Microsoft Zero Trust Security

Поділитися
Вставка
  • Опубліковано 5 гру 2020
  • #Microsoft #Security #ZeroTrust #MicrosoftZeroTrust
    What is Zero trust?
    What are Microsoft Zero Trust Principles?
    What Zero Trust Security strategy can help you improve overall security posture?
    Microsoft Zero Trust Principles or Microsoft Zero Trust Security are the guidelines that will help you secure all the six digital states of your enterprise. Learn how we have transitioned from Information system security model to cyber security model, with the proliferation of devices, applications, and services. Get insights in terms of knowing, how the old traditional security strategies are no longer enough for our current connected world.
    Microsoft’s Unified intelligence XDR capabilities makes is exceptionally operational to implement best security strategies to improve overall security posture of your enterprise.
    Microsoft Official documentation - www.microsoft.com/en-us/secur...
    Microsoft Zero Trust Security Maturity Model Paper - go.microsoft.com/fwlink/p/?Li...
    Regards,
    ConceptsWork
  • Наука та технологія

КОМЕНТАРІ • 30

  • @sufi1321
    @sufi1321 3 роки тому +2

    You are the best!
    Very detailing...
    Respect!!

  • @narendra7338
    @narendra7338 2 роки тому

    By far the best explanation on Zero Trust Security. This is awesome content Sir. Absolute gold ❤️

  • @nonaelena
    @nonaelena 3 роки тому +1

    Best video I've seen on this topic! Thanks a lot! :)

  • @ec0321
    @ec0321 3 роки тому +4

    Worth watching! Keep posting!

  • @chaminda512
    @chaminda512 3 роки тому +2

    Please continue ❤

  • @khotesagar
    @khotesagar Рік тому

    Extremely good video to understand Zero trust security model

  • @NB-PigPig
    @NB-PigPig 3 роки тому +2

    Thank you for informative training class.

  • @bulujena4302
    @bulujena4302 3 роки тому +2

    Thank you for sharing the valuable information..it so informative

  • @AmitSingh-mr3cd
    @AmitSingh-mr3cd Рік тому

    very nice explanation , much appriciated !!. Thanks for putting your effort and explaining in structured way ..

  • @parampreetsingh3263
    @parampreetsingh3263 3 роки тому +1

    Quite structured and informative session. Good work

  • @aakashkumar5016
    @aakashkumar5016 3 роки тому +1

    Nice Explanation. Thank you very much for your effort !!

  • @subhambanerjee4632
    @subhambanerjee4632 6 місяців тому

    @concepts work: Regenerate subtitle, it is not matching with your statement.

  • @tariqshahzad8126
    @tariqshahzad8126 Рік тому

    Good explained

  • @shakayashibani4750
    @shakayashibani4750 Рік тому

    what are the areas zero trust covers?

  • @tastaslim
    @tastaslim 3 роки тому

    Can you share in which order, Should I watch all of your playlist? I am a developer with 5 months experience and a little bit familiar with Azure Services.

  • @aaabbb1800
    @aaabbb1800 3 роки тому +1

    Can you please make a video on how to implement ZT using Microsoft security products with what all products are required with their license information and steps to configure and setup and small demo to illustration zero trust. Please🙏BTW great video as usual!

    • @ConceptsWork
      @ConceptsWork  3 роки тому +1

      For sure, this playlist has some more in deapth videos for identity, endpoint and applications.

    • @aaabbb1800
      @aaabbb1800 3 роки тому

      @@ConceptsWork Thanks waiting!
      Please upload as soon as possible
      Waiting 😇

  • @dod608
    @dod608 3 роки тому

    can you please Cover Microsoft Information Protection and information Governance? also demo through the compliance center and all features

    • @ConceptsWork
      @ConceptsWork  3 роки тому +1

      Yes, it is next in pipeline, after Microsoft defender for endpoints.

  • @ecloudnt
    @ecloudnt 2 роки тому +1

    Again, I need to contact you please

    • @ConceptsWork
      @ConceptsWork  2 роки тому

      Please contact at learnconceptswork@gmail.com

  • @ramadaneel8048
    @ramadaneel8048 Рік тому

    As far as I know Microsoft is the most porous operating system which is loved by hackers and highly prone to virus.