• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Microsoft Threat Protection: What security and IT admins need to know

Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity

November 18, 2020
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

February 25, 2021
8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

February 25, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

February 25, 2021
Innovative solutions for IT workers at home

ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

February 24, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

February 24, 2021
Innovative solutions for IT workers at home

SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

February 23, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

February 23, 2021
How to use Microsoft Sysmon, Azure Sentinel to log security events

OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

February 22, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

February 22, 2021
8×8 makes raft of updates to platform

Indonesian Mobile Operator Selects NTT for Microsoft Security Project

February 22, 2021
Microsoft To Build New Azure Cloud Data Centers In Greece

NTT completes Microsoft security project for Indonesian mobile operator

February 19, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Data insights without limit, security without compromise

February 18, 2021
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Thursday, February 25, 2021
  • Login
Azure Security News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    A moment of reckoning: the need for a strong and global cybersecurity response

    Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

    Innovative solutions for IT workers at home

    ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

    A moment of reckoning: the need for a strong and global cybersecurity response

    ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

    Innovative solutions for IT workers at home

    SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

    8×8 makes raft of updates to platform

    Indonesian Mobile Operator Selects NTT for Microsoft Security Project

    Microsoft To Build New Azure Cloud Data Centers In Greece

    NTT completes Microsoft security project for Indonesian mobile operator

    A moment of reckoning: the need for a strong and global cybersecurity response

    Data insights without limit, security without compromise

    8×8 makes raft of updates to platform

    What Is Object Storage?

    A moment of reckoning: the need for a strong and global cybersecurity response

    Azure Firewall Premium now in preview

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech
    • All
    • Apps
    • Gear
    • Mobile
    • Startup
    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

    8×8 makes raft of updates to platform

    Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

    How to use Microsoft Sysmon, Azure Sentinel to log security events

    OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

    Microsoft To Open Azure Cloud Data Center Region In Spain

    EMC Corporation Townsend security Hewlett-Packard Enterprise Gemalto N.V. Microsoft Azure Google Thales e-security International Business Machines (IBM) Broadcom

    A moment of reckoning: the need for a strong and global cybersecurity response

    Azure Engineer at VillageMD

    Innovative solutions for IT workers at home

    How to Sync On-Premise Active Directory Passwords with Office 365 and Google Apps in Real-Time

    Microsoft Azure Forms Collaboration to Enhance AI in Healthcare

    Azure Defender is now available for all IoT and OT devices

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Google and Microsoft ID Group Targeting Security Researchers

    Innovative solutions for IT workers at home

    Microsoft Releases Application Guard for Office, Plus Azure Security Center and Azure Defender for IoT Products

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
    • All
    • Gaming
    • Movie
    • Music
    • Sports
    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Twitter tweaks video again, adding view counts for some users

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    People are handing out badges at Tube stations to tackle loneliness

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    This Filipino guy channels his inner Miss Universe by strutting in six-inch heels and speedos

    Oil spill off India’s southern coast leaves fisherman stranded, marine life impacted

  • Lifestyle
    • All
    • Fashion
    • Food
    • Health
    • Travel
    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Offers More ‘Solorigate’ Advice Using Microsoft 365 Defender Tools

    A moment of reckoning: the need for a strong and global cybersecurity response

    Solar Winds, Office 365 & Shipbuilding…

    Aruba ClearPass Policy Manager Integrates with Microsoft

    Imprivata Expands Collaboration with Microsoft on New Digital Identity Innovations

    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Canada’s 10 biggest stories of 2020

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    AMD breaks revenue records for 2019 and 4Q

    AMD breaks revenue records for 2019 and 4Q

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft is killing off insecure Cloud App Security cipher suites

    Microsoft is killing off insecure Cloud App Security cipher suites

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Azure Security News
No Result
View All Result
Home Uncategorized

Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity

by AZURE SECURITY NEWS EDITOR
November 18, 2020
in Uncategorized
0
Microsoft Threat Protection: What security and IT admins need to know
496
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

With so many people working from home due to COVID-19, cloud applications have become the way to stay connected and get work done, whether that’s with Teams, Office 365, Salesforce, Zoom, virtual desktops – or something you’ve never heard of that an employee has found for themselves and started using. Even more than in an office, the proliferation of cloud apps can turn into a shadow IT security worry – and depending on how access to company data is set up, it might impact home internet bandwidth.

The cloud app discovery tools in Microsoft Cloud App Security (MCAS) are usually seen as a way to get shadow IT under control because they handle SaaS, IaaS and PaaS resources. But simply blocking a service that someone is using to get their job done will only drive them to try a different one. A better approach is to use MCAS to assess which apps are in use, set policies for what’s acceptable, and educate staff on alternatives. In combination with other tools like Microsoft Endpoint Manager, IT departments can prioritise productivity as well as security, improving staff experience as well as protecting data.

That’s the sort of approach Microsoft cybersecurity CVP Ann Johnson calls digital empathy: providing both strong security and a great user experience.

Forrester’s new report, The Total Economic Impact Of Microsoft Cloud App Security, suggests that the service pays for itself in three months, and shows just how many cloud apps are in use that IT teams know nothing about. Using logs from firewalls, secure web gateways and Security Information and Event Management (SIEM) solutions, connectors and reverse-proxy integration with identity and access management tools, MCAS discovered more than 5,000 cloud apps in use at all four organisations in the study.

One medical device manufacturer found almost 9,000 cloud apps in use on their 50,000 devices – 1,600 of which it wanted to shut down straight away because MCAS shows that they don’t comply with regulations to which the company is subject. Ironically, knowing which cloud apps were compliant meant the company could actually move more data to cloud services than before, because it was confident about compliance, governance and the ability to audit data usage. Making the switch to cloud apps means that employees working from home aren’t limited by the VPN bandwidth to on-premise applications they’re now accessing remotely; many organisations have found that to be a bottleneck they couldn’t scale quickly during lockdown.

The companies in Forrester’s study also found they had 75% fewer security issues, and were discovering security issues much quicker. Partly that’s getting alerts for anomalies and suspicious behaviour on user accounts that have been compromised, like mass downloads, and typical malware or ransomware activity. But it’s important just to know what you have, Joanna Harding, product marketing manager for Microsoft Cloud App Security, told TechRepublic. “You can’t reduce time to remediate if you don’t know what you have in your environment.”

Monitoring Microsoft

Microsoft has been using the service to monitor cloud app usage on its own employee devices since 2017 (and no, the 156,000 Microsoft staff don’t only use Microsoft applications). Cloud apps that don’t meet company policies get blocked, while popular apps that do meet the standards are added to the Azure AD single sign-on list to make them easier to use. Microsoft also applies security controls to the apps (like enforcing least privilege so users aren’t using admin accounts everywhere) and monitors usage for anomalies that could mean an attacker has compromised an employee account.

Seeing all the signals in the same place makes it easier for security analysts in the Security Operations Center (SOC) to see not just the alerts that suspicious activity triggers, but also what other systems might have been affected, says Harding — who used to work in Microsoft’s SOC. Queries can also be customised so that behaviour which is normal for your employees in the current situation doesn’t trigger alerts – even if it might have counted as suspicious six months ago when staff weren’t working from home. That reduces false positives.

“When something happens that does get through the safety net and we end up getting an alert, then we can backtrack with MCAS and quickly see all of the places that particular entity or identity touched, and then write very accurate policies against that to prevent it from happening again. So what comes into the true positive queue really is a clean signal,” Harding explained. That means you can use the option in the dashboard to revoke a user token and force them to sign in again using MFA to block attackers without affecting the productivity of employees who are in the middle of actual work.

When it comes to moving users off the shadow IT cloud apps that you’re not comfortable with, you can make the experience more helpful than just blocking the app so employees can’t get into it, Harding pointed out.

“There are ways to customise the policy for a particular interaction. Let’s say an end user goes to click on an application that they’re using, and the security team has decided to close down that application. They can customise the policy to say in a splash screen ‘hey, we’re not using this application anymore, you can go here, you can use that application’; they can redirect their users in a very functional way to help them. There’s also a lot of user coaching that has been deployed recently within MCAS to help users understand what it is that they’re interacting with; that [an app] is blocked because it’s proxying a session, or what have you. There are lots of ways the user is impacted in a positive way.”

MCAS collects (anonymised) data about apps over time, including how much bandwidth they consume. This can be combined with the new Productivity and Network scores in Microsoft Endpoint Manager (available under Reports in the Microsoft 365 Admin Center for any location where you have computers running the OneDrive for Business sync client), which show how quickly devices boot and whether they have good connectivity to Office 365 resources like Exchange and Teams. You can then include coaching in the custom messages about cloud apps that consume a lot of network traffic, directing employees to the apps you’d prefer them to use that won’t put as much strain on their internet connection.

Reference: https://www.techrepublic.com/article/microsoft-cloud-app-security-this-software-can-help-you-to-manage-shadow-it-and-boost-productivity/

Share198Tweet124Share50
AZURE SECURITY NEWS EDITOR

AZURE SECURITY NEWS EDITOR

Related Posts

Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

Azure Digital Twins now generally available: Create IoT solutions that model the real world

by AZURE SECURITY NEWS EDITOR
December 18, 2020
0

Today, organizations are showing a growing appetite for solutions that provide a deeper understanding of not just assets, but also...

What’s New: Reduce alert noise with Incident settings and alert grouping in Azure Sentinel

by AZURE SECURITY NEWS EDITOR
December 6, 2020
0

This installment is part of a broader series to keep you up to date with the latest features in Azure...

What’s New: Cross Workspace Incident View in Public Preview!

by AZURE SECURITY NEWS EDITOR
December 6, 2020
0

This installment is part of a broader series to keep you up to date with the latest features in Azure...

Microsoft Seriously Beefs Up Security in Windows Server 2019

Get to know cloud IoT services on AWS, Azure and Google Cloud

by AZURE SECURITY NEWS EDITOR
December 6, 2020
0

AWS, Microsoft and Google offer a range of cloud IoT services, as each tries to gain a foothold in this...

  • Trending
  • Comments
  • Latest
Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

AZURE DEFAULT RESOURCE GROUP AND DEFAULT WORKSPACE: WHAT ARE THEY?

December 14, 2020
Microsoft Seriously Beefs Up Security in Windows Server 2019

TCS Launches Cloud Exponence on Microsoft Azure

January 21, 2021
Microsoft Launches Host of Security Products in Time for RSA

Microsoft to add two new Microsoft 365 security, compliance bundles to its line-up

November 26, 2020

Lady Gaga Pulled Off One of the Best Halftime Shows Ever

0

Barack Obama’s Now Mainly Focusing on Wearing This Casual Backwards Hat

0

Watch Justin Timberlake’s ‘Cry Me a River’ Come to Life in Mesmerizing Dance

0
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

February 25, 2021
8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

February 25, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

February 25, 2021
Azure Security News

Copyright © 2020 - Azure Security

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2020 - Azure Security

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In