security Experts<\/a> in May 2022, we\u2019ve worked hard to expand our new security services category. In the past 16 months, we\u2019ve launched new services, expanded our capabilities, and introduced new ways to buy. Our customers face an unprecedented number of security threats that introduce risk to the business. Also, our customers are facing a cybersecurity talent shortage; there is still a need for more than 3.4 million security professionals.<sup>1<\/sup> Combined with increasing international conflicts and an accelerating cyber arms race, the risk of cyberattacks has never been greater.<sup>2<\/sup><\/p>\n<p>At Microsoft, we aim to help our customers meet the range of today\u2019s security demands\u2014together. In this environment, it is not a surprise that organizations are looking to do more with less and turning to managed security services to help their security teams. <\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Security Experts<\/h2>\n<div class=\"mb-3\">\n<p>Extend your ability to defend and manage with a comprehensive line of services from the experts at Microsoft.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/services\" class=\"btn btn-primary bg-body text-body\" > \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"Three security experts looking at a computer.\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">Microsoft Defender Experts for XDR<\/h2>\n<p>In preview last year, <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\/microsoft-defender-experts-xdr\">Microsoft Defender Experts for XDR<\/a><strong> <\/strong>is now<strong> <\/strong><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/10\/meet-unprecedented-security-challenges-by-leveraging-mxdr-services\/\">generally available<\/a>. This managed extended detection and response (MXDR) service helps customers alleviate some of their most pressing pain points, including alert fatigue, scarce cybersecurity resources, and a limited ability to look end-to-end\u2014beyond the endpoints\u2014to visualize and correlate threat data across their entire digital environment. For most companies, security isn\u2019t their core business. Defender Experts for XDR can help customers drive security operations center (SOC) efficiency and add security expertise to their team quickly, freeing up their time to work on other security priorities.<\/p>\n<p>Microsoft Defender Experts for XDR helps SOC teams focus on what matters, triaging and investigating prioritized incidents on your behalf. Our Defender Experts are available around the clock to chat about specific incidents or alerts, so your team can get immediate confirmation or clarification on a particular incident. Also, they provide detailed best practices and recommendations to help your team prevent future attacks and improve your overall security posture.<\/p>\n<p>To learn more about Defender Experts for XDR, read through <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/24\/microsoft-defender-experts-for-xdr-helps-triage-investigate-and-respond-to-cyberthreats\/\">our blog<\/a> that walks through how the service works or watch our <a href=\"https:\/\/www.youtube.com\/watch?v=4jblPNlhGpc\" target=\"_blank\" rel=\"noreferrer noopener\">explainer video<\/a> to see the service in action.<\/p>\n<h2 class=\"wp-block-heading\">Microsoft Defender Experts for Hunting<\/h2>\n<p>Microsoft Defender Experts for Hunting is generally available for customers who look to Microsoft to proactively hunt for threats across Microsoft Defender data\u2014including endpoints, email, cloud applications, and identity. <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\/microsoft-defender-experts-hunting\">Defender Experts for Hunting<\/a> combines human expertise and hunter-trained AI to probe deeper to expose threats and correlate across your security stack. Improve your SOC response and prioritize significant threats with timely notifications and analysis by our expert threat hunters. And if you have questions, you can contact our Experts on Demand directly within your Microsoft Defender portal.<\/p>\n<p>To learn more about how we approach active threat hunting, read through our <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5aC6y?culture=en-us&amp;country=us\">Threat Hunting Survival Guide<\/a>, or read about our participation in <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/09\/microsoft-defender-experts-for-hunting-demonstrates-industry-leading-protection-in-the-2022-mitre-engenuity-attck-evaluations-for-managed-services\/\">MITRE\u2019s first managed services evaluation<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Microsoft Incident Response<\/h2>\n<p>For customers that want help remediating a complex breach (or avoiding one altogether), <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">Microsoft Incident Response<\/a> (Microsoft IR) offers an end-to-end portfolio of proactive and reactive incident response services. We\u2019ve been helping customers with their toughest incident response challenges since 2008. And we created Microsoft IR to be the first call for customers before, during, and after an incident. We operate in 190 countries and our incident responders are seasoned veterans with more than a combined 1,000 years of career experience resolving attacks from ransomware criminals to the most sophisticated nation-state threat actor groups.<\/p>\n<p><strong>Proactive services<\/strong> can help organizations identify and mitigate risks <a href=\"https:\/\/www.youtube.com\/watch?v=-JP-T4Iw1sU\" target=\"_blank\" rel=\"noreferrer noopener\">before they become incidents<\/a>. This includes services such as compromise assessments, threat hunting, and incident response planning. We know companies that put proactive measures in place detect breaches 108 days faster than those without support (214 days compared to 322 days).<sup>3<\/sup> <strong>Reactive services<\/strong> can help organizations <a href=\"https:\/\/youtu.be\/HwXY_vJ9-ek?feature=shared\" target=\"_blank\" rel=\"noreferrer noopener\">respond to a breach quickly and effectively<\/a> to mitigate damage. This includes services such as incident investigation, containment, and remediation.<\/p>\n<p>Since our last update, <strong>Microsoft Incident Response Retainer is now generally available<\/strong>. This new option is designed to give our customers a proactive way to get IR support from Microsoft and was designed to work with cyber insurance. The <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\">Microsoft IR Retainer<\/a> is a flexible and scalable service that can help organizations of all sizes prepare for and respond to cyber incidents. The retainer includes pre-paid hours that provide organizations with peace of mind knowing that they have the resources they need to respond to an incident, regardless of its size or complexity. And if reactive services are not needed, the pre-paid hours can be reallocated to proactive services that help shore up the organization&#8217;s security posture. The Microsoft Incident Response Retainer is a valuable tool for organizations of all sizes that want to be prepared for the unexpected. <\/p>\n<p>To learn more about all our Incident Response services\u2014including the newly available retainer\u2014visit our <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">Microsoft Incident Response webpage<\/a> or go behind the scenes for an inside look at real-life cyberattack investigations in <a href=\"https:\/\/go.microsoft.com\/fwlink\/p\/?linkid=2228766&amp;clcid=0x409&amp;culture=en-us&amp;country=us\">the Cyberattack Series<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Expert-led security transformation<\/h2>\n<p>Microsoft Security Enterprise Services (Enterprise Services), formerly known as Microsoft Security Services for Modernization, has restructured its offerings and is now more focused on helping customers meet modern security needs. These services are ideal for large enterprises that want to leverage Microsoft best practices and know-how as they continue their security transformation. Enterprise Services offers hands-on expertise and advisory services to assess and create your modern organizational cybersecurity strategy. These offerings provide planning and operations expertise to help you mitigate business risks and meet compliance requirements to ensure your business is future-ready. The services have recently been combined into two core expertise areas:<\/p>\n<p><strong>Security Cyber Resilience<\/strong>:<strong> <\/strong>End-to-end services to modernize and secure your digital estate including identities, data, applications, and devices across Microsoft Azure and multicloud environments. Microsoft Security Cyber Resilience helps safeguard your digital estate and create a transformation program of change, strategy, and operating models.<\/p>\n<p><strong>Security Operations<\/strong>:<strong> <\/strong>Secure your digital estate and safeguard critical information and assets with a security strategy and framework designed and implemented to respond to the modern threat landscape. Security Operations helps create\u2014and action\u2014a program of change for cybersecurity to make your digital estate more secure.<\/p>\n<h2 class=\"wp-block-heading\">Working alongside our partners<\/h2>\n<p>Cybersecurity is a team sport. Too often, organizations play it outnumbered and outsmarted by the attacker.&nbsp;For most companies, cybersecurity is not their core business, and hiring specialized resources to address these concerns can be a challenge.&nbsp;Most customers rely on a trusted security provider in some capacity to help them on their security journey.<\/p>\n<p>Microsoft partners provide robust services and the ability to uniquely customize their offering to your needs. Service providers commonly protect across the breadth of your estate including Microsoft and other third-party security tools. Microsoft\u2019s partners also routinely provide customized service level agreements, data regulatory and industry specialization, and other specialized services aligned with the specific needs you may have, ranging from remotely managed supplementary services to your in-house team through full outsourcing services as required. Microsoft Security Experts services were built to work alongside partner services, and we frequently partner with them on customer requests and design feedback for our solutions.<\/p>\n<p>Over the previous 12 months, more than 40 partners in the Microsoft Cloud Partner Program with Security designations have now received this verified MXDR engineering verification. If you are considering adding MXDR services, we recommend reviewing one of&nbsp;<a href=\"https:\/\/www.microsoft.com\/misapartnercatalog?PartnerClassifications=MicrosoftVerifiedManagedXDRSolution\">Microsoft\u2019s verified MXDR service partners.<\/a><\/p>\n<h2 class=\"wp-block-heading\">Looking to the future<\/h2>\n<p>As we continue to face new cybersecurity challenges, Microsoft will continue to evolve our Microsoft Security Experts services through our innovative engineering practices while leveraging the immense power of AI and other breakthrough technologies to help protect individuals, businesses, and more. Visit the <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\">Microsoft Security Experts<\/a> page to learn more.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;&nbsp;<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\" target=\"_blank\" rel=\"noreferrer noopener\">Revealing New Opportunities for the Cybersecurity Workforce<\/a>, (ISC)2. 2022.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/bipartisanpolicy.org\/report\/top-risks-cybersecurity-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Risks in Cybersecurity 2023<\/a>, Bipartisan Policy Center. February 13, 2023.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">Cost of a Data Breach Report 2023<\/a>, IBM. 2023.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/09\/expanded-microsoft-security-experts-offerings-provide-comprehensive-protection\/\">Expanded Microsoft Security Experts offerings provide comprehensive protection<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/09\/expanded-microsoft-security-experts-offerings-provide-comprehensive-protection\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Security Experts and Rani Lofstrom| Date: Mon, 09 Oct 2023 16:00:00 +0000<\/strong><\/p>\n<p>Read about the latest updates to our Microsoft Security Experts product offerings.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/09\/expanded-microsoft-security-experts-offerings-provide-comprehensive-protection\/\">Expanded Microsoft Security Experts offerings provide comprehensive protection<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23109","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23109"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23109\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23109"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}