Skip to content

Microsoft rolls out more cybersecurity tools for customer protection in today’s digital world

By Larry Cochrane, Director of Industry Technology Strategy, Microsoft Power & Utilities on March 8, 2016

Filed under Power & Utilities

security 1_300A few months ago, we outlined how Microsoft is helping utilities stay secure in the face of cyberattacks on our critical energy facilities and infrastructures. At that time, we laid out for you the three pillars of Microsoft’s new security strategy, which focuses on building a platform that looks holistically across all the critical end-points, acting on the intelligence that comes from our security-related signals and insights, and fostering a vibrant ecosystem of partners who help us raise the bar across the industry.

Every day, we see that cybersecurity attacks are becoming more frequent and more sophisticated than ever. It’s scary to think that the average time attackers can stay in a network before detection is over 200 days! And that costs the global economy an estimated $500 billion, with the average cost of a single data breach to one company being up to $3.5 million. More than 75% of all network intrusions can be traced back to compromised credentials.

Helping you detect, investigate and respond to attacks

To help address these threats and protect companies like yours, over the last few weeks, we have made a number of enhancements to our platform to help IT enable rapid innovations while protecting valuable corporate data and assets, including:

security 5_300Windows Defender Advanced Threat Protection: our new Windows Defender Advanced Threat Protection service can help you detect and respond to advanced attacks on your networks. Building on the existing security defenses Windows 10 offers today, Windows Defender Advanced Threat Protection provides a new post-breach layer of protection to Windows 10 security. With a combination of client technology built into Windows 10 and a robust cloud service, it will help detect threats that have made it past other defenses, provide enterprises with information to investigate the breach across endpoints, and offer response recommendations.

Security 6_300Microsoft Azure Active Directory Identity Protection service: we’ve talked about this service in the past, and now it is available in public preview. To help give you peace of mind in the cloud, Azure Active Directory security capabilities are built on Microsoft’s experience protecting consumer identities, and gains tremendous accuracy by analyzing the signal from over 14 billion logins to help identify 30,000 potentially compromised users per day. Azure Active Directory Identity Protection builds on these results and detects suspicious activities for end users and privileged identities based on signals like brute force attacks, leaked credentials, sign ins from unfamiliar locations and infected devices. Based on these suspicious activities, a user risk severity is calculated and risk-based policies can be configured allowing the service to automatically protect the identities of your organization from future threats.

Security in a hybrid world

One of the things that sets Microsoft apart in the industry is our focus on delivering a complete hybrid identity solution. Our goal is to provide you with a set of great security and health monitoring systems to manage and protect your identity control plane not only in the cloud, as with Microsoft Azure Active Directory Identity Protection, but also on premise. Our Microsoft Advanced Threat Analytics service (ATA) is our service that brings Azure Active Directory style security monitoring and anomaly detection on premise to allow you to quickly and easily identify breaches and threats. ATA helps you protect your enterprise from advanced targeted attacks by automatically analyzing, learning, and identifying normal and abnormal entity (user, devices, and resources) behavior and then giving you a clear, actionable report on a simple attack timeline.

Security 4_300We never take your trust for granted

Microsoft continues to take bold steps in preparing utilities for digital transformation with our Trusted Cloud principles of security, privacy and control, compliance, and transparency. Our long experience running online services has involved extensive investment in technology that builds security and privacy into our development process. Over time, we’ve developed industry-leading security measures and privacy policies, giving you ways to prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. We help you enhance data protection and compliance, giving you all of the control, but none of the work. We’ve participated in international compliance programs with independent verification of how we measure up. In fact, Azure was the first cloud computing platform to conform to ISO/IEC 27018, the only international set of privacy controls in the cloud. This is all part of our broader commitment to protecting the security and privacy of our customers.

At Microsoft, we say that security is a journey and not a destination. We are committed to working closely with our partners, the security industry, and governments around the world, so that you are able to trust the technology you use and don’t view security as a barrier to your own business transformation.

If you are interested in learning more about Microsoft’s cybersecurity strategy, read our new Enterprise Security Progress Report, access our resources on the Microsoft Azure Trust Center, or contact your account manager for additional information.

LinkedIn: Larry Cochrane

Useful Links

Contact Us