den 26 september 2018
SQL Information Protection policy can now be managed in Azure Security Center. The policy management enables centrally defining customized classification and labeling policies, that will be applied across all databases on your tenant.
den 24 september 2018
Advanced Threat Protection detects anomalous database activities indicating potential security threats to Azure Database for MySQL.
den 24 september 2018
Advanced Threat Protection detects anomalous database activities indicating potential security threats to Azure Database for PostgreSQL.
den 22 augusti 2018
Azure Security Center provides you with visibility across all your resources running in Azure and alerts you of potential or detected issues. The volume of alerts can be challenging for a security…
den 6 augusti 2018
Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.
den 31 maj 2018
One of Azure’s most popular service is App Service which enables customers to build and host web applications in the programming language of their choice without managing infrastructure.
den 17 maj 2018
We have heard from our customers that investigating malicious activity on their systems can be tedious and knowing where to start is challenging. Azure Security Center makes it simple for you to…
den 15 maj 2018
We heard from our customers that they wanted an even simpler onboarding experience to Azure Security Center. Today, we are excited to announce the general availability of Azure Security Center’s…
den 19 mars 2018
Azure Security Center offers integration with various 3rd party security solutions to provide a unified view for alerting and monitoring of your Azure and non-Azure workloads.
den 13 mars 2018
We have heard from many customers about their challenges with detecting highly evasive threats. Today, we are discussing some of our more complex, heuristic techniques to detect malicious use of this vital protocol and how these detect key components of common real-world attacks.