Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Azure for Decision Makers

You're reading from   Azure for Decision Makers The essential guide to Azure for business leaders

Arrow left icon
Product type Paperback
Published in Sep 2023
Publisher Packt
ISBN-13 9781837639915
Length 146 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (3):
Arrow left icon
Jason Milgram Jason Milgram
Author Profile Icon Jason Milgram
Jason Milgram
David Rendón David Rendón
Author Profile Icon David Rendón
David Rendón
Jack Lee Jack Lee
Author Profile Icon Jack Lee
Jack Lee
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Chapter 1: Introduction 2. Chapter 2: Modernizing with Hybrid, Multicloud, and Edge Computing FREE CHAPTER 3. Chapter 3: Migration and Modernization 4. Chapter 4: Maximizing Azure Security Benefits for Your Organization 5. Chapter 5: Automation and Governance in Azure 6. Chapter 6: Maximizing Efficiency and Cost Savings in Azure 7. Next Steps
8. Index 9. Other Books You May Enjoy

Protecting devices against advanced threats with Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is a cloud-based security solution that helps organizations protect their devices and endpoints from cyber threats such as malware, viruses, and other advanced attacks. It provides a unified endpoint security platform that combines preventative protection, post-breach detection, automated investigation, and response capabilities. Defender for Endpoint is part of the Microsoft Defender suite of security solutions that also includes Microsoft Defender for Identity and Microsoft Defender for Office 365.

One of the critical features of Defender for Endpoint is its advanced threat protection capabilities. It uses artificial intelligence and machine learning algorithms to detect and block known and unknown threats in real time, including file-based malware, fileless attacks, and ransomware. It also includes behavioral analysis to detect and block suspicious activity and malicious...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image