

Identity and access management
Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. Explore strategies and solutions that will help you secure access for all your employees, devices, and services
Refine results
Topic
Products and services
Publish date
-
As companies embrace the cloud and mobile computing to connect with their customers and optimize their operations, they take on new risks.
-
The CISO Perspective: Putting lessons from WannaCrypt into practice to avoid future threats
Last month, customers and companies around the world were impacted by the WannaCrypt ransomware attack. -
Tips for securing your identity against cybersecurity threats
This post is authored by Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. -
Best practices for securely moving workloads to Microsoft Azure
Azure is Microsoft’s cloud computing environment. -
How Microsoft 365 Security integrates with your broader IT ecosystem—part 2
In part 1 of our blog series, we shared the Microsoft 365 Security strategy for integrating with the broader security community. -
How Microsoft 365 Security integrates with your broader IT ecosystem—part 3
In the final part of this blog series, we highlight how Microsoft 365 Security solutions work together to help customers secure their IT environments. -
Protecting user identities
This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. -
Voice of the Customer: Walmart embraces the cloud with Azure Active Directory
Learn how Walmart embraced the cloud with Azure Active Directory. -
The evolution of Microsoft Threat Protection, November update
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure. -
Step 1. Identify users: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
CISO series: Strengthen your organizational immune system with cybersecurity hygiene
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization’s resiliency in the face of attacks and exploits. -
The evolution of Microsoft Threat Protection, December update
Last month, we shared updates on capabilities for securing identities, endpoints, user data, and cloud apps.