Microsoft
Kim, Gwi Ryun Global Security Program Manager
Microsoft protects customers from the escalating and sophisticated cyber threats posed by nation-state hacking organizations worldwide. This presentation explains how Microsoft utilizes advanced technologies, including Microsoft Threat Intelligence, to safeguard customers. It showcases key cyber attack incidents perpetrated by nation-state actors. Participants will gain insights into the importance of strengthening cybersecurity through Microsofts leadership and innovative solutions, and learn practical approaches to mitigating cyber threats through real-life examples. The presentation aims to enhance cybersecurity awareness and emphasize Microsofts commitment to customer safety.
Our approach to security is comprehensive as we believe that anything less than comprehensive security is no security at all. We have a unique understanding of today’s security challenges because we live this fight every single day. We secure devices, identities, apps, clouds?the fundamental fabric of our customers’ lives?across security, compliance, identity, endpoint management, and privacy as well as multicloud and multi-platform. Our products are also deeply integrated to provide a simplified and unifying experience. We have a unique outside-in and inside-out approach combined with the power of AI and automation that provides unprecedented visibility and protection, helping customers scale faster and reduce the time between reality and our view on reality. We are the experts that experts go to and we’re allies on their journey. And as we innovate products across all aspects of the customer experience, we’re uniquely positioned to meet the security needs of the future so you can innovate faster and further. After all, we know just how mission critical this work is?and we’re in it together.
Microsoft Security provides the most comprehensive approach to security. Eliminate gaps and get simplified, best-in-breed protection with built-in intelligence so you can be fearless as you innovate and grow in a changing world.
Microsoft Defender and Microsoft Sentinel are our XDR and SIEM solutions. They deliver threat protection for identity, email, data, apps, and more as well as cloud security to protect your workloads in the cloud no matter which platforms you are on and which cloud providers you use.
Microsoft Entra is the new product family name for identity and access solutions from Microsoft.
Our growth vision for identity and access goes beyond traditional identity management to give our customers entire toolset to secure access for everyone to everything in multi-cloud and multi-platform environments. We’re building these capabilities as a trust fabric that can serve the entire digital ecosystem, and Microsoft Entra name encompasses this expanded vision.
Microsoft Purview solutions help customers govern, protect, and manage data across both Microsoft and non-Microsoft assets.
Understanding and governing data is critical for customers to establish the foundation for effective data governance and usage. Once customers discover and map information in their organization, they can then put the right data sharing and usage policies in place.
Now that data has been identified, customers need to ensure it will be secured. Apply sensitivity labels, classify data, and create protection policies to prevent accidental data sharing.
Privacy management has become an important topic among our customers, driven by regulations as well as the expectation of their customers. Microsoft Priva is a new capability we introduced in November 2021 to provide you a set of tools to manage privacy and build a privacy resilient workspace by identifying and remediating privacy risks and automating privacy operations and responses to subject rights requests.
Microsoft Endpoint Manager provides management capabilities critical to effectively protect all your endpoints spanning from Windows to Linux and to macOS. It helps ensure devices are up to date, manage security policies, and implement Zero Trust strategies. Like identity access and management, endpoint management is another foundational block to security. The secure adaptive access mentioned earlier is also enabled by assessing the condition of the endpoint itself ? such as what is status of its hardware and software and which network it is accessing from, before granting access.
Tel : 02-531-4051
Email : sangjp@microsoft.com
Homepage : https://www.microsoft.com/ko-kr/security