05-27-2020 , 04:14 PM
Quote:You may have noticed the deep integration between endpoint security and endpoint management, both in your changing requirements and within the Microsoft 365 product experience. Microsoft Endpoint Manager now includes a single pane of glass for all endpoint security actions, such as endpoint configuration, deployment, and management. In this post, I’ll go deeper into the evolution of unified endpoint security and how Microsoft 365 keeps you ahead in the modern cybersecurity landscape.
The Microsoft Endpoint Manager team is working with our Microsoft 365 customers every day, and we consistently hear from them that there's a clear division between security and IT teams.
Security teams aim to protect their organizations from malicious actors, and they employ specific tools and procedures to help them achieve protection.
The goal of IT teams is end-user productivity and helping users to be efficient and effective in their roles.
In many organizations these are disconnected objectives that can cause friction between teams. Security teams are deploying extra agents, slowing down boot times and impacting end-user experience . IT teams aren’t patching fast enough or securing their operating systems strongly enough, and they are deploying vulnerable applications.
It can seem as if there’s a brick wall between these teams, and that brick wall can interfere with effective enterprise security management.
The Microsoft approach to security and IT management is different. With security and management integration across the entire Microsoft 365 product suite, we’re breaking down the brick wall between security and IT to help make both teams more effective for your organization.
With many customers moving to Microsoft Defender Advanced Threat Protection (ATP) as their primary endpoint security solution, we identified the need to provide dedicated security administrator experiences.
A security administrator can work for the IT organization or the security organization, and day-to-day responsibilities include defining IT security policies, deploying security configuration, and running vulnerability assessments.
More info HERE