Tallan's Technology Blog

Tallan's Top Technologists Share Their Thoughts on Today's Technology Challenges

Inside the High-Tech, High-Stakes Race to Keep the Cloud Secure

Tallan Partner

Microsoft isn’t just fending off those attacks. It’s also learning from them.

All those foiled attacks, along with data about the hundreds of billions of emails and other pieces of information that flow to and from Microsoft’s cloud computing data centers, are constantly being fed into the company’s intelligent security graph.

Microsoft invests about $1 billion in cloud security each year.

It’s a massive web of data that can be used to connect the dots between an email phishing scam out of Nigeria and a denial-of-service attack out of Eastern Europe, thwarting one attack for one customer and applying that knowledge to every customer using products including the company’s Azure computing platform, Windows 10 operating system or Office 365 productivity service.

Those security threats have heightened substantially in recent years, as criminals have built lucrative businesses from stealing data and nation states have come to see cybercrime as an opportunity to gain information, influence and advantage over their rivals. That’s led to potentially catastrophic attacks such as the WannaCrypt ransomware campaign that’s made headlines in the past few weeks. This evolving threat landscape has begun to change the way customers view the cloud.

“It was only a few years ago when most of my customer conversations started with, ‘I can’t go to the cloud because of security. It’s not possible,’” said Julia White, Microsoft’s corporate vice president for Azure and security. “And now I have people, more often than not, saying, ‘I need to go to the cloud because of security.’”

CLICK HERE to read the full story and learn how Microsoft is transforming attempted cyber attacks into information to optimize its cloud security!

_________________________________________________________________________________________

To learn more on how Tallan’s Cloud technologists can help your organization optimize your cloud security to safeguard your data within the Microsoft Cloud, CLICK HERE.

No comments

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

\\\