


Identity and access management
Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. Explore strategies and solutions that will help you secure access for all your employees, devices, and services
Refine results
Topic
Products and services
Publish date
-
We debunk the myths about Password Hash Sync (PHS) so you can gain security benefits by using the full capabilities of this service.
-
Investigating identity threats in hybrid cloud environments
Announcing a new identity threat investigation experience. -
5 principles driving a customer-obsessed identity strategy at Microsoft
The cloud era has fundamentally changed the way businesses must think about security and identity. -
Preparing your enterprise to eliminate passwords
If you’re a CIO, a CISO, or any other exec at a company who is thinking about digital security, the user name/password paradigm is more than a hassle, it’s a true security challenge, which keeps many of us up at night. -
One simple action you can take to prevent 99.9 percent of attacks on your accounts
Learn about common vulnerabilities and what you can do to protect your company from attacks. -
Your password doesn’t matter—but MFA does!
Turn on MFA and start building a long-term authenticator strategy that relies on “phish proof” authenticators, such as Windows Hello and FIDO. -
Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant
In Gartner’s third annual Magic Quadrant for Cloud Access Security Brokers (CASB), Microsoft was named a Leader based on its completeness of vision and ability to execute in the CASB market. -
Improve security with a Zero Trust access model
Microsoft Corporate Vice President and CISO, Bret Arsenault, describes how Microsoft is approaching Zero Trust with advice for applying learnings to your organization. -
Microsoft announces new innovations in security, compliance, and identity at Ignite
Top 10 announcements from the Microsoft Ignite Conference across security, compliance, and identity. -
Zero Trust strategy—what good looks like
Zero Trust is a model that will ultimately be infused throughout your enterprise and should inform virtually all access decisions and interactions between systems. -
5 identity priorities for 2020
Joy Chik, Corporate Vice President of Identity, shares five priorities central to security that organizations should prioritize in 2020. -
Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other
A connected workforce is fundamental to business.