PARTNER
Microsoft
Microsoft
0800008833

Microsoft (Nasdaq“MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

Product Type

  • Cloud Security
  • Contact Tiffany Chiu
  • Title Senior Secuirty GTM manager
  • Tel 0080-1444-242
  • Mail
https://www.microsoft.com/zh-tw/security/business/zero-trust
Microsoft booth in CyberSEC 2022
Microsoft booth in CyberSEC 2022
Microsoft booth in CyberSEC 2022
SPEECH
05/11 (Thu.) 09:30 - 10:00
The Practice and Application of AI in Microsoft Security: the New Era of Security

This session will share Microsoft's AI-integrated security solutions, including discussions on Microsoft Security Copilot, how to introduce the new generation of AI into the field of network security defense, and how to combine OpenAI's large language model (LLM) with Microsoft's proprietary security model. This will enable defenders to quickly detect and respond to threats through natural language conversations, taking security protection to a new level and empowering organizations to build cyber resilience.

More
Microsoft Taiwan Security Sr. Specialist manager
05/11 (Thu.) 10:15 - 10:45
Explore how Microsoft achieve information security and productivity using Zero Trust strategies.

This speech will showcase how Microsoft accomplish effective information security management by taking information security and employee productivity into consideration, as well as putting Zero Trust strategies into practice. In addition, the speech will also discuss the challenges corporates might face and their and solutions when implementing Zero Trust strategies, along with other useful tips and case studies.

More
Microsoft Taiwan Security Sr. Specialist manager
  • TOPIC
    Brand Day - Microsoft Taiwan
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Zero Trust Architecture
    Access Control
    Identity Management
05/11 (Thu.) 11:00 - 11:30
Entering the passwordless era: Exploring the next generation of identity verification

The current password authentication method no longer meets the security needs of the modern digital world. To enhance enterprise security, more and more companies are adopting passwordless authentication technologies, such as biometrics, smart cards, and mobile devices. This session will introduce the latest authentication technologies and how to use Microsoft's passwordless authentication solutions to build stronger security defenses.

More
Microsoft Taiwan Technical Specialist
05/11 (Thu.) 11:45 - 12:15
Applying machine learning for better data security management

This program will focus on how information security governance personnel should use data maps to take stock of the data within an organization, and how machine learning can address the pain points encountered during traditional data inventories. It will cover the construction of data fortresses and the use of automated methods for data encryption, access control, compliance management, and leak prevention.

More
Microsoft Taiwan Technical Specialist
  • TOPIC
    Brand Day - Microsoft Taiwan
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Information Governance
    AI Security
    Governance Risk & Compliance
PRODUCT x TECH DEMO x EVENT
SOLUTIONS

Get ahead of threat actors with integrated security solutions.

Learn more (https://www.microsoft.com/en-us/security/business/microsoft-defender)

Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Learn more (https://www.microsoft.com/en-us/security/business/microsoft-entra)

Manage and protect endpoints for better hybrid work experiences and lower total cost of ownership with Intune.

Learn more (https://www.microsoft.com/en-us/security/business/microsoft-intune)

Store, process, and dispose of personal information in compliance with local and global regulations.

Learn more (https://www.microsoft.com/en-us/security/business/microsoft-priva)

Safeguard all your data across platforms, apps, and clouds with comprehensive solutions for information protection, data governance, risk management, and compliance.

Learn more (https://www.microsoft.com/en-us/security/business/microsoft-purview)

Uncover sophisticated threats and respond decisively with an easy and powerful security information and event management (SIEM) solution, driven by the cloud and AI.

Learn more (https://www.microsoft.com/en-us/security/business/microsoft-sentinel)

WHITE PAPERS
The Comprehensive Playbook for a Zero Trust Security Strategy

Create a Zero Trust adoption plan that accommodates your organization’s unique risks and capabilities. With this flexible playbook, get foundational action items that help you strengthen security across six key risk areas.

Download The Comprehensive Playbook for a Zero Trust Security Strategy to:

  • Identify small changes that can make big improvements to your security.
  • Understand how deeper integration of key security pillars can simplify policy enforcement.
  • Learn how Zero Trust can increase efficiency and productivity in security posture management.
Modernize your security operations

As attackers develop modern attack techniques, it’s imperative that security teams work to continually modernize their security operations to stay prepared for adversaries.

We’ve created this guide drawing on best practices and lessons learned from the Microsoft Security Operations Center. Use the information to:

  • Address your technology stack to ensure you have protection and visibility across all attack vectors.
  • Assess the processes of your security operations team and help them separate true threats from false positives.
  • Learn 6 steps you can take right now to reduce your vulnerabilities and increase speed and efficiency for security teams defending against attacks.
  • The details in the guide will help you refine and focus your efforts to modernize your security operations and protect your organization in an evolving threat landscape.
4 Strategies to Address the Biggest Challenges in Data Security

Hybrid work, rapidly expanding data estates, and persistent talent shortages can make data protection and compliance increasingly difficult. Learn how to overcome these new challenges in this e-book that presents four strategies to:

  • Reduce insider risk and defend against identity-based threats.
  • Understand where your data is and control it across hybrid and multicloud environments.
  • Help security teams focus on sophisticated threats rather than routine data discovery and protection.
  • Simplify your security tool stack—and your work—with an integrated, holistic solution.
Three Reasons to Shift to Integrated Threat Protection

Replacing your security tool stack may seem as daunting as the multiplying cyberthreats your business faces every day. But while cybercrime is growing in complexity, deploying an integrated approach to security can make defending against threats simpler. Give your organization increased protection by integrating extended detection and response and a cloud-native security information and event management system.

Read 3 Reasons to Shift to Integrated Threat Protection to discover how to make your security operations center more efficient, proactive, and cost-effective. In this e-book, you’ll learn how to:

  • Consolidate individual security tools for increased protection and visibility.
  • Enable your security center employees to discover critical threats faster.
  • Use AI and automation to become more proactive against attacks.
  • Empower your employees to create and innovate confidently.
Zero Trust Adoption Report

The shift to hybrid work has made implementation of a Zero Trust framework the number-one priority for security decision makers. In fact, 96 percent consider adoption crucial to their organization’s success, and 73 percent anticipate increasing investment in Zero Trust security over the next two years.

Read more insights from 1,200 security decision makers around the world in the Zero Trust Adoption Report from Microsoft. You’ll learn:

  • Which risk areas companies are addressing first.
  • Best practices from organizations operating on a fully implemented Zero Trust framework.
  • Security advantages such as improved compliance agility, increased worker productivity, and quicker threat detection.
  • What Zero Trust security across networks, devices, services, and apps means for employee productivity.
  • How adaptable the Zero Trust framework is, and how it can be used to help meet the security needs of organizations using any cloud or platform.
VIDEO
Compliance Program for Microsoft Cloud

Today's digital world is all about data, and yours is most likely in several cloud locations.

Avoid vulnerabilities and risk with the help of our compliance program, a new solution encompassing Microsoft's Cloud services.

Cyber threats move fast, but Microsoft Sentinel helps customers move faster

Keep your company safe with a next generation, cloud native SIEM powered by AI, automation, and security expertise. Sentinel can map attacks across the entire kill chain, consolidate your insights and prioritize what matters for a more efficient and effective SOC. 

ICRC and ELCA (Satya Nadella's Keynote) @ Microsoft Inspire 2022

The International Committee of the Red Cross and Swedish Red Cross worked with our partner ELCA to use Microsoft technology to reunite families in the midst of a humanitarian crisis.