{"id":23206,"date":"2023-10-30T08:38:22","date_gmt":"2023-10-30T16:38:22","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16936\/"},"modified":"2023-10-30T08:38:22","modified_gmt":"2023-10-30T16:38:22","slug":"news-16936","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16936\/","title":{"rendered":"Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave\u2122 report"},"content":{"rendered":"<p><strong>Credit to Author: Rob Lefferts| Date: Mon, 23 Oct 2023 16:00:00 +0000<\/strong><\/p>\n<p>We are excited to share that Microsoft has been named a Leader in <a href=\"https:\/\/reprints2.forrester.com\/#\/assets\/2\/108\/RES178486\/report\" target=\"_blank\" rel=\"noreferrer noopener\">The Forrester Wave\u2122: Endpoint Security, Q4 2023<\/a>. Microsoft received the highest possible scores in the strategy category for the vision and roadmap criteria. Forrester notes, \u201cMicrosoft\u2019s outstanding roadmap for endpoint security includes expanding [<a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\">Microsoft Defender for Endpoint<\/a>] functionality to operational technology (OT) and Internet of Things (IOT) devices and continuing its strategy of building an extensive partner community.\u201d <\/p>\n<p>In the current offering category, Microsoft achieved the highest possible scores in the threat intelligence, suite automation, endpoint, including performance impact, runtime behavior detection and response protection, network cyberthreat detection, mobile device security, behavioral analysis capabilities, and vulnerability patching remediation criteria. Forrester also noted, \u201cBeing natively integrated into Windows minimizes the agent performance overhead\u2026the Defender agent performs well on other operating systems (OS), and the agent\u2019s runtime behavior protection functions integrate into conditional access methods that can provide device trust.\u201d<\/p>\n<div class=\"wp-block-msxcm-cta-block theme-dark\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters bg-gray-800 text-white\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Defender for Endpoint<\/h2>\n<div class=\"mb-3\">\n<p>Discover and secure endpoint devices across your multiplatform enterprise.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\" class=\"btn btn-primary bg-body text-body\" > \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"a person sitting on the seat of a car\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1-293x195.jpg 293w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">AI and SOC efficiency: core to our vision and roadmap<\/h2>\n<p>As Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft, <a href=\"https:\/\/aka.ms\/SecurityCopilotEAPBlog\">states in her blog<\/a>, the global shortage of skilled security professionals and the continued, unprecedented cybersecurity threats faced by organizations have been key drivers to create and integrate new technologies to help tip the scales in favor of security teams.<\/p>\n<p>AI is one such technology. Bringing its breakthroughs, such as generative AI, within reach of organizations of all sizes has been core to Microsoft Defender for Endpoint\u2019s strategy. AI goes hand-in-hand with security operations center (SOC) efficiency that spans our vision of protecting every endpoint on the planet for organizations of all sizes to our roadmap of capabilities that empower security teams to outmaneuver sophisticated adversaries. Automatic attack disruption, <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\">Microsoft Security Copilot<\/a>, and native settings management are just three examples of how our vision and roadmap are already transforming the SOC in recent months.<\/p>\n<h2 class=\"wp-block-heading\">Disrupting ransomware early in the cyberattack chain with automatic attack disruption<\/h2>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture1.gif\" alt=\"Gif demonstrating automatic attack disruption\" class=\"wp-image-131931\" style=\"width:723px;height:407px\" width=\"723\" height=\"407\"\/><\/figure>\n<div class=\"wp-block-msxcm-kicker-container align-right\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title text-neutral-600 text-uppercase\"> \t\t\tWhat is ransomware?\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/learn.microsoft.com\/en-us\/security\/ransomware\/human-operated-ransomware\" \t\t\ttarget=\"_blank\"> \t\t\t<span>Read more<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p><em>Figure 1. How automatic attack disruption stops a ransomware attack.<\/em><\/p>\n<p>Security teams need every advantage in the fight against ransomware. Introduced in November 2022, Microsoft 365 Defender\u2019s unique, industry-first&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/what-s-new-in-xdr-at-microsoft-ignite\/ba-p\/3648872\" target=\"_blank\" rel=\"noreferrer noopener\">automatic attack disruption<\/a> stops the most sophisticated cyberattack campaigns\u2014such as ransomware, business email compromise, and attacker-in-the-middle\u2014at machine speed by leveraging multidomain signals across the extended detection and response (XDR) platform. This capability combines our industry-leading detection with AI enforcement mechanisms to block cyberthreats and limit their spread within the organization. In <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/11\/microsoft-defender-for-endpoint-now-stops-human-operated-attacks-on-its-own\/\">October 2023<\/a>, we introduced the next evolution of automatic attack disruption that stops human-operated cyberattacks earlier in the cyberattack chain in a decentralized way across devices. This industry-first, Microsoft-patented capability contains compromised users across devices just by deploying Defender for Endpoint, bringing this XDR AI-powered security within reach of even more organizations.<\/p>\n<h2 class=\"wp-block-heading\">Accelerating investigation and response with Security Copilot<\/h2>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2-1024x561.webp\" alt=\"Screenshot of the Microsoft 365 Defender portal where Microsoft Security Copilot is embedded in a security analyst workflow where they use natural language to create a complex KQL query for advanced hunting. \" class=\"wp-image-131934 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2-1024x561.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2-300x164.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2-768x421.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2.webp 1430w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture2-2-1024x561.webp\"><\/figure>\n<p><em>Figure 2. Microsoft 365 Defender portal showing Security Copilot within advanced hunting editor.<\/em><\/p>\n<p>Security professionals are scarce, and we must empower them to disrupt cyberattackers\u2019 traditional advantages. With this challenge in mind, we introduced Microsoft Security Copilot in March 2023. It is the industry\u2019s first generative AI security product that allows security teams to move at machine speed. It combines OpenAI\u2019s GPT-4 generative AI model with Microsoft\u2019s security-specific model informed by our unique global threat intelligence and more than 65 trillion daily signals.<sup>1<\/sup> This month, <a href=\"https:\/\/aka.ms\/SecurityCopilotEAPBlog\">organizations started gaining access<\/a> to Security Copilot. Embedded within Microsoft 365 Defender\u2019s existing analyst workflows, Security Copilot simplifies complex tasks with capabilities like guided response actions, and provides intuitive, actionable insight across the cyberthreat landscape such as summarized incidents in natural language.<\/p>\n<h2 class=\"wp-block-heading\">Fast-tracking setup with simplified settings management<\/h2>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture3-1.webp\" alt=\"Screenshot of the Microsoft 365 Defender portal settings management experience across Windows, mac, and iOS so that the security analyst can remain within this portal. \" class=\"wp-image-131935 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/Picture3-1.webp\"><\/figure>\n<p><em>Figure 3. Security policy interface in the Microsoft 365 Defender portal.<\/em><\/p>\n<p>Helping security teams move with speed and agility doesn\u2019t always require AI. Security teams can now set up and configure Defender for Endpoint so much faster with <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/manage-security-settings-for-windows-macos-and-linux-natively-in\/ba-p\/3870617\" target=\"_blank\" rel=\"noreferrer noopener\">simplified security settings management<\/a>, announced in July 2023. The new streamlined approach is all contained within the unified Microsoft 365 Defender portal experience, supported across the multiplatform workloads of Windows, MacOS, and Linux.&nbsp;While the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-intune\">Microsoft Intune<\/a> portal is no longer required as part of the setup experience, Microsoft Defender for Endpoint continues to work great with Intune, sharing a single consistent source of truth for endpoint security settings. &nbsp;<\/p>\n<p>In the coming months we look forward to introducing more AI-powered and efficiency-focused capabilities across all platforms.<\/p>\n<h2 class=\"wp-block-heading\">Industry-leading endpoint security<\/h2>\n<p>Microsoft Defender for Endpoint is core to&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-365-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 Defender<\/a>, our XDR solution that spans identities, endpoints, cloud apps, email, and documents. Microsoft 365 Defender delivers intelligent, automated, and integrated security in a unified security operations experience, with detailed cyberthreat analytics and insights, unified threat hunting, and rapid detection and automation across domains\u2014detecting and stopping cyberattacks anywhere in the cyberattack chain and eliminating persistent cyberthreats.<\/p>\n<p>Our continued leadership in security is due in part to the close partnership we have with customers who give us continuous feedback in the product development process. We are grateful for their continued trust in us and are committed to delivering innovative security capabilities that help them secure their organizations.<\/p>\n<p>Our mission is to empower security teams with the best security capabilities in the industry so that you can focus on what\u2019s important: preventing and remediating cyberthreats.<\/p>\n<p>You can <a href=\"https:\/\/reprints2.forrester.com\/#\/assets\/2\/108\/RES178486\/report\" target=\"_blank\" rel=\"noreferrer noopener\">download the report<\/a>&nbsp;to get more details about our position as a Leader. We thank our customers and partners for being on this journey with us.<\/p>\n<h2 class=\"wp-block-heading\">Recognition across the industry<\/h2>\n<p>Defender for Endpoint has consistently been recognized as delivering as an industry leader across analyst and customer evaluations:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/02\/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant-for-endpoint-protection-platforms\/\">Gartner named Microsoft a Leader<\/a> in the 2022 Gartner\u00aeMagic Quadrant\u2122 for Endpoint Protection Platforms.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/06\/microsoft-defender-for-endpoint-is-ranked-number-one-in-market-share-in-the-idc-worldwide-corporate-endpoint-security-market-shares-report-2022\/\">IDC ranked Defender for Endpoint number one in marketshare<\/a> in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022.<\/li>\n<li>Customers ranked Defender for Endpoint Tech Leader number one in <a href=\"https:\/\/www.peerspot.com\/categories\/edr-endpoint-detection-and-response\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Detection and Response<\/a>, Endpoint Protection Platforms, and Anti-Malware on PeerSpot.<\/li>\n<li>Customers ranked Defender for Endpoint number one for <a href=\"https:\/\/www.g2.com\/categories\/endpoint-detection-response-edr\/enterprise#grid\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Detection and Response Software,<\/a> #1 for <a href=\"https:\/\/www.g2.com\/categories\/endpoint-protection-platforms\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Protection Platforms<\/a>, on G2.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>Microsoft Defender for Endpoint is a comprehensive, AI-powered endpoint security across platforms, devices, and IoT. With our solution, organizations can automatically disrupt ransomware on any platform. If you are not yet taking advantage of Microsoft\u2019s unrivaled cyberthreat optics and proven capabilities,&nbsp;<a href=\"https:\/\/www.microsoft.com\/microsoft-365\/security\/endpoint-defender\" target=\"_blank\" rel=\"noreferrer noopener\">sign up for a free trial<\/a>&nbsp;of Microsoft Defender for Endpoint today.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (formerly known as \u201cTwitter\u201d) (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\">Microsoft Digital Defense Report 2023<\/a>, Microsoft. 2023. <\/p>\n<p>The Forrester Wave\u2122 is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave\u2122 are trademarks of Forrester Research, Inc. The Forrester Wave\u2122 is a graphical representation of Forrester\u2019s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave\u2122. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.<\/p>\n<p>Forrester Wave\u2122: Endpoint Security, Q4 2023, Paddy Harrington, Merritt Maxim, Angela Lozada, Christine Turley. October 18, 2023.<\/p>\n<p>Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022. Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.\u00a0<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/23\/forrester-names-microsoft-a-leader-in-the-2023-endpoint-security-wave-report\/\">Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave\u2122 report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/23\/forrester-names-microsoft-a-leader-in-the-2023-endpoint-security-wave-report\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Rob Lefferts| Date: Mon, 23 Oct 2023 16:00:00 +0000<\/strong><\/p>\n<p>Microsoft has been named a Leader in The Forrester Wave\u2122: Endpoint Security, Q4 2023 report.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/23\/forrester-names-microsoft-a-leader-in-the-2023-endpoint-security-wave-report\/\">Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave\u2122 report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[29555],"class_list":["post-23206","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-forrester-waves"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23206"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23206\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23206"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}