Designed to be the most secure Windows yet

Addressing today’s threats requires a new approach, one that engineers the attack vectors out of the platform itself and quickly detects and responds to the ones that remain.

Security illustration

3.5 Mil

is the average cost of data breach per incident

63%

of breaches involve weak or stolen passwords.

Over 300K

New malware samples are being created and spread every day

87%

of senior managers have leaked data accidentally

Pre-breach Threat Resistance

Windows 10 is designed to disrupt the malware and hacking industry by moving the playing field to one where they lose the attack vectors that they depend on.

Windows Defender Antivirus icon

Windows Defender Antivirus

Windows Defender Antivirus, an enterprise-grade antivirus solution, uses the cloud, vast optics, machine learning and behavior analysis to rapidly respond to emerging threats.

learn more
Microsoft Edge icon

Microsoft Edge

Attacking devices through the browser is a top technique for attackers. Microsoft Edge has been designed specifically to systemically disrupt phishing, malware, and hacking attacks.

learn more
Device Guard icon

Device Guard

Application Control is your best defense in a world where there are more than 300,000 new malware samples each day. Block all unwanted apps with Device Guard.

learn more
Man typing on Surface Book

Post breach detection and response

Windows Defender Advanced Threat Protection enables you to detect, investigate, and respond to advanced threats and data breaches on your networks.

discover Windows defender ATP
Detect the Undetectable icon

Detect the undetectable

Take advantage of IOC’s powered by sensors and unique optics that are made possible through Microsoft Intelligence Security Graph and the human expertise behind it.

Scale as you go icon

Built into Windows 10

Agentless with high performance and low impact, cloud-powered; easy management with no deployment.

Built-in one-click responses icon

Built-in one-click responses

Respond to incidents by isolating machines, blocking or quarantining files, collecting data, and executing suspicious files in a secure cloud based sandbox.


Gartner logo

Windows 10 Enhances Security

Improved security is one of the biggest benefits to adopting Windows 10. This research explores the new Windows threat resistance security features that are important to security and risk management leaders.

Analyst: Peter Firstbrook | Published: April 2017

Get the report

Man typing on Surface Book

Identity Protection

Windows 10 provides next generation technology to help protect your user’s identities from abuse.

Windows Hello icon

Windows Hello

Windows Hello is a password alternative that uses multiple factors to provides enterprise grade security using biometrics, a PIN or even a companion device.

meet windows hello
Credential Guard icon

Credential Guard

Credential Guard protects against NTLM based Pass the Hash (PtH) attacks by isolating user credentials inside a hardware based container.

learn more
Microsoft Surface Pro 4

Information Protection

Windows 10 provides comprehensive data protection while meeting compliance requirements and maintaining user productivity.

BitLocker icon

BitLocker

BitLocker enables organizations to protect sensitive information from unauthorized access with military grade encryption when a device is lost or stolen.

learn more
Windows Information Protection icon

Windows Information Protection (WIP)

Business data is separated and contained to prevent it from accidentally leaking to unauthorized users, documents, apps, or locations on the web.

learn more
Azure Information Protection icon

Azure Information Protection

Azure Information Protection works with WIP and provides additional capabilities to classify, assign advanced permissions and share sensitive data.

learn more
Windows 10 Pro device

Device Security

Modern threats require a modern approach, one that maintains the integrity and security of the operating system and data.

see all devices
Secure Boot icon

Windows Trusted Boot

UEFI Secure Boot and Windows Trusted Boot help maintain the integrity of the system by ensuring malware is unable to start before system defenses.

Discover Windows Trusted Boot
Trusted Platform Module (TPM) icon

Trusted Platform Module (TPM)

Windows 10 devices include TPM providing hardware isolated capabilities to securely create and store keys and enable advanced conditional access.

Learn about TPM
Containers icon

Containers

Windows 10 uses containers to isolate sensitive system functions, enabling them to remain secure even when the OS has been compromised.

Learn about containers

Windows 10 industry solutions

Choose your industry and find out how Windows 10 can benefit your business.

Security News & Resources

Security infographic illustration

Get familiar with new and improved features

The threat landscape is changing. See how Windows 10 has responded.

view infographic
Person interacting with SurfaceBook

Windows 7 vs. 10 Comparison Datasheet

Compare and learn about the security features available in Windows 10.

get datasheet
Man interacting with PC

US DoD upgrades 4m seats to Windows 10

read the story

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.