-
Security for allMicrosoft Security
-
Partner Sales Skill HubYour central destination for all Partner sales training across New Zealand
Latest Security News
Zero Trust: Going Beyond the Why
Microsoft Zero Trust webinar series explores how organisations can implement and leverage Zero Trust principles to strengthen and protect their entire digital estate. We are joined by experts and thought leaders to discuss key benefits and challenges with Zero Trust and current trends in the modern work environment that impact our security efforts.
How Microsoft Purview and Priva support the partner ecosystem
To solve the complexity that comes with these environments, organizations have invested in multiple point solutions, which in turn can make it hard for them to manage the fragmented compliance and risk posture covering their entire data estate. To help organizations meet today’s global compliance and risk requirements across their multicloud, multiplatform data environments, Microsoft announced Microsoft Purview in April 2022.
Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT
How many IoT devices are used at your company? If yours is like most organizations, there are probably printers, scanners, and fax machines scattered around the office. Perhaps smart TVs are mounted at reception or in the break room to guide visitors and keep employees up-to-date on company events and news. Or maybe highly connected conference systems bring teams together to collaborate. For some organizations, IoT also includes operational technology (OT) devices used in industrial systems and critical infrastructure.
Microsoft recognized as a Leader in UEM Software 2022 IDC MarketScape reports
Competition for talent has increased pressure to lead in the digital space, and business decisions now weigh user experience for employees heavily among costs and benefits. Workers insist on experiences that mirror their personal experiences, often on their own devices. As enterprise computing has expanded beyond the cubicle, the need to manage the ensuing explosion of complexity, especially when it comes to device security, has raised the bar for technology and information business decision-makers.
Security Partner Resources
Crash Course in Microsoft Purview
Learn how to reduce the complexity of data protection, governance and compliance in your business. Read the guide to securing and managing your data estate.
Cybersecurity for small and medium business
In this eBook you’ll learn about the cybersecurity landscape, about the different cybersecurity threats, how to spot them and what you can do to protect your business.
Protecting Your Data End-to-End
As data extends well beyond on-premises infrastructure into multi-cloud and hybrid cloud environments, IT and security teams are looking for ways to better manage the entire data lifecycle. A key piece of these efforts is to reduce risk without compromising user productivity.
In this eBook, you’ll learn why an end-to-end approach to information protection can help ensure all your data and assets are safe, however and wherever they’re used.
Security best practices for Microsoft partners
When applying the Zero Trust principles, there are specific actions you can take today that are so important for both you and your customers. Use this resource guide to quickly find and access key resources you need right now to help you complete the partner checklist!
Operations guidance | Microsoft 365 Defender
This video lists the daily, weekly, monthly, and ad-hoc tasks we recommend for operating Microsoft Defender for Office 365 successfully.
Microsoft Entra
Learn more about the Microsoft Entra family of multicloud identity and access solutions. Find content to help solve secure access needs across your multifaceted digital landscape, protect access to any app or resource for any user, verify and secure every identity and every access request, discover permissions and govern access, and simplify user experience with intelligent real-time access controls.
Guiding principles of Zero Trust
This is the core of Zero Trust. Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."
Resources for accelerating your Zero Trust journey
Microsoft recently conducted a study with over 900 chief information security officers (CISOs) on the state of Zero Trust and found that 81 percent say their organization has started or currently has a hybrid work environment in place and that 91 percent plan for their organization to be fully transitioned to hybrid work within the next five years. The era of hybrid work is here to stay. Learn more about our perspective and security efforts in Vasu Jakkal’s blog, Securing a new world of hybrid work: What to know and what to do, posted earlier this month.
What is Microsoft 365 Defender?
Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.
Upcoming Events
Security Depth Enablement
These multi-day training events are packed full of in-depth sessions tailored to provide you with advanced knowledge of cybersecurity, threat protection, incident response, and more. Within the span of a few days, you’ll have gained the expertise to assess customer needs and seamlessly implement security solutions from start to finish.

Contact our team
Please enter your details and one of our Microsoft experts will reach out shortly.