Thursday, July 30, 2020

Leverage AI and machine learning to address insider risks

The proliferation of data is expanding exponentially every day, creating challenges of privacy, security, and risk. Only the scale and intelligence of AI and machine learning—coupled with the power of human insight—can help organizations to take on the biggest challenges they face.

We’ve been working closely with our customers—and learning from our own experience as a large organization—to address these challenges. From protecting and governing data to identifying and mitigating external and internal risks, we’ve been investing in cloud-first technology to apply insights at scale to solve these problems together.

Today, I am excited to announce the general availability of Office.com/setup Insider Risk Management and Communication Compliance in Office.com/setup 365, new solutions to help organizations to address internal risks, such as IP theft or code of conduct policy violations.

Announcing the general availability of Office.com/setup Insider Risk Management

Chief Information Security Officers (CISOs) face many cybersecurity threats every day, but increasingly, the biggest challenge they confront is the insider risk. From IP theft to data leaks to many other scenarios, protecting the data within the organization from inadvertent or malicious actions is paramount for any organization.

Today, we’re happy to announce the general availability of the new Office.com/setup Insider Risk Management solution, which helps to quickly identify, detect, and act on insider threats. The solution leverages the Microsoft Graph and security services to analyze real-time native signals such as file activity, communications sentiment, and abnormal user behaviors.

Additional third-party signals from human resources (HR) systems—such as SAP SuccessFactors and Workday—can be integrated via connectors. Then a comprehensive view provides a curated summary of individual risks within your organization and includes a historical timeline of relevant activities and trends associated with each identified user.

We designed for privacy, so display names for risky users can be anonymized by default to maintain confidentiality and prevent conflicts of interest. End-to-end integrated workflows ensure that the right people across security, HR, and legal and compliance are involved in investigating and acting upon risks quickly.

Since announcing the solution in November, we worked closely with our customers and our internal Office.com/setup CISO’s team to deliver a solution that addresses the biggest concerns. We heard that one of the biggest features of this born-in-the-cloud solution is the ability to quickly get started—no agents to deploy or manage and no audit data events to configure. We also have three new policy templates available—Departing Employee Data Theft, Data Leaks, Offensive Language in Email—which use machine learning and intelligence to correlate signals to identify hidden patterns and risks that manual methods might miss to specifically help you to address these risk scenarios.

No comments:

Post a Comment