{"id":24874,"date":"2024-07-11T17:00:56","date_gmt":"2024-07-12T01:00:56","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/07\/11\/news-18604\/"},"modified":"2024-07-11T17:00:56","modified_gmt":"2024-07-12T01:00:56","slug":"news-18604","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/07\/11\/news-18604\/","title":{"rendered":"Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available"},"content":{"rendered":"<p><strong>Credit to Author: Vasu Jakkal and Joy Chik| Date: Thu, 11 Jul 2024 16:00:00 +0000<\/strong><\/p>\n<p>We\u2019re announcing new capabilities to help accelerate your transition to a Zero Trust security model with the general availability of the <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\"><strong>Microsoft Entra Suite<\/strong><\/a>, the industry\u2019s most comprehensive secure access solution for the workforce, and the general availability of Microsoft Sentinel within the <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/ai-powered-unified-secops-platform\"><strong>Microsoft unified security operations platform<\/strong><\/a>, which delivers unified threat protection and posture management. These innovations make it easier to secure access, identify and close critical security gaps, detect cyberthreats, reduce response times, and streamline operations.<\/p>\n<div class=\"wp-block-msxcm-cta-block theme-dark\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters bg-gray-800 text-white\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/340656_SCI_Zero_Trust_3Drender_Overhead_8500x8500_01.jpg\" class=\"card-img img-object-cover\" alt=\"\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Zero Trust in the age of AI<\/h2>\n<div class=\"mb-3\">\n<p>Join us on July 31, 2024, to learn how to simplify your Zero Trust strategy with the latest end-to-end security innovations.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/info.microsoft.com\/ww-landing-zero-trust-in-the-age-of-ai.html?lcid=en-us\/?ocid=cmmd13hc704\" class=\"btn btn-primary bg-body text-body\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Register now<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>The extraordinary advancements in technology that make our work lives easier and more flexible also create opportunities for bad actors seeking more effective ways to launch cyberattacks. A Zero Trust strategy is vital for helping keep your organization safe in an era when cyberattacks against passwords, networks, and applications continue to increase. According to Gartner\u00ae, \u201cAI enhancement can provide malicious code, and facilitate phishing and social engineering, which enables better intrusion, increased credibility, and more damaging attacks.\u201d<sup>1<\/sup><\/p>\n<p>A proactive <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust security strategy<\/a> unifies defenses across identities, endpoints, networks, applications, data, and infrastructure with comprehensive security policies, pervasive threat protection, and governance. While individual tools are typically used to fulfill requirements across each Zero Trust pillar, a truly comprehensive strategy connects them together through a centralized access policy engine and integrated threat protection. This delivers defense-in-depth cybersecurity across your on-premises, hybrid, and multicloud environments.<\/p>\n<p>Buying individual solutions and building truly comprehensive architecture from scratch is a herculean effort for most organizations. We\u2019ve designed our security offering from the ground up to enable Zero Trust\u2014delivering built-in integrations with unified policies, controls, and automation to accelerate your implementation and strengthen your security posture.<\/p>\n<p>These announcements further simplify the implementation of a Zero Trust architecture across the full lifecycle from prevention to detection and response. The Microsoft Entra Suite enables organizations to converge policies across identities, endpoints, and private and public networks with a unified access policy engine. Our unified security operations platform brings together all the security signals your environment generates, then normalizes, analyzes, and uses them to proactively defend against cyberthreats.<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-microsoft-entra-suite\">The Microsoft Entra Suite<\/h2>\n<p>Given that 66% of digital attack paths involve insecure identity credentials, the Microsoft Entra Suite plays a critical role in preventing security breaches.<sup>2<\/sup><\/p>\n<div class=\"wp-block-msxcm-kicker-container\">\n<div class=\"wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> \t\t\tMicrosoft Entra adds identity skills to Copilot for Security\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/microsoft-entra-adds-identity-skills-to-copilot-for-security\/ba-p\/4081857\" \t\t\ttarget=\"_blank\"\t\t> \t\t\t<span>Read more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>Implemented alone, neither identity nor network security can address all possible access scenarios. The Microsoft Entra Suite unifies identity and network access security\u2014a novel and necessary approach for Zero Trust security. It provides everything you need to verify users, prevent overprivileged permissions, improve detections, and enforce granular access controls for all users and resources. Its native integration facilitates collaboration between identity and network teams. It also reduces your IT administrators\u2019 workload, because they can easily manage and enforce granular identity and network access policies in one place. In addition, Microsoft Entra skills in Microsoft Copilot for Security help identity professionals respond more quickly to identity risks.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Picture1.webp\" alt=\"Decorative graphic listing the products that make up the Microsoft Entra Suite. \" class=\"wp-image-134967 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Picture1.webp\"><\/figure>\n<p>The Microsoft Entra Suite can help you do the following:<\/p>\n<p><strong>Unify Conditional Access policies for identities and networks. <\/strong>Security teams only have to manage one set of policies in one portal to configure access controls for both identities and networks. Now they can extend Zero Trust access policies to any application, whether it\u2019s in the cloud, on-premises, or even to the open internet. Conditional Access evaluates any access request, no matter where it\u2019s coming from, performing real-time risk assessment to strengthen protection against unauthorized access. And because the access policy engine is unified, identity and network teams can be confident that they protect every access point without leaving gaps that often exist between disparate solutions. &nbsp;<\/p>\n<p><strong>Ensure least privilege access for all users accessing all resources and apps, including AI. <\/strong>Identity professionals can automate the access lifecycle from the day a new employee joins their organization, through all their role changes, until the time of their exit. No matter how long or multifaceted an employee\u2019s journey, <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id-governance\">Microsoft Entra ID Governance<\/a> ensures they have the right access to just the applications and resources they need, which helps prevent a cyberattacker\u2019s lateral movement in case of a breach. Identity professionals and business leaders have an additional layer of access control with regular, machine learning-powered access reviews to recertify access needs, ensure compliance with internal policies, and remove unnecessary permissions based on machine learning-powered insights that help reduce reviewer fatigue. &nbsp;<\/p>\n<div class=\"wp-block-msxcm-kicker-container\">\n<div class=\"wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-left\" data-bi-an=\"Kicker Left\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> \t\t\tMicrosoft Entra Verified ID introduces Face Check in preview\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/06\/microsoft-entra-verified-id-introduces-face-check-in-preview\/\" \t\t\ttarget=\"_blank\"\t\t> \t\t\t<span>Read more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-chevron-right\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p><strong>Improve the user experience for both in-office and remote workers. <\/strong>Employees enjoy a faster and easier onboarding experience, faster and more secure sign-in through passwordless authentication, single sign-on for all applications, and superior performance. They can use a self-service portal to request access to relevant packages, manage approvals and access reviews, and view request and approval history. Face Check with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-verified-id\">Microsoft Entra Verified ID<\/a> enables real-time verification of a user\u2019s identity, which streamlines remote onboarding and self-service recovery of passwordless accounts.<\/p>\n<p><strong>Reduce the complexity and cost of managing security tools from multiple vendors. <\/strong>Since traditional on-premises security solutions don\u2019t scale to the needs of modern cloud-first, AI-first environments, organizations are seeking ways to secure and manage their assets from the cloud. With the Microsoft Entra Suite, they can retire multiple on-premises security tools, such as traditional VPNs, on-premises Secure Web Gateway, and on-premises identity governance.<\/p>\n<figure class=\"wp-block wp-block-embed is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio wp-block-embed-red-tiger\">\n<div \t\tclass=\"wp-block-embed-red-tiger__wrapper\" \t\tstyle=\"--video-width: 724px;--video-height: 407.25px\" \t>\n<div class=\"wp-block-embed-red-tiger__iframe-wrapper\"> \t\t\t<iframe \t\t\t\tclass=\"iframe--custom-width\" \t\t\t\theight=\"420\" \t\t\t\ttitle=\"Embed video from Microsoft.com\" \t\t\t\twidth=\"100%\" \t\t\t\tsrc=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RW1mJfI\" \t\t\t\tallow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" \t\t\t\tallowfullscreen frameborder=\"0\" style=\"\"><\/iframe> \t\t<\/div>\n<\/p><\/div>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"microsoft-sentinel-is-generally-available-in-microsoft-s-unified-security-operations-platform\">Microsoft Sentinel is generally available in Microsoft\u2019s unified security operations platform<\/h2>\n<p>A complete Zero Trust architecture provides effective prevention, detection, investigation, and response to cyberthreats across every layer of your digital estate. Because threat actors constantly pivot, no defense is ever absolute. That\u2019s why taking an \u201cassume breach\u201d stance by continuously re-verifying every action while monitoring for new risks and threats is a Zero Trust principle.<\/p>\n<p>According to our research, organizations use as many as 80 individual tools in their security portfolio. For many, this means having to manually manage integration between their security information and event management (SIEM); security orchestration, automation, and response (SOAR); extended detection and response (XDR); posture and exposure management; cloud security; and threat intelligence.<\/p>\n<p>We\u2019ve been on a journey to unify these tools over the last few years and are excited to take the next step by bringing <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-sentinel\">Microsoft Sentinel<\/a> into the Microsoft Defender portal, which we can announce is generally available. Microsoft Sentinel customers on the commercial cloud with at least one Microsoft Defender XDR workload deployed will now be able to:<\/p>\n<ul>\n<li>Onboard a single workspace into the Defender portal.<\/li>\n<li>Have unified incidents and unified hunting with <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\">Microsoft Defender XDR<\/a>, streamlining their investigations and reducing context switching.<\/li>\n<li>Take advantage of Microsoft Copilot for Security for incident summaries and reports, guided investigation, auto-generated Microsoft Teams messages, code analysis, and more.<\/li>\n<li>Extend attack disruption beyond Defender XDR workloads to other critical apps\u2014starting with SAP.<\/li>\n<li>Get tailored, post-incident recommendations on preventing similar or repeat cyberattacks that tie directly into the Microsoft Security Exposure Management initiatives to automatically improve readiness scores as actions are completed.<\/li>\n<\/ul>\n<p>Microsoft Sentinel customers can adopt the new experience easily while continuing to use the classic experience in Microsoft Azure if needed. It\u2019s never been easier to add SIEM capabilities like connectors to hundreds of data sources, and extended retention or additional compliance capabilities to your existing Microsoft Defender XDR environment.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/Microsoft-unified-security-operations-platform.webp\" alt=\"graphical user interface, text, application\" class=\"wp-image-134799 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/Microsoft-unified-security-operations-platform.webp\"><\/figure>\n<p>Some more details of the unified security operations platform include:<\/p>\n<p><strong>Automatically disrupt hands-on-keyboard cyberattacks with attack disruption.<\/strong> This out-of-the-box capability is powered by AI and machine learning to detect and stop the progression of advanced cyberattacks being conducted by well-resourced and sophisticated threat actors. Attack disruption stops the progress of human-operated ransomware, business email compromise, adversary-in-the-middle, and malicious use of OAuth apps in real time with 99% confidence, giving your security team a chance to complete their investigation and remediation under less pressure. By combining native and third-party signals from Defender XDR and Microsoft Sentinel, attack disruption has expanded to stop even more attacks in critical apps, such as SAP.<\/p>\n<div class=\"wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<p class=\"wp-container-content-1\"><strong>Analyze attack paths and reduce exposure.<\/strong> Threat actors don\u2019t think <em>lists<\/em>, they think in <em>graphs<\/em>. Attack path management helps your security teams visualize how a cyberattacker could exploit vulnerabilities to move laterally across exposed assets in your environment. It provides guided recommendations on how they can reduce exposure and helps them prioritize actions based on each exposure\u2019s potential impact.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">Attack disruption can stop prominent cyberattacks such as ransomware in just three minutes.<sup>3<\/sup><\/p>\n<\/blockquote><\/div>\n<p><strong>Detect and investigate faster with more accuracy. <\/strong>Bringing the depth of XDR signal from Defender and the flexibility of log sources from Microsoft Sentinel delivers an improved signal-to-noise ratio and enhanced alert correlation. Cyberattack timelines are automatically fully correlated in a single incident, allowing analysts to move faster to respond to breaches, with a more comprehensive view of an attack. The unification of SIEM and XDR has delivered to our customers, on average, 50% faster correlation among XDR, log data, custom detections, and threat intelligence\u2014with 99% accuracy.<sup>3<\/sup><\/p>\n<p><strong>Improved threat hunting experience. <\/strong>With a single experience for data querying, analysts don\u2019t have to remember where data is available or jump across portals. Customers have found significant benefit in their ability to proactively search through data for an indicator of compromise. Embedded <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">Microsoft Copilot for Security<\/a> acts across SIEM and XDR data to further accelerate the work of security analysts with skills such as guided response or natural language to Kusto Query Language (KQL) translation.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cOur team has greatly benefited from the unified threat hunting experience provided by the platform. The integration of various data sources, including those from third-party providers through Microsoft Sentinel, has significantly enhanced our incident response capabilities. This has allowed us to expand on our threat hunting and custom detection possibilities.\u201d<\/p>\n<p> <cite>\u2014DOW<\/cite><\/p><\/blockquote>\n<p>Get started now: Commercial cloud users of Microsoft Sentinel with at least one Defender XDR workload deployed can onboard a single workspace into the Defender portal through a simple wizard, available on the home screen at security.microsoft.com. After the workspace is onboarded, customers can use the unified security operations platform for SIEM and XDR, while retaining access to their Microsoft Sentinel experience in the Azure portal.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe biggest benefit of the unified security operations platform has been the ability to combine data in Defender XDR with logs from third-party security tools. Another advantage has been to eliminate the need to switch between Defender XDR and Microsoft Sentinel portals. We now have a single pane of glass, which the team has been wanting for some years.\u201d<\/p>\n<p> <cite>\u2014Robel Kidane, Group Information Security Manager, Renishaw plc<\/cite><\/p><\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"simplifying-implementation-of-your-zero-trust-architecture\">Simplifying implementation of your Zero Trust architecture<\/h2>\n<p>By incorporating <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RW10GBb?culture=en-us\" target=\"_blank\" rel=\"noreferrer noopener\">the principles of Zero Trust<\/a>\u2014verify explicitly, use least privileged access, and assume breach\u2014the Microsoft Entra Suite and the Microsoft unified security operations platform help leaders and stakeholders for security operations, identity, IT, and network infrastructure understand their organization&#8217;s overall Zero Trust posture. They verify explicitly by ensuring continuous authentication and authorization of all access requests. They enforce least privileged access by granting only the minimal level of access necessary for users to perform their tasks, thereby reducing attack surfaces. Additionally, they assume breach by continuously monitoring and analyzing activities to identify and respond to cyberthreats proactively.<\/p>\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 btn-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/info.microsoft.com\/ww-landing-zero-trust-in-the-age-of-ai.html?lcid=en-us\/?ocid=cmmd13hc704\" style=\"border-radius:0px\" target=\"_blank\" rel=\"noreferrer noopener\">Register for the Zero Trust spotlight<\/a><\/div>\n<\/p><\/div>\n<p>We encourage you to <a href=\"https:\/\/info.microsoft.com\/ww-landing-zero-trust-in-the-age-of-ai.html?lcid=en-us\/?ocid=cmmd13hc704\" target=\"_blank\" rel=\"noreferrer noopener\">register for the Zero Trust spotlight on July 31, 2024<\/a>, when Microsoft experts and thought leaders will dive deeper into these and other announcements, including the general availability of <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/microsoft-entra-expands-into-security-service-edge-with-two-new\/ba-p\/3847829\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Entra Internet Access and Microsoft Entra Private Access<\/a>, which is part of the Microsoft Entra Suite.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-the-microsoft-entra-suite\">Learn more about the Microsoft Entra Suite<\/h2>\n<ul>\n<li>Read more about the general availability of <a href=\"https:\/\/aka.ms\/EntraSuiteTechCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Entra Suite<\/a>.<\/li>\n<li>Read more about the general availability of <a href=\"https:\/\/aka.ms\/Blog-SSEGATechCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Entra Internet Access and Microsoft Entra Private Access<\/a>.<\/li>\n<li>Read about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-entra-pricing\">Microsoft Entra plans and pricing<\/a>.<\/li>\n<li>Visit the <a href=\"https:\/\/aka.ms\/EntraSuiteTrial\">Microsoft Entra Suite trial page<\/a>.<\/li>\n<li>Learn more about Microsoft <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/identity-access\">identity and network access solutions<\/a>.<\/li>\n<li><a href=\"https:\/\/aka.ms\/AccelerateEntra\" target=\"_blank\" rel=\"noreferrer noopener\">Register for the Tech Accelerator<\/a> on August 14, 2024.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-the-unified-security-operations-platform\">Learn more about the unified security operations platform<\/h2>\n<ul>\n<li>Combine least privileged access with <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-management\/microsoft-intune\">endpoint management<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\">data governance<\/a> for even stronger protection of sensitive information.<\/li>\n<li>Get started with the general availability of <a href=\"https:\/\/aka.ms\/USXTechnicalFAQ\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel in the Defender Portal<\/a> with some helpful FAQs.<\/li>\n<li>Learn more about the <a href=\"https:\/\/aka.ms\/exposuremgmtblog\" target=\"_blank\" rel=\"noreferrer noopener\">exposure management public preview<\/a>.<\/li>\n<li>Read about the new <a href=\"https:\/\/aka.ms\/optimizeapi\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel SOC optimization API<\/a>.<\/li>\n<li>Learn more about the general availability of <a href=\"https:\/\/aka.ms\/USXTechnicalFAQ\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel in the unified SOC platform<\/a>.<\/li>\n<li>Learn about our how <a href=\"https:\/\/aka.ms\/SocOptimizationAPI\" target=\"_blank\" rel=\"noreferrer noopener\">SOC optimization<\/a> helps your organization <a href=\"https:\/\/aka.ms\/SOC_Optimization\" target=\"_blank\" rel=\"noreferrer noopener\">manage costs and protections<\/a>.<\/li>\n<li>Manually deploy playbooks in the <a href=\"https:\/\/aka.ms\/runPlaybook\" target=\"_blank\" rel=\"noreferrer noopener\">unified experience<\/a>. <\/li>\n<li>Compare <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise\/microsoft365-plans-and-pricing?msockid=3c31803e939a627520b792e3926a63c7\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 Enterprise Plans<\/a>.<\/li>\n<li>Learn about <a href=\"https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel pricing<\/a>.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-zero-trust\">Learn more about Zero Trust<\/h2>\n<ul>\n<li>Register for the <a href=\"https:\/\/info.microsoft.com\/ww-landing-zero-trust-in-the-age-of-ai.html?lcid=en-us\/?ocid=cmmd13hc704\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust spotlight<\/a> on July 31, 2024.<\/li>\n<li>Embrace proactive security with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust<\/a>.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-05-22-gartner-survey-shows-ai-enhanced-malicious-attacks-are-new0\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Survey Shows AI-Enhanced Malicious Attacks Are a New Top Emerging Risk for Enterprises<\/a>, Gartner press release. May 22, 2024. GARTNER is a registered trademark and service mark of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-product-and-services\/security\/pdf\/2024-State-of-Multicloud-Security-Risk-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">State of Multicloud Risk Report<\/a>, Microsoft. 2024.<\/p>\n<p><sup>3<\/sup>Microsoft Internal Research. June 2024.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/11\/simplified-zero-trust-security-with-the-microsoft-entra-suite-and-unified-security-operations-platform-now-generally-available\/\">Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/11\/simplified-zero-trust-security-with-the-microsoft-entra-suite-and-unified-security-operations-platform-now-generally-available\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Vasu Jakkal and Joy Chik| Date: Thu, 11 Jul 2024 16:00:00 +0000<\/strong><\/p>\n<p>Microsoft is announcing the Microsoft Entra Suite and the unified security operations platform, two innovations that simplify the implementation of your Zero Trust security strategy.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/11\/simplified-zero-trust-security-with-the-microsoft-entra-suite-and-unified-security-operations-platform-now-generally-available\/\">Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-24874","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24874"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24874\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}