Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

8 Important Microsoft Azure Security Center Best Practices

From enabling multifactor authentication and extending protection beyond virtual machines to establishing rules around log analysis and remediation, here’s how businesses can get the most out of Azure Security Center.

Back 1 ... 3   4   5   6   7   ... 9 Next

5. Determine Who Owns Securing Software In The Cloud

Azure Security Center is effective at pulling together information from different sources, but it only works if there’s a team tasked with operational responsibility and ownership, according to Matt Chiodi, Palo Alto Networks’ chief security officer of public cloud.

The IT department traditionally has owned legacy on-premises environments, Chiodi said, but cloud development is usually owned by developers who are more focused on features and functionality on a day-to-day basis rather than security. As a result, Chiodi said who owns securing software in the cloud can often be a gray area for organizations.

As customers go into the cloud, Chiodi said they must delineate who’s responsible for what and implement a holistic approach to security that incorporates people, process and technology. Like the other cloud providers, Chiodi said Microsoft has spent a good deal of time over the past year or two beefing up its native security capabilities with new innovations, features and functionality in the platform.

Back 1 ... 3   4   5   6   7   ... 9 Next

sponsored resources