PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA 46
IDENTITY IS THE KEY THAT
UNLOCKS DOORS
While it would be simple to fully disconnect
an enterprise from the wider Internet to
establish a virtual moat, the demands
of business won't allow it. Pressures are
ever-increasing from clients demanding
anytime anywhere access to services. If
your firm won't provide that, they'll take
their business elsewhere. This means
attorneys and staff need ready access to
firm-managed data on the go. Providing
that access is at odds with securing the
perimeter, but big data analysis can be
employed to learn and observe behavior
and classify that behavior as normal
or abnormal. Microsoft's Azure Active
Directory Premium service includes
behavior analysis that integrates global
network geographic assessment. For
example, you can be instantly alerted
to infeasible events, such as the same
user credentials being used in two
locations more quickly than transportation
constraints would allow. This is the same
type of analysis that financial services firms
use for fraud detection, and it is becoming
a baseline security expectation.
OUT OF THE SHADOWS
Evil may lurk around every corner of
our interconnected world, but big data
can shine a light on malicious attackers.
Microsoft is committed to empowering
individuals, corporations and governments
around the world to enjoy the information
security they deserve.
FEATURES
• Microsoft Digital Crimes Unit: news.microsoft.com/presskits/dcu
• Microsoft Malware Protection Center: www.microsoft.com/security/portal/mmpc/default.aspx
• Cyber Defense Operations Center: channel9.msdn.com/blogs/taste-of-premier/satya-nadella-on-cybersecurity
• Advanced Threat Analytics: www.microsoft.com/en-us/server-cloud/products/advanced-threat-analytics
• Azure Active Directory Premium: www.microsoft.com/en-us/server-cloud/products/azure-active-directory
Be instantly alerted to infeasible events, such
as the same user credentials being used in two
locations more quickly than transportation
constraints would allow.