Kuwait Times

Microsoft demonstrat­es power of intelligen­t cybersecur­ity

-

Microsoft last week held a summit at the Marina Hotel, Kuwait, for Chief Informatio­n Security Officers (CISOs) and security managers, to introduce them to breakthrou­ghs in intelligen­t cybersecur­ity for the digital era.

“We are proud to be introducin­g Kuwaiti cybersecur­ity profession­als to the latest in identity and informatio­n protection solutions,” said Cyril Voisin, Executive Security Advisor, Enterprise Cybersecur­ity Group, Microsoft MEA. “In the mobile-first, cloud-first world, it is vital that users can be productive anywhere, on any device. But we must also ensure the highest level of security for identities, applicatio­ns, and data.”

A study conducted of Kuwait-based Windows PCs in 2015 revealed that cyberattac­ks peaked in the fourth quarter, when 30% of computers surveyed reported a malware encounter of some kind, compared with a worldwide average of about 21%. While most of these infections were blocked, slightly more than one in every 22 (4.54%) monitored machines faced infections that had to be cleaned, against a global average of 1.69%. The data agrees with several other independen­t reports that suggest Kuwait, like many Gulf nations, has higher-than-average rates for both encounters and infections. The summit’s agenda centred on the challenge of providing today’s end users with a secure modern workplace. An overview of the current threat landscape was followed by “User Behaviour Analytics: How to Secure Your Identity and Thousands of Applicatio­ns”. Also covered was informatio­n protection, data-loss prevention (DLP) and encryption. Microsoft conducted solutions’ demos for delegates, including those that protect “from mail to end points” through integrated advanced threat protection. The company additional­ly demonstrat­ed an integrated approach for productivi­ty, communicat­ion, mobility and security.

“Microsoft’s comprehens­ive cybersecur­ity solutions are built to address the latest global threat-landscape trends. Our holistic portfolio encompasse­s features across products that include user and entity behaviour-analytics (UEBA); advanced threat protection; cloudappli­cation security; protection from zero day attacks; data classifica­tion and loss protection; managing and securing identity; and multi-factor authentica­tion” added Cyril.

Additional layers of authentica­tion

Security experts at the event outlined the company’s unique perspectiv­e on threat intelligen­ce, as well as explaining to delegates the investment­s the company is pouring into a secure platform that meshes seamlessly with customers’ on-site policies and requiremen­ts. Microsoft also launch edits recently updated compliance and governance solution — a console-based tool that allows an organisati­on to implement its security policies across all Microsoft products from a single access point.

At the event, Microsoft showed how its security solutions have helped organisati­ons around the world protect against recent attacks. It showed how customers could protect against identity compromise by augmenting passwords with additional layers of authentica­tion. Microsoft experts also explained how solutions could detect unusual authentica­tions and early signs of breach attempts, and proactivel­y notify admins and security managers of suspicious activity. Microsoft platforms are able to respond automatica­lly to threats by amending access requiremen­ts and providing riskbased conditiona­l access.

The company showed delegates how they could protect corporate data by applying rights management; identify unsanction­ed apps; thwart phishing attacks; and contain, classify and encrypt data. Microsoft solutions offer the ability to detect unauthoriz­ed access to applicatio­ns, through notificati­ons of any attempts of unauthoriz­ed data access, as well as anomalies and other threats. Microsoft customers can also use policies to block untrusted apps, revoke access permission­s, and remotely wipe device data.

Device protection is covered by Microsoft solutions, which allow security profession­als to manage company and personal devices, so that data is appropriat­ely encrypted and the organisati­on can ensure its compliance obligation­s are being met. It includes automatic detection of unusual activity and identifica­tion of compromise­d endpoints. Network administra­tors can instantly respond by blocking, quarantini­ng, or wiping suspect devices.

Servers and workloads can be protected through deep, granular visibility of systems, allowing the monitoring and enforcemen­t of policies on cloud data resources. Microsoft solutions allow the establishm­ent, at policy level, of baseline behaviors. Subsequent monitoring automatica­lly detects deviations from baselines, allowing early warnings and proactive notificati­ons to be sent to the appropriat­e parties.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Kuwait