{"id":77356,"date":"2024-08-23T03:19:20","date_gmt":"2024-08-23T07:19:20","guid":{"rendered":"https:\/\/blog.cyberconservices.com\/?p=77356"},"modified":"2024-08-19T08:22:23","modified_gmt":"2024-08-19T12:22:23","slug":"protect-enterprise-solutions-with-new-microsoft-power-platform-security-features","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2024\/08\/23\/protect-enterprise-solutions-with-new-microsoft-power-platform-security-features\/","title":{"rendered":"Protect enterprise solutions with new Microsoft Power Platform security features"},"content":{"rendered":"<p>By\u00a0<a class=\"text-material-600\" href=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/nirav-shah\/\" data-bi-cn=\"Nirav Shah\" data-bi-ct=\"author link\">Nirav Shah<\/a> &#8211;\u00a0Many organizations feel\u00a0 the urgency and pressure to protect against increasingly sophisticated attacks. At the same time, these organizations are being propelled into the age of AI with employees that are eager to use AI to build apps and adopt AI-assisted business processes. Chief Information Security Officers (CISOs) and admins want to be confident that their data is secure as their organization harnesses the power of AI.<\/p>\n<p>The Microsoft Power Platform comprehensive suite of security capabilities helps organizations to keep their enterprise data safe while leveraging the platform\u2019s AI capabilities. Power Platform security features build on and augment the foundation provided by Microsoft security products and services, so customers get the deepest protection across the breadth of technologies their organization uses.<\/p>\n<p>This month we are announcing several new security features for Power Platform:<\/p>\n<ul>\n<li>Admins will now have one place to manage Power Platform security at scale using the new Security Hub in the Power Platform admin center.<\/li>\n<li>New advanced data exfiltration protection features, including the next generation of network isolation and continuous access evaluation of user access rights.<\/li>\n<li>Microsoft Sentinel for Power Platform integrates Power Platform apps, workflows, and connections into your organization\u2019s security operations to provide a holistic view in the industry leading security information and event management (SIEM) Microsoft Sentinel.<\/li>\n<\/ul>\n<p>To help you understand the full security capabilities of Power Platform, we just published a whitepaper focused on enterprise security.\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/power-platform\/guidance\/white-papers\/enterprise-security\" target=\"_blank\" rel=\"noreferrer noopener\">This whitepaper shows you<\/a>\u00a0how to align Power Platform with your security practices.<\/p>\n<p>Let\u2019s look at these new security capabilities in more detail and explore how they can help secure your Power Platform deployments.\u00a0 \u00a0<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2024\/03\/20\/protect-enterprise-solutions-with-new-microsoft-power-platform-security-features\/&amp;ct=ga&amp;cd=CAEYACoSNzkwNzMwNzM1NTI1NzA5NzQxMhozYmNmNTU4MzgyOGUwNzQ4OmNvbTplbjpVUw&amp;usg=AOvVaw0FrMCBAFuFNL6h4qp5nMCm\">Read On:<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Nirav Shah &#8211;\u00a0Many organizations feel\u00a0 the urgency and pressure to protect against increasingly sophisticated attacks. At the same time, these organizations are being propelled into the age of AI with employees that are eager to use AI to build apps <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2024\/08\/23\/protect-enterprise-solutions-with-new-microsoft-power-platform-security-features\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":77357,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[653,14],"tags":[652,150],"class_list":["post-77356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-power-platform","category-security","tag-power-platform","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.cyberconservices.com\/wp-content\/uploads\/2024\/03\/MSSecurityHub.jpg","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=77356"}],"version-history":[{"count":2,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77356\/revisions"}],"predecessor-version":[{"id":77462,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77356\/revisions\/77462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media\/77357"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=77356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=77356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=77356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}