Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement. Microsoft Security helps protect people and data against cyberthreats to give peace of mind.
Do You Manage Peer Insights at Microsoft?
Access Vendor Portal to update and manage your profile.
1. Broad Cloud Coverage: Defender for Cloud supports multiple cloud environments and has automated enrollment into said environments. This is significantly more than other cloud vendor specific CSPM tools provide. 2. Strong Compliance Support: The security score that is a feature of Defender is here and gives you quick and actionable items that can be done to improve your security posture. 3. Microsoft Stack Value: I found that if you are using just the base level of Defender for Cloud as an Azure customer, you will find tremendous value at a low cost, and there is an easy path forward for expanding into workload protection and some of the more advanced offerings from the platform.
What I like most about it is because microsoft is such a large company, they get lots of good threat intel to utilize in alerts and detections. Their footprint in many environments is large so they also have a good spread of detections across many areas.
The product works as advertised with varying utilities that allow responders secure access to assess any given incident.
1. Cost/Licensing Concerns: When enabling some of the more advanced modules (workload protection, etc.) it can be confusing about the actual cost of what you are enabling. This is not an issue that is unique to Defender for Cloud, however, as other CSPM tools suffer from the same licensing problems. 2. Reporting Limitations: Dashboards, alerting/reporting and other such tools suffer from being rather rigid and overall limited in what data they provide. This can be frustrating if you are looking for an overall security posture across multiple environments. 3. Complexity: If you aren't familiar with Azure and/or compliance standards, navigating through the portal and setting up the proper permissions for Defender for Cloud can be an intimidating task, especially given the clunkiness of the portal.
Managing settings is rather difficult, sometimes you need to go to the security.microsoft.com dashboard, sometimes you need to go to intune, sometimes you need to go to azure to make changes. They need a more cohesive single pane of glass.
Time-sensitive incident response being delayed by other M365 outages, which ultimately means that phishing emails stay in inboxes longer, and manual intervention to threats due to inherent tools not functioning (ie you receive the alert, but the tool is not working as expected to be able to troubleshoot or resolve)