Story image

Microsoft enterprise security tools, coming next August

23 Jul 15

Microsoft has announced its Advanced Threat Analytics (ATA) solution will be generally available next month, along with Azure Rights Management Support for Office for iPad.

The ATA solution is an on-premises cyber security product that helps companies identify advanced persistent threats before they can cause damage, says Brad Anderson, Microsoft corporate vice president Enterprise Client and Mobility.

“ATA is based on technology from our recent acquisition of Aorato, and it is designed to help customers protect their organisation from advanced targeted attacks.

“Since previewing ATA at Ignite in May, we have seen thousands of customers try the ATA preview every week," he says.

According to Microsoft, the product detects advanced security threats fast via behavioural analytics that leverage Machine Learning; uses a simplified attack timeline; reduces false positive fatigue; helps to identify known security issues and risks, and presents all of this information in a social media-like feed.

Microsoft also announced the general availability of support for its Azure Rights Management service for Office for iPad. 

As a result, company administrators can set up rules for what employees can do with certain files. This support begins with Word, PowerPoint, and Excel.

Securing user productivity across a growing range of mobile devices is a key benefit of EMS (Microsoft’s Enterprise Mobility Suite) via the Azure Rights Management service, says Anderson.

"As the value and necessity of EMM (electronic mobility management) grows, we see customers evolving their approach, innovating, and bringing new needs and demands every day.

"On a really regular basis I see the traditional point solution MDM (mobile device management) vendors, or the identity and access management vendors, struggling to keep up with these demands - customers are seeking more comprehensive and holistic solutions that are architected for (and can scale to) the cloud," says Anderson.

ATA will be available for customers to purchase standalone, as well as part of the Microsoft Enterprise Mobility Suite and the Enterprise Client Access License (ECAL) in August 2015.

In the first full fiscal year of EMS sales, more than 17,000 customers have purchased Microsoft's enterprise mobility services, according to Anderson.

The EMS provides security across multiple layers, covering identity and access management, mobile device and application management, and persistent information protection at the level of the file itself.

TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.
HPE promotes 'circular economy' for end-of-use tech
HPE is planning to show businesses worldwide that throwing old tech and assets into landfill is not the best option when it comes to end-of-use disposal.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
CSPs ‘not capable enough’ to meet 5G demands of end-users
A new study from Gartner produced some startling findings, including the lack of readiness of communications service providers (CSPs).
Oracle announces a new set of cloud-native managed services
"Developers should have the flexibility to build and deploy their applications anywhere they choose without the threat of cloud vendor lock-in.”
How AT&T aims to help businesses recover faster from a disaster
"Companies need to be able to recover and continue operations ASAP, without pulling resources from other places to get back up and running."