Microsoft Improves Cloud Security


Microsoft has recently announced its huge developments in the cloud security sector that will allegedly improve the security of online companies. Microsoft plans to unveil more at the RSA Conference, taking place from February 29th to March 4th in San Francisco. These new developments include Customer Lockbox, Microsoft Cloud App Security, Azure Active Directory Identity Protection, and Microsoft Operations Management Suite.

Customer Lockbox: Lockbox helps Microsoft engineers achieve more transparency when they require access to Office 365 accounts to aid in troubleshooting. Lockbox aims to make the customer approval process more efficient. Lockbox is already available to those using Exchange Online.

Microsoft Cloud App Security: This application provides both security and control over data stored in app clouds, including SalesForce and Office 365. This application comes after the addition of security broker Adallom to the cloud giant. Office 365 was also upgraded in conjunction with Microsoft Cloud App Security: users will be made aware of suspicious activity. Uses will also have the choice of approving third party services.

Azure Active Directory Identity Protection: Microsoft has yet to unveil much about thus application, but it is expected that it will provide threat detection. It will utilize Microsoft’s data to investigate threats such as authentications from unfamiliar locations.


Microsoft Operations Management Suite: Some improvements were made to the Microsoft Operations Management Suite; users will receive information pertaining to malware detections, network activity, and system updates.



Bret Arsenault, Microsoft’s chief information security officer: “Keeping our network safe, while protecting our data and our customers’ data, is paramount. As Chief Information Security Officer at Microsoft, I am constantly looking for ways to improve our security posture, through new technologies that accelerate our ability to protect, detect and respond to cyber incidents… After years of examining crash dumps that our customers opted to send to Microsoft from more than a billion PCs worldwide, Microsoft has developed the capability to analyze this data to effectively detect compromised systems because crashes are often the result of failed exploitation attempts and brittle malware.”


Sarah Fender, principal program manager of Microsoft Azure Cybersecurity: “After years of examining crash dumps that customers sent to Microsoft from more than 1 billion PCs worldwide, we are able to analyze these events to detect when a crash is the result of a failed exploitation attempt or brittle malware. Azure Security Center automatically collects crash events from Azure virtual machines, analyzes the data, and alerts you when a VM is likely compromised…Starting next week, in addition to configuring a Security Policy at the subscription level, you can also configure a Security Policy for a Resource Group—enabling you to tailor the policy based on the security needs of a specific workload. Azure Security Center continually monitors your resources according to the policy you set, and alerts you if a configuration drifts or appropriate controls are not in place.”

[Source:- Cloudnewsdaily]