




3.5 Mil
is the average cost of data breach per incident
63%
of breaches involve weak or stolen passwords.
Over 300K
New malware samples are being created and spread every day
87%
of senior managers have leaked data accidentally





Windows Defender Antivirus
Windows Defender Antivirus, an enterprise-grade antivirus solution, uses the cloud, vast optics, machine learning and behavior analysis to rapidly respond to emerging threats.
learn more




Microsoft Edge
Attacking devices through the browser is a top technique for attackers. Microsoft Edge has been designed specifically to systemically disrupt phishing, malware, and hacking attacks.
learn more




Device Guard
Application Control is your best defense in a world where there are more than 300,000 new malware samples each day. Block all unwanted apps with Device Guard.
learn more









Detect the undetectable
Take advantage of IOC’s powered by sensors and unique optics that are made possible through Microsoft Intelligence Security Graph and the human expertise behind it.





Built into Windows 10
Agentless with high performance and low impact, cloud-powered; easy management with no deployment.





Built-in one-click responses
Respond to incidents by isolating machines, blocking or quarantining files, collecting data, and executing suspicious files in a secure cloud based sandbox.










Windows Hello
Windows Hello is a password alternative that uses multiple factors to provides enterprise grade security using biometrics, a PIN or even a companion device.
meet windows hello




Credential Guard
Credential Guard protects against NTLM based Pass the Hash (PtH) attacks by isolating user credentials inside a hardware based container.
learn more




Information Protection
Windows 10 provides comprehensive data protection while meeting compliance requirements and maintaining user productivity.





BitLocker
BitLocker enables organizations to protect sensitive information from unauthorized access with military grade encryption when a device is lost or stolen.
learn more




Windows Information Protection (WIP)
Business data is separated and contained to prevent it from accidentally leaking to unauthorized users, documents, apps, or locations on the web.
learn more




Azure Information Protection
Azure Information Protection works with WIP and provides additional capabilities to classify, assign advanced permissions and share sensitive data.
learn more




Device Security
Modern threats require a modern approach, one that maintains the integrity and security of the operating system and data.
see all devices




Windows Trusted Boot
UEFI Secure Boot and Windows Trusted Boot help maintain the integrity of the system by ensuring malware is unable to start before system defenses.
Discover Windows Trusted Boot




Trusted Platform Module (TPM)
Windows 10 devices include TPM providing hardware isolated capabilities to securely create and store keys and enable advanced conditional access.
Learn about TPM




Containers
Windows 10 uses containers to isolate sensitive system functions, enabling them to remain secure even when the OS has been compromised.
Learn about containersWindows 10 industry solutions
Choose your industry and find out how Windows 10 can benefit your business.
Security News & Resources





Get familiar with new and improved features
The threat landscape is changing. See how Windows 10 has responded.
view infographic




Windows 7 vs. 10 Comparison Datasheet
Compare and learn about the security features available in Windows 10.
get datasheet




US DoD upgrades 4m seats to Windows 10
read the storyGARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.












