


Device management
Device management allows organizations to secure, and maintain devices like virtual machines, earn the latest in device management and how solutions like Microsoft Intune and Microsoft Entra help keep devices secure, up to date, and compliant.
Refine results
Topic
Products and services
Publish date
-
We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.
-
Secured-core PCs help customers stay ahead of advanced data theft
Secured-core PCs provide customers with Windows 10 systems that come configured from OEMs with a set of hardware, firmware, and OS features enabled by default, mitigating Thunderspy and any similar attacks that rely on malicious DMA. -
Cybersecurity best practices to implement highly secured devices
If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized. -
Zero Trust Deployment Guide for devices
Guidance on how to make your endpoints one of the strongest. -
3 ways Microsoft 365 can help you reduce helpdesk costs
Microsoft 365 Security is an integrated solution that helps you strengthen security, enhance productivity, and reduce costs. -
Blue Cedar partners with Microsoft to combat BYOD issues
IT and security teams have been searching for a solution to accommodate BYOD that won’t compromise network security. -
How companies are securing devices with Zero Trust practices
Organizations are seeing a substantial increase in the diversity of devices accessing their networks. -
Microsoft brings advanced hardware security to Server and Edge with Secured-core
Microsoft is collaborating with partners to expand Secured-core to Windows Server, Azure Stack HCI, and Azure-certified IoT devices. -
Secure unmanaged devices with Microsoft Defender for Endpoint now
New Microsoft Defender for Endpoint capabilities let organizations discover and secure unmanaged workstations, mobile devices, servers, and network devices. -
Windows 11 enables security by design from the chip to the cloud
Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. -
Securing your IoT with Edge Secured-core devices
To simplify your IoT security journey, today, we’re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we’re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. -
Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT
Microsoft Defender IoT is generally available to help organizations challenged with securing unmanaged Internet of Things devices connected to the network.