Select Page
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help ... continue reading

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading

Tapping the intelligent cloud to make security better and easier

There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in ... continue reading

Complying with General Data Protection Regulation (GDPR) on Microsoft Data Platform technologies

This post is authored by Frederico Pravatta Rezende, Senior Product Marketing Manager, CADD & AI. Is your organization prepared for the General Data Protection Regulation (GDPR)? If your company does business in Europe, you’ll need to be aware of this ... continue reading
What’s new in SSMS 17.5: Data Discovery and Classification

What’s new in SSMS 17.5: Data Discovery and Classification

This post is authored by Alan Yu, Program Manager, SQL Server. We are excited to announce the release of SQL Server Management Studio (SSMS) 17.5! Download SSMS 17.5 and review the Release Notes to get started. SSMS 17.5 provides support ... continue reading
How Microsoft tools and partners support GDPR compliance

How Microsoft tools and partners support GDPR compliance

This post is authored by Daniel Grabski,Executive Security Advisor, Microsoft Enterprise Cybersecurity Group. As an Executive Security Advisor for enterprises in Europe and the Middle East, I regularly engage with Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and ... continue reading