{"id":20696,"date":"2022-11-30T10:01:10","date_gmt":"2022-11-30T18:01:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/11\/30\/news-14429\/"},"modified":"2022-11-30T10:01:10","modified_gmt":"2022-11-30T18:01:10","slug":"news-14429","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/11\/30\/news-14429\/","title":{"rendered":"Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Wed, 30 Nov 2022 17:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\"><em>guest blog series<\/em><\/a><em>.&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISA\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>&nbsp;<\/p>\n<p>As more employees work remotely on a variety of devices and networks, businesses need a security model that supports this new operational efficiency. An expanding perimeter poses challenges for organizational security, exposing your company to risks from malware and data breaches from IT devices that are unknown and unsafe.<\/p>\n<p>To adapt to the realities of modern work, the principles of <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> have been rapidly adopted as a security best practice by businesses and security professionals alike.<\/p>\n<p><strong><em><strong><em>A pillar of the Zero Trust framework is based on assuming devices are breached until they are explicitly verified as trusted.<\/em><\/strong><\/em><\/strong><\/p>\n<p>This applies particularly to mobile devices, as employee-held smartphones are increasingly infected with malware, targeted by phishing attacks, or exploited due to vulnerable software and configuration. <em>These threats on untrusted devices that access company data result in businesses suffering from cyberattacks and data breaches. <\/em>By embracing the principles of Zero Trust, businesses can better manage these risks and secure themselves against mobile-borne threats by ensuring that only trusted devices have access to company data.<\/p>\n<h2>How Microsoft and Traced work together to ensure endpoint protection based on Zero Trust principles<\/h2>\n<p>United Kingdom-based cybersecurity vendor Traced Mobile Security joined the Microsoft Intelligence Security Association (MISA) with the goal of transforming Zero Trust access to business data on mobile devices.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>At Traced, our vision is to live in a world where anyone can comfortably, easily, and securely use the same mobile device for work and play. MISA has helped us to do with their valuable advice, access to technical experts, and sharing our vision for safer devices.<\/p>\n<p> <cite>Benedict Jones, Co-Founder, Traced<\/cite><\/p><\/blockquote>\n<h3><strong>Trust nothing, verify everything.<\/strong><\/h3>\n<p>With ever-more mobile devices accessing company networks, information, and cloud apps, customers need to be able to automatically control access to cloud apps based on the security status of a smartphone or tablet\u2014whether it\u2019s personal- or corporate-owned.<\/p>\n<p>So Traced developed Trustd MTD to provide simple, fast, and robust Zero Trust access to those Cloud Apps for Microsoft customers. <a href=\"https:\/\/traced.app\/integration-with-azure-ad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trustd&#8217;s integration<\/a> with <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory\">Microsoft Azure Active Directory<\/a> (Azure AD), part of the <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\">Microsoft Entra product family<\/a>, helps customers achieve compliance and mitigate the growing business risks of cyberattacks and data breaches originating from company and personal mobile devices.<\/p>\n<p>This means that customers can:<\/p>\n<ul>\n<li>Reduce the risk of data breaches, fines, and damages from cyberthreats such as Man-in-the-Middle attacks, malware, and phishing.<\/li>\n<li>Enable secure remote working without compromising efficiency.<\/li>\n<li>Automatically allow access to company data when a user\u2019s device is validated as trusted and restrict access if it becomes untrusted.<\/li>\n<li>Protect their private data on mobile devices across most locations and networks.<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;As mobile threats abound in greater numbers, we&#8217;re seeing many businesses struggling to protect themselves. We&#8217;re using Trustd MTD to enforce the principles of Zero Trust for our customers and ensure that untrusted and compromised mobile devices cannot access company data.&#8221;<\/p>\n<p> <cite>Fayyaz Shah, Chief Operating Officer, METCLOUD<\/cite><\/p><\/blockquote>\n<p>Through <a href=\"https:\/\/traced.app\/trustd-mtd\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trustd MTD<\/a>\u2019s integration with Azure AD conditional access policies, customers can automatically restrict access to <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory-integrated-apps\">thousands of Azure AD Gallery apps<\/a> from users with compromised or untrusted mobile devices.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"615\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2-1024x615.png\" alt=\"Architectural diagram describing Trustd MTD\u2019s integration with Microsoft Azure Active Directory.\" class=\"wp-image-124891\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2-1024x615.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2-300x180.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2-768x461.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2-1536x922.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture2.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<blockquote class=\"wp-block-quote\">\n<p>With Azure AD Single Sign-on (SSO) being seamlessly supported across such a broad range of apps, Trustd MTD&#8217;s integration with Azure AD for conditional access to company resources means that we can together ensure that company data is inaccessible to compromised users for your business&#8217; key and sensitive apps.<\/p>\n<p> <cite>Benedict Jones, Co-Founder, Traced<\/cite><\/p><\/blockquote>\n<h2>Free Zero Trust white paper<\/h2>\n<p>To learn more about Zero Trust and how Azure AD integrates with Traced\u2019s MTD solution, download the free Trustd whitepaper \u201c<a href=\"https:\/\/traced.app\/wp-content\/uploads\/2021\/08\/How-Trustd-Supports-Zero-Trust.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust mobile security in a perimeter-less world<\/a>.\u201d<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"560\" height=\"586\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture3.png\" alt=\"Snippet of Zero Trust white paper. \" class=\"wp-image-124892\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture3.png 560w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/11\/Picture3-287x300.png 287w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/figure>\n<h2>About Traced<\/h2>\n<p>Traced\u2019s vision is to make the invisible visible.<\/p>\n<p>It\u2019s about making software that shines a light on threats that are invisible to traditional forms of detection. It\u2019s about making sure their software protects people by being easy to understand, effective, and affordable. And it\u2019s about respecting users\u2019 and employees\u2019 privacy by being transparent about what you\u2019re doing and why.<\/p>\n<p>And it\u2019s about making a different kind of security company. A company that understands and talks about the threats that businesses really face every day, rather than the ones that get the best headlines or induce the greatest fear. For more information, <a href=\"https:\/\/traced.app\/\" target=\"_blank\" rel=\"noreferrer noopener\">visit the Traced website<\/a>.<\/p>\n<h2>Learn more<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Embrace proactive security with Zero Trust<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\/maturity-model-assessment-tool?activetab=solution-wizard:primaryr1\">Assess your organization\u2019s Zero Trust maturity<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/identity-access\">Learn about identity and access solutions from Microsoft<\/a>.<\/li>\n<\/ul>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA), <a href=\"https:\/\/aka.ms\/MISA\">visit the website<\/a> where you can learn about the MISA program, product integrations, and find MISA members. Visit the\u202f<a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>\u202fto learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f&nbsp;<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/30\/implementing-zero-trust-access-to-business-data-on-byod-with-trustd-mtd-and-microsoft-entra\/\">Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/30\/implementing-zero-trust-access-to-business-data-on-byod-with-trustd-mtd-and-microsoft-entra\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Wed, 30 Nov 2022 17:00:00 +0000<\/strong><\/p>\n<p>Protect business data\u2014and employee privacy\u2014with conditional access on employees\u2019 personal devices with Trustd MTD and Microsoft Entra.  <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/30\/implementing-zero-trust-access-to-business-data-on-byod-with-trustd-mtd-and-microsoft-entra\/\">Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,21872,25300,22745,24739],"class_list":["post-20696","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series","tag-microsoft-intelligent-security-association-misa","tag-misa"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20696"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20696\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}