{"id":25228,"date":"2024-09-21T01:00:51","date_gmt":"2024-09-21T09:00:51","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/09\/21\/news-18958\/"},"modified":"2024-09-21T01:00:51","modified_gmt":"2024-09-21T09:00:51","slug":"news-18958","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/09\/21\/news-18958\/","title":{"rendered":"How comprehensive security simplifies the defense of your digital estate"},"content":{"rendered":"<p><strong>Credit to Author: Vasu Jakkal| Date: Wed, 18 Sep 2024 16:00:00 +0000<\/strong><\/p>\n<p>Cybersecurity jobs are more challenging than ever. It\u2019s not just increased speed, scale, and sophistication of cyberattacks that make cybersecurity jobs harder: there are 250 new regulatory updates to be tracked every day,<sup>1<\/sup> cybersecurity teams have a disconnected collection of fragmented tools that they are expected to seamlessly stitch together and manage, and the cybersecurity workforce gap has reached a record high, with 4 million professionals needed to adequately secure organizations.<sup>2<\/sup> Still, security is the most important investment we can make, especially as AI reshapes the world.<\/p>\n<p>In response, many leading organizations are re-evaluating their security strategy and moving away from a patchwork of disparate solutions in an effort to reduce costs, eliminate gaps, and improve security posture overall. They are adopting an end-to-end security approach, which is not an entirely new concept but rather an evolving vision of the technology, culture, and training necessary to tackle cybersecurity successfully. End-to-end security focuses on fully securing your entire digital estate pre- and post-breach, with management, mitigation, and assessment capabilities. For instance, <a href=\"https:\/\/www.microsoft.com\/security\/?msockid=1c062e13522c6c1c298c3a3753b36d1d\">Microsoft Security<\/a> spans more than 50 categories within six product families, aligning seamlessly with our Security Future Initiative efforts introduced in November 2023.<\/p>\n<p>End-to-end security is a comprehensive and proactive approach to protecting your environment that is grounded in a <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust security strategy<\/a>. It\u2019s about a cohesive user experience as much as it is about complete threat intelligence and a consistent data platform. All products work together effectively to address identity, devices, clouds, data, and network. It requires that you have a multitude of capabilities in place, from identity to data to threat protection to governance and compliance. It protects you from every angle, across security, compliance, identity, device management, and privacy. And you can accelerate the benefits of end-to-end security even further with generative AI.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Zero Trust security<\/h2>\n<div class=\"mb-3\">\n<p>Build a secure hybrid workforce and drive business agility with a Zero Trust approach to security.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\" class=\"btn btn-primary bg-body text-body\" > \t\t\t\t\t\t\t\t<span>Get started<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/SEC20_Security_015.jpg\" class=\"card-img img-object-cover\" alt=\"A person sits at a laptop next to a cup of coffee.\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/SEC20_Security_015.jpg 1000w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/SEC20_Security_015-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/SEC20_Security_015-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/SEC20_Security_015-768x768.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"why-an-evolving-landscape-makes-end-to-end-security-appealing\">Why an evolving landscape makes end-to-end security appealing<\/h2>\n<p>You can\u2019t protect what you can\u2019t see or understand. Many organizations are siloed rather than possessing a single vision for cybersecurity. And when these siloed areas of the organization\u2014perhaps none are more siloed than IT and security teams\u2014are not talking to each other, the integration of tools, people, and processes faces a major roadblock. With AI tools gaining popularity in the digital workplace, communication challenges are more apparent as organizations seek increased visibility and greater control of AI usage.<\/p>\n<p>Another challenge is the enormous scale of data that needs analysis to produce threat intelligence and effective threat response. The volume can be overwhelming, and with a patchwork security strategy, even best-in-breed tools are less effective because they cannot contribute to a complete view of the data and offer no way to organize it. <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\">According to Gartner<\/a>\u00ae, more organizations are recognizing the importance of their cybersecurity data and want to consolidate their cybersecurity platform, up from 29% in 2020 to 75% in 2022.<sup>3<\/sup><\/p>\n<p>To optimize for the evolving landscape, organizations are changing their security priorities.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/09\/Picture1.webp\" alt=\"Chart listing the nine specific security priorities organizations should optimize for with the evolving threat landscape.\" class=\"wp-image-135623 webp-format\" style=\"width:724px;height:auto\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/09\/Picture1.webp\"><\/figure>\n<p><em>Figure 1. A list of nine of the top security priorities organizations should implement in the face of the ever evolving cybersecurity landscape.<\/em><\/p>\n<p>The desire for simplification and more effective security\u00a0are motivating organizations to move to an end-to-end security approach because of significant advantages. Microsoft customers tell us that juggling myriad security products is difficult to maintain and they want to seize opportunities for AI and better manage risk.<\/p>\n<p>ING, one of the biggest banks in Europe, is a great example of how an organization benefits from an end-to-end approach. ING consolidated a fragmented, complicated mix of security tools into an end-to-end security approach for better protection of their private, public, and multicloud environments. The firm is using the solution to protect the company and the 38 million customers it serves across 40 countries.<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-are-the-advantages-of-an-end-to-end-security-approach\">What are the advantages of an end-to-end security approach?<\/h2>\n<p>The end-to-end security approach consolidates all your cybersecurity tools, from data protection to incident response and everything in between, into one solution. According to IDC&#8217;s\u00a0North American Tools and Vendors Consolidation Survey\u00a0conducted in November and December 2023, approximately 86% of organizations are either actively consolidating or planning to consolidate their tools. And 50% of those planning a consolidation have almost 50 tools (20 vendors on average).<sup>4<\/sup> By interconnecting different tools through APIs, you simplify the security of your organization and gain greater visibility over everything happening. Without that visibility, you lack the knowledge of what you need to protect and govern your data, as well as investigate when a breach occurs. \u00a0<\/p>\n<p>When combined with AI, end-to-end security overcomes challenges that can\u2019t be solved by automation or code. That kind of agility is critical to address potential risks and successfully defend against modern cyberthreats, especially in confronting the scale at which breaches are occurring.<\/p>\n<p>Plus, end-to-end security solves challenges in a way that allows for <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/08\/30\/building-the-security-operations-center-of-tomorrow-harnessing-the-law-of-data-gravity\/\">data gravity<\/a>, which involves bringing applications and services to your data rather than the other way around. It\u2019s useful in instances where the data is extremely large. Introducing data gravity enables new types of security scenarios to be built, sparking innovation in your security strategy. And end-to-end security paves the way for security assessments of your resources and other benefits of continuous posture management.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;By adopting multiple interoperable Microsoft security solutions, we have improved our preventative capabilities, our incident response times, and our scope for monitoring our environment,&#8221; said Glauco Sampaio, Chief Information Security Officer at <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1765090070873727497-cielo-sa-microsoft-defender-for-office-365-p1-banking-and-capital-markets-en-brazil\" target=\"_blank\" rel=\"noreferrer noopener\">Cielo<\/a>. &#8220;It was surprisingly simple to enable real-time visibility across our environment. It\u2019s been a leap in our security maturity level.\u201d<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"explore-how-adopting-end-to-end-security-benefits-you\">Explore how adopting end-to-end security benefits you<\/h2>\n<p>Taking an end-to-end approach to security can pay major dividends, especially as you align to the Zero Trust framework. You will be able to determine which solutions to deploy and identify any gaps. An end-to-end approach will help you consolidate the number of tools and applications and use the ones that maximize your benefits. To explore how Microsoft Security with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">Microsoft Copilot for Security<\/a> enables you to safeguard your people, data, and infrastructure, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\">visit our webpage<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.crn.com\/news\/security\/2024\/microsoft-execs-partners-critical-to-achieving-responsible-ai-security\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Execs: Partners \u2018Critical\u2019 To Achieving Responsible AI, Security<\/a>, CRN. May 23, 2024.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.isc2.org\/Insights\/2023\/10\/ISC2-Reveals-Workforce-Growth-But-Record-Breaking-Gap-4-Million-Cybersecurity-Professionals\" target=\"_blank\" rel=\"noreferrer noopener\">ISC2 Publishes 2023 Workforce Study<\/a>, ISC2. October 31, 2023.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Survey Shows 75% of Organizations Are Pursuing Security Vendor Consolidation in 2022<\/a>, Gartner. September 12, 2022.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US52023024&amp;pageType=PRINTFRIENDLY\" target=\"_blank\" rel=\"noreferrer noopener\">North American Security Tools and Vendors Consolidation Study: Insights on Product Consolidation Plans<\/a>, IDC. April 2024.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/09\/18\/how-comprehensive-security-simplifies-the-defense-of-your-digital-estate\/\">How comprehensive security simplifies the defense of your digital estate<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/09\/18\/how-comprehensive-security-simplifies-the-defense-of-your-digital-estate\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Vasu Jakkal| Date: Wed, 18 Sep 2024 16:00:00 +0000<\/strong><\/p>\n<p>End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users. Read the blog post to explore why it\u2019s an attractive option for organizations committed to strengthening their cybersecurity.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/09\/18\/how-comprehensive-security-simplifies-the-defense-of-your-digital-estate\/\">How comprehensive security simplifies the defense of your digital estate<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25228","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25228"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25228\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25228"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}