Microsoft has created the Cyber Defense Operations Center

Tuesday’s Government Cloud Forum with Microsoft held great news for enterprise users of Microsoft’s products, with the announcement of both the Cyber Defense Operations Center (CDOC) and the Enterprise Mobility Suite to aid in protecting user data in the workplace. Microsoft also detailed its new Enterprise Cybersecurity Group. Speaking at the Government Cloud Forum, Microsoft’s CEO Satya Nadella, mentioned that “160 million customer records have been compromised so far in 2015, and it takes an average of 229 days to detect a hack”.

Microsoft’s efforts to create and operate the CDOC will include live support for callers from people familiar with all branches and divisions of Microsoft’s products, even including Windows and XBox. Microsoft’s new approach to security management with the CDOC will be to “protect, detect, and respond to security threats” according to Bret Arsenault, Microsoft’s Chief Information Security Officer. He goes on to detail that the Protect aspect will involve offering the end-to-end security of both hardware and software applications. The Detect section involves utilizing the power and scale of the cloud, as well as machine learning, to diagnose threats and breaches. Arsenault also details the Respond aspect, which the CDOC will enable Microsoft to do at a large-scale. The Microsoft Enterprise Cybersecurity Group will act similarly to the CDOC, but do so, specifically for organizations and give support while they “modernize their IT platforms, securely move to the cloud, and keep data safe”, Arsenault writes. Microsoft’s Enterprise Mobility Suite will work on a more local level, with features that aid in preventing loss of data through both accidental and intentional means.

The implementation of the EMS will also help in securing user data, according to Nadella’s Tuesday keynote. The security features built into Windows 10 will be able to work alongside those found in Office 365, Microsoft Azure and the EMS to create a “holistic, agile security platform” for users to take advantage of.

Share This
Further reading: , , ,