Tag Search: advanced threat protection
Posted on Friday October 29, 2021 | microsoft, phishing, advanced threat protection, microsoft 365, anti impersonation, anti spoofing, safe links
Microsoft is an established provider of top-tier business productivity software — and its commitment to its subscribers’ cybersecurity is integral to that reputation. To combat phishing, one of today’s most prevalent cyberthreats, the software giant has equipped Microsoft 365 Defender with powerful features. Here are some of them.
Posted on Thursday October 15, 2020 | microsoft, phishing, advanced threat protection, microsoft 365, anti impersonation, anti spoofing, safe links
Phishing remains one of the top cyberthreats to businesses today. Because of this, Microsoft invests a lot of time into securing its email service.
Posted on Tuesday October 30, 2018 | safe links, phishing, office 365, microsoft, anti spoofing, anti impersonation, advanced threat protection
There are plenty of things to love about Office 365. For a small monthly fee, it gives you the latest cloud-based version of Microsoft Office apps and robust communication tools that improve collaboration and productivity. But it's also an extremely secure platform that can defend against the most cunning phishing attacks.
Posted on Thursday April 05, 2018 | windows server 2019, windows server, windows, virtualization, virtual machines, microsoft, containers, advanced threat protection
If Microsoft's latest server software is any indication, the virtualization trend shows no signs of slowing down. The first preview of Windows Server 2019 was released in March and includes a number of features focused on IT efficiency. Let's take a look at the most valuable updates for small businesses.
Posted on Friday May 12, 2017 | threat intelligence, security, office 365, compliance, advanced threat protection, advanced data governance
Microsoft has commercially released new products and upgrades that will secure company information. The threat intelligence and data governance features are designed for businesses that adhere to strict regulatory guidelines and need an extra layer of protection against cyberattacks. Here's a detailed look at what these additions can do for your business.
Page: 1