Microsoft Highlights Security Exposure Management at Ignite
Building on its broad security portfolio, Microsoft's new exposure management is now available in the Microsoft Defender portal, with third-party-connectors on the way.
At a Glance
- Microsoft's Security Exposure Management uses CTEM for unified vulnerability detection, analysis, and mitigation.
- Security Exposure Management emphasizes visibility into attack paths and their impact on critical business assets.
- Microsoft continues to differentiate itself by using extensive telemetry and integrating with third-party tools.
Microsoft is the latest big name to add continuous threat exposure management (CTEM) to its formidable security portfolio with the release of its new Microsoft Security Exposure Management offering. Microsoft made the announcement at its annual Microsoft Ignite conference this week.
Security experts describe CTEM, or proactive exposure management, as a programmatic and unified approach to detecting and mitigating threats. Gartner predicts that by 2026, organizations that embrace CTEM will see two-thirds fewer breaches.
Enterprise Strategy Group principal analyst Tyler Shields describes exposure management as the next iteration of vulnerability management.
"It's centered on the overlap of continuous asset discovery and management, threat and exposure analysis, and vulnerability discovery," Shields says. "If you can understand the assets you have, the state they are in, the vulnerabilities that exist, and the active threats against them, you are all prepared to secure your environment."
Microsoft initially introduced Security Exposure Management in March as a technical preview. It is now available in the Microsoft Defender portal, included with its E5 licenses, and as an option for various other Microsoft 365 licenses.
Unified Views of Attack Surfaces
With its entry, Microsoft seeks to enable defenders to prevent successful attacks by providing comprehensive and unified views of their organizations' broad attack surfaces, allowing them to take a more proactive approach to identifying and mitigating threats.
Read the Full Story on Dark Reading
Read more about:
Dark ReadingAbout the Authors
You May Also Like