{"id":36983,"date":"2015-04-13T08:54:31","date_gmt":"2015-04-13T15:54:31","guid":{"rendered":"http:\/\/devblogs.microsoft.com\/premier-developer\/?p=36983"},"modified":"2019-05-22T10:00:56","modified_gmt":"2019-05-22T17:00:56","slug":"partnering-with-premier-against-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/premier-developer\/partnering-with-premier-against-cybersecurity-threats\/","title":{"rendered":"Partnering with Premier against Cybersecurity Threats"},"content":{"rendered":"<p><a href=\"http:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/6888.prev_MSC13_Illus_SecPriv_002_rgb_thumb_3EF0C215.png\"><img decoding=\"async\" src=\"http:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/6888.prev_MSC13_Illus_SecPriv_002_rgb_thumb_3EF0C215.png\" alt=\"security icon\" width=\"137\" height=\"177\" class=\"alignright size-full wp-image-36984\" \/><\/a><\/p>\n<p>Cybercrime is no longer a distant warning.&nbsp; It is an active industry with talented players, lucrative ambitions, and devastating consequences.&nbsp; A recent study estimated the cost the US economy about <a href=\"http:\/\/www.mcafee.com\/sg\/resources\/reports\/rp-economic-impact-cybercrime.pdf?cid=BHP016&amp;ClickID=apr05ozzvvownpylyyatyz9ov0owwkvpplro\">$140 billion annually<\/a>.&nbsp; The numbers grow year over year and that&rsquo;s just financials you can measure.&nbsp; It&rsquo;s difficult to put a price on the long term impact of a trusted brand or the fallout from personal information once compromised.&nbsp; If you have any doubts, <a href=\"http:\/\/www.bing.com\/news\/search?q=hacked\">BING<\/a> the word &ldquo;hacked&rdquo; followed by any industry, company, or technology.&nbsp; There is no shortage of current reports to validate the concerns.&nbsp; Security experts will tell you that in regard to preparing for an attack, it&rsquo;s not a matter of <strong><em>if<\/em><\/strong>, but <strong><em>when<\/em><\/strong>.<\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/en-us\/microsoftservices\/support.aspx\">Premier<\/a> supports Microsoft&#8217;s largest and most strategic customers.&nbsp; We want customers to have the best experience possible using Microsoft technologies and security is a vital part of that.&nbsp; If a Premier customer is compromised, Microsoft is typically engaged to be part of the security response effort, so we work aggressively to stay ahead of threats and prevent them from occurring.<\/p>\n<h2>Preparing Customers for Cybersecurity Threats<\/h2>\n<p>Premier Support helps customers prepare for cyber threats through an active relationship focused on operational health, <a href=\"http:\/\/www.microsoft.com\/en-us\/microsoftservices\/premier_support_developers.aspx\">software quality<\/a>, and offering a range of services to mitigate risks.<\/p>\n<ul>\n<li>Using supported and patched versions of our technology is the first proactive step to reduce any attack surface.&nbsp; Many of the compromises that occur in the wild are the result of exploiting known vulnerabilities and outdated software.&nbsp; Premier Support drives ongoing awareness of <a href=\"https:\/\/support.microsoft.com\/en-us\/lifecycle\/search\"><strong>Microsoft support lifecycle<\/strong><\/a> changes to help customer prepare for important transitions and promotes <a href=\"http:\/\/blogs.technet.com\/b\/msrc\/archive\/2015\/01\/07\/evolving-advance-notification-service-ans-in-2015.aspx\"><strong>Advanced Security Notifications<\/strong><\/a> to help customer respond quickly to known threats.<\/li>\n<li>Premier also offers a range of <a href=\"https:\/\/services.premier.microsoft.com\/assess?Culture=en-US&amp;CultureAutoDetect=true\"><strong>Operational<\/strong><\/a><strong> and Security Assessments<\/strong> (below) that analyze many product configuration again best practices and known issues.&nbsp; These assessments can provide valuable insight into your deployments and to verify that they are adhering to best practices and Microsoft recommendations.<\/li>\n<li>Few development teams write code with consistent security standards.&nbsp; Even when secure development standards are established, the breadth of solution types can make it extremely difficult to comprehensively think through security implications of distributed, mobile, and cloud solutions.&nbsp; Premier provides access to a range of workshops, security services, and specialized teams that focus full-time on <strong>secure development lifecycle<\/strong>.<\/li>\n<li>If any Premier Customer suspects they have been compromised, they have the ability to open a support case with our <strong>Cyber Security support team for assistance to assess and mitigate any threat<\/strong>.&nbsp; Being able to rapidly engage Microsoft support resources and Cyber experts during a suspected compromise greatly extends the ability of any company to quickly and effectively respond to a threat.&nbsp; Cyber incident response with Premier Support is covered in detail <a href=\"https:\/\/vts.inxpo.com\/scripts\/Server.nxp?LASCmd=L:0&amp;AI=1&amp;ShowKey=24333&amp;LoginType=0&amp;InitialDisplay=1&amp;ClientBrowser=0&amp;DisplayItem=NULL&amp;LangLocaleID=0&amp;SSO=1&amp;RandomValue=1427892954436\">here<\/a>.<\/li>\n<\/ul>\n<h2>Security is not a part time responsibility<\/h2>\n<p>Security is a specialty.&nbsp; You either do it full time or fall behind.&nbsp; Premier customers have access to services from the Microsoft ACE team, a specialized, global security group responsible for information security risk management for Microsoft. These are the same security experts that help protect Microsoft&rsquo;s assets such as <strong>Office 365, XBOX Live, Windows Phone, Bing<\/strong>, and our own internal business applications. ACE&nbsp; has been helping protect Microsoft&rsquo;s customers for <strong>over a decade<\/strong> and stay actively involved in writing white papers such as the recent <a href=\"http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=38785\">Best Practices for Securing Active Directory<\/a><strong><\/strong>, popular books, and presentations at major security conferences. ACE has also developed several security tools published on Microsoft.com and span all industries with experience.<\/p>\n<h2><a href=\"http:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/0045.prev_MSC13_Illus_SecPriv_001_rgb_thumb_40C117DC.png\"><img decoding=\"async\" src=\"http:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/0045.prev_MSC13_Illus_SecPriv_001_rgb_thumb_40C117DC.png\" alt=\"guard dog folder graphic\" width=\"289\" height=\"374\" class=\"alignleft size-full wp-image-36985\" srcset=\"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/0045.prev_MSC13_Illus_SecPriv_001_rgb_thumb_40C117DC.png 289w, https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2019\/05\/0045.prev_MSC13_Illus_SecPriv_001_rgb_thumb_40C117DC-232x300.png 232w\" sizes=\"(max-width: 289px) 100vw, 289px\" \/><\/a>Security Services and Workshops<\/h2>\n<p>Below are a few of the security related workshops and services available through Premier Support:<\/p>\n<ul>\n<li>Secure Application Development Workshop<\/li>\n<li>PKI Infrastructure Design &amp; Operations<\/li>\n<li>Windows 7\/8 and Server 2008\/2012 Security In Depth<\/li>\n<li>Application Security:&nbsp; Code Review, Design Review, and Assessments<\/li>\n<li>Development: Secure Program Development (GAP Assessment)<\/li>\n<li>Infrastructure: Security Design Review, Security Consulting,<\/li>\n<li>Azure Application Security Assessment<\/li>\n<li>Active Directory Security Assessment<\/li>\n<li>SharePoint Security Assessment<\/li>\n<li>Enterprise Host Security Assessment<\/li>\n<li>ISO Security Assessment Services<\/li>\n<li>Enterprise PKI Framework<\/li>\n<\/ul>\n<h2>Want to learn more?<\/h2>\n<p>Contact your Application Development Manager (ADM) or <a href=\"http:\/\/blogs.msdn.com\/b\/premier_developer\/archive\/2014\/09\/15\/welcome.aspx\">Premier Support for Developers<\/a> to learn more about Cybersecurity services and response assistance.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime is no longer a distant warning.&nbsp; It is an active industry with talented players, lucrative ambitions, and devastating consequences.&nbsp; A recent study estimated the cost the US economy about $140 billion annually.&nbsp; The numbers grow year over year and that&rsquo;s just financials you can measure.&nbsp; It&rsquo;s difficult to put a price on the long [&hellip;]<\/p>\n","protected":false},"author":582,"featured_media":37840,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35,25,96],"tags":[],"class_list":["post-36983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alm","category-azure","category-security"],"acf":[],"blog_post_summary":"<p>Cybercrime is no longer a distant warning.&nbsp; It is an active industry with talented players, lucrative ambitions, and devastating consequences.&nbsp; A recent study estimated the cost the US economy about $140 billion annually.&nbsp; The numbers grow year over year and that&rsquo;s just financials you can measure.&nbsp; It&rsquo;s difficult to put a price on the long [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/36983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/comments?post=36983"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/36983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media\/37840"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media?parent=36983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/categories?post=36983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/tags?post=36983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}