


Endpoint security
As workforces become more distributed, securing endpoints has grown more complex. Learn how to protect vulnerable endpoints—like laptops and mobile devices— from malicious actors and exploits, which often target them as entry points to corporate data.
Refine results
Topic
Products and services
Publish date
-
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.
-
Microsoft’s 4 principles for an effective security operations center
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC. -
Unifying security policy across all mobile form-factors with Wandera and Microsoft
The way we work is evolving. Technology enables more effective employees by helping them to be productive where and when they choose. -
Microsoft and Corrata integrate to extend cloud app security to mobile endpoints
Corrata’s Microsoft Cloud App Security integration addresses risk mitigation through endpoint-based discovery and control for cloud apps. -
Microsoft Defender for Endpoint now supports Windows 10 on Arm devices
Today, we are excited to announce that Microsoft Defender for Endpoint support of Windows 10 on Arm devices is generally available. -
Microsoft a Leader in 2021 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools
Adapting to the evolving business landscape, organizations increasingly depend on Microsoft Endpoint Manager to enable hybrid work—where the endpoint is the new workplace. -
How IT and security teams can work together to improve endpoint security
The threat landscape has changed over the last few years. -
Microsoft recognized as a Leader in the 2022 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools
This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools. -
Secure your endpoints with Transparity and Microsoft
When it comes to cybersecurity, the ability to normalize and correlate disparate logs from different devices, appliances, and resources is key, as is the ability to react quickly when under attack. -
Microsoft Intune: 5 endpoint management predictions for 2023
Are you wondering what initiatives to prioritize in the new year? This blog distills some of the major forecasts for 2023, from technology to new worker behavior. -
Secure your business like you secure your home: 5 steps to protect against cybercrime
Learn five simple actions small and medium-sized businesses can take to protect against evolving cyberattacks, as well as where to access tools and resources for securing your company. -
Learn what an AI-driven future means for cybersecurity at Microsoft Secure
Vasu Jakkal invites you to join us at the Microsoft Secure digital event to discover exciting product announcements and what an AI-driven future means for cybersecurity.