{"id":21386,"date":"2023-03-02T09:01:01","date_gmt":"2023-03-02T17:01:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/03\/02\/news-15117\/"},"modified":"2023-03-02T09:01:01","modified_gmt":"2023-03-02T17:01:01","slug":"news-15117","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/03\/02\/news-15117\/","title":{"rendered":"Microsoft is named a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Endpoint Protection Platforms"},"content":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 02 Mar 2023 17:00:00 +0000<\/strong><\/p>\n<p>The state of cybersecurity continues to challenge defenders around the world. With hybrid work here to stay and emerging trends like Ransomware as a Service, organizations need a partner that empowers them with not only modern endpoint security but an integrated solution that helps security operations teams defend against the most advanced attacks.<sup>1<\/sup> At the same time, budget and resource constraints continue to be top of mind for organizations. That is why Microsoft is committed to helping security teams be more effective with best-of-breed capabilities that move beyond siloed security tools to deliver integrated extended detection and response (XDR) across security for endpoints, identity, email, and cloud apps.<\/p>\n<p>Today, I am pleased to announce that Gartner has recognized <strong>Microsoft as a Leader in the 2022 Gartner<sup>\u00ae <\/sup>Magic Quadrant<sup>TM<\/sup> for Endpoint Protection Platforms<\/strong>, positioned highest on the Ability to Execute.<sup>2<\/sup><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint-offer\">Microsoft Defender for Endpoint<\/a> is an industry-leading, cloud-powered endpoint security solution offering endpoint protection, endpoint detection and response, mobile threat defense, and integrated vulnerability management.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"947\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture1-947x1024.png\" alt=\"2022 Gartner\u00ae Magic QuadrantTM for Endpoint Protection Platforms with Microsoft noted as a Leader.\" class=\"wp-image-126272\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture1-947x1024.png 947w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture1-277x300.png 277w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture1-768x831.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture1.png 1322w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/figure>\n<p><em>Figure 1. Gartner<sup>\u00ae<\/sup> Magic Quadrant<sup>TM<\/sup> for Endpoint Protection Platforms. Source: Gartner (December 2022).<\/em><\/p>\n<h2>Endpoint security innovation from Microsoft<\/h2>\n<p>We have continuously innovated to help organizations protect their endpoints over the past 12 months. Here are a few highlights:<\/p>\n<ul>\n<li><strong>The <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-365-defender\">Microsoft 365 Defender<\/a> portal unifies best-of-breed security for endpoints, email, identities, and SaaS applications into a comprehensive XDR experience.<\/strong> Showcased in the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/31\/microsoft-protects-against-human-operated-ransomware-across-the-full-attack-chain-in-the-2022-mitre-engenuity-attck-evaluations\/\">MITRE Engenuity ATT&amp;CK\u00ae evaluation<\/a>, Microsoft 365 Defender empowers defenders by combining our best-of-breed endpoint, identity, email, and cloud app security products into an end-to-end XDR solution. It enables organizations to respond more effectively with prioritized incidents and gives them access to industry-leading threat intelligence. Microsoft 365 Defender doesn\u2019t just help SecOps teams detect attacks, it stops their progression with <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/automatic-disruption-of-ransomware-and-bec-attacks-with\/ba-p\/3738294\" target=\"_blank\" rel=\"noreferrer noopener\">automatic attack disruption<\/a> by automatically isolating affected and disabling compromised user accounts at machine speed. Leading endpoint security is critical but not enough, and that\u2019s why the Microsoft XDR solution enables organizations of any size to break away from the complexity of point solutions with a comprehensive experience to protect across the entire kill chain.<\/li>\n<li><strong>One endpoint security solution for all platforms<\/strong>. Microsoft Defender for Endpoint is designed for all endpoint platforms in an organization\u2019s network including Windows, Linux, macOS, Android, and iOS. Over the past year, we continued to build out these capabilities with new innovations including <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/enhanced-antimalware-engine-capabilities-for-linux-and-macos\/ba-p\/3292003\" target=\"_blank\" rel=\"noreferrer noopener\">antimalware capabilities<\/a> for Linux, macOS, and Android, support for device isolation, as well as the release of <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/mobile-network-protection-in-microsoft-defender-for-endpoint-on\/ba-p\/3559121\" target=\"_blank\" rel=\"noreferrer noopener\">mobile network protection<\/a>.<\/li>\n<li><strong>Simplified endpoint security configuration and management experiences. <\/strong>This year, we introduced <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-business\/mdb-overview?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Business<\/a>, offering small business customers a streamlined way to protect their organizations with enterprise-grade security at a price point that allows these businesses to thrive. For larger customers, we began rolling out a radically simplified approach to configuration that makes it easier for our customers to protect both managed and unmanaged devices all from a single <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/security-settings-management-in-microsoft-defender-for-endpoint\/ba-p\/3356970\" target=\"_blank\" rel=\"noreferrer noopener\">unified management experience<\/a>. In addition, the new <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/introducing-the-new-alert-suppression-experience-now-in-public\/ba-p\/3562719\" target=\"_blank\" rel=\"noreferrer noopener\">alert suppression experience<\/a> offers more granular controls for automating and streamlining alerts, saving IT and security teams countless hours of manual tasking.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2AJ91JO6&amp;ct=220707&amp;st=sb\" target=\"_blank\" rel=\"noreferrer noopener\">Download the complimentary report<\/a> to get more details on our positioning as a Leader. Our customers and partners have been on this incredible journey with us, and for that, we owe our immense gratitude and share this recognition with them.<\/p>\n<h2>Customer recognition<\/h2>\n<p>It is exciting to see customers realizing the benefits of Microsoft Defender for Endpoint. ING, a multinational bank with over 58,000 employees across more than 40 countries recalls that \u201cRight out of the box, Microsoft Defender for Endpoint detected events without a lot of involvement from our engineers and fulfilled our expectations completely.\u201d\u2014Przemyslaw Wolek, Global Tribe Lead for IT Security, ING.<\/p>\n<p>Now harnessing the full scope of Microsoft 365 Defender, ING\u2019s security capabilities extend beyond the endpoint, helping them intelligently detect and respond to threats throughout the organization by correlating signals across endpoints, email, identity, apps, and more under a unified solution. \u201cOur entire estate is covered because of the telemetry we receive across Microsoft 365. It\u2019s all available through a single pane of glass, and that has been critical to raising proactiveness and improving our security posture.\u201d\u2014Piotr Pociecha, Product Owner, ING.<\/p>\n<p>Read the <a href=\"https:\/\/customers.microsoft.com\/story\/1556735723585984123-ing-banking-microsoft-security-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">full customer story<\/a>.<\/p>\n<h2>Modernize, consolidate, and save money<\/h2>\n<p>The evolving threat landscape has pushed many organizations to rethink their current security approach.<\/p>\n<p>For years, chief information security officers (CISOs) chose best of breed security tools with the highest protection at the time of an individual workload but these solutions were poorly integrated and so there was significant downside in not getting visibility into the end-to-end signal from tools, instead stitching together signals with their people. This approach takes resources and leads to incomplete security.<\/p>\n<p>We have now arrived at a new milestone for the industry where CISOs can now choose solutions that are both best of breed in areas such as endpoint security and tightly integrated\u2014delivering better protection while saving costs. There has never been a better time to modernize or consolidate your endpoint investments and increase the safety of your organization with Microsoft 365 E5 security.<\/p>\n<h2>Learn more<\/h2>\n<p>If you are not yet taking advantage of Microsoft\u2019s leading endpoint security solution, visit <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint-offer\">Microsoft Defender for Endpoint<\/a> and start a free trial today.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\">Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself<\/a>, Microsoft Defender Threat Intelligence. May 9, 2022.<\/p>\n<p><sup>2<\/sup>Gartner Magic Quadrant for Endpoint Protection Platforms, by Peter Firstbrook, Chris Silva. 31 December 2022.<\/p>\n<p>Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.<\/p>\n<p>This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2AJ91JO6&amp;ct=220707&amp;st=sb\" target=\"_blank\" rel=\"noreferrer noopener\">available upon request here<\/a>.<\/p>\n<p>Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/p>\n<p>\u201c\u00a9 November 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.\u201d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/02\/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant-for-endpoint-protection-platforms\/\">Microsoft is named a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Endpoint Protection Platforms<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/02\/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant-for-endpoint-protection-platforms\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 02 Mar 2023 17:00:00 +0000<\/strong><\/p>\n<p>Gartner has again recognized Microsoft as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Endpoint Protection Platforms, positioned highest on the Ability to Execute. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/02\/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant-for-endpoint-protection-platforms\/\">Microsoft is named a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Endpoint Protection Platforms<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,21482,24860,24265],"class_list":["post-21386","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-endpoint-security","tag-microsoft-defender-for-endpoint","tag-microsoft-endpoint-manager"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21386"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21386\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}