{"id":118149,"date":"2024-08-29T08:00:00","date_gmt":"2024-08-29T15:00:00","guid":{"rendered":""},"modified":"2024-08-28T11:35:14","modified_gmt":"2024-08-28T18:35:14","slug":"how-energy-firms-power-the-world-with-secure-microsoft-technologies","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/","title":{"rendered":"How energy firms power the world with secure Microsoft technologies"},"content":{"rendered":"\n<p>In 2023, the Microsoft Digital Defense Report revealed that critical infrastructure remained a persistent target for cyberthreats, increasing again from the previous year.<sup>1<\/sup> The interconnectivity of the power industry with global commerce makes its infrastructure both essential and vulnerable. Without it, we can no longer power hospitals, heat and cool homes, open schools, or produce food. Power supply is the lifeblood of the global economy, and our resilience depends on it.\u00a0<\/p>\n\n\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n\t<div class=\"card d-block mx-ng mx-md-0\">\n\t\t<div class=\"row no-gutters material-color-brand-dark bg-fabric-green\">\n\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"982\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/06\/CLO22_GreenEnergyFarm_015-1-1024x982.jpg\" class=\"card-img img-object-cover\" alt=\"Field engineers using a laptop on truck tailgate to review data after inspection of turbines on a wind farm.\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/06\/CLO22_GreenEnergyFarm_015-1-1024x982.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/06\/CLO22_GreenEnergyFarm_015-1-300x288.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/06\/CLO22_GreenEnergyFarm_015-1-768x737.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/06\/CLO22_GreenEnergyFarm_015-1-1536x1473.jpg 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"d-flex col-md\">\n\t\t\t\t<div class=\"card-body align-self-center p-4 p-md-5\">\n\t\t\t\t\t\n\t\t\t\t\t<h2>Microsoft for energy and resources<\/h2>\n\n\t\t\t\t\t<div class=\"mb-3\">\n\t\t\t\t\t\t<p>Achieve more with trusted solutions<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"link-group\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/energy\" class=\"btn btn-link text-decoration-none p-0\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<span>Explore our solutions<\/span>\n\t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-growing-need-to-transform-security\">A growing need to transform security<\/h2>\n\n\n\n<p>Chief Information Security Officers (CISOs) at power companies know this reality well. They\u2019re tasked with managing a complicated portfolio while protecting against cyber risks from both insiders and nation-state actors. Left unresolved, these challenges create a ripple effect across the enterprise and lead to issues like:&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Increasingly complex environments<\/strong>: Widespread digital adoption combined with evolving customer preferences, decentralized energy generation, and a changing workforce are driving utility providers to <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/energy\">rethink their services and business models<\/a> to help increase flexibility and maintain a resilient grid. In a recent survey conducted by Guidehouse and Public Utilities Fortnightly, 61% of respondents agreed that increasing flexibility to improve energy system resilience is the highest priority outcome for utility investments today.<sup>2<\/sup><\/li>\n\n\n\n<li><strong>Tool fatigue<\/strong>: Many power companies work with hundreds of disparate management tools that are costly to manage and limited in cross-visibility. These tools must be integrated and maintained by teams with the right skillsets. As tools are added or replaced and personnel come and go, companies face the inevitable costs of re-skilling and new integrations.<\/li>\n\n\n\n<li><strong>Technical debt<\/strong>: While many utilities are <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2023\/05\/04\/microsoft-highlights-innovation-in-power-and-utilities\/\">designing new solutions<\/a> in support of energy transition and the grid of the future, they still rely heavily on legacy infrastructures that carry significant tech debt. These legacy systems increase cybersecurity and operational risks as well as operational expenses through extended support costs, timelines, and integration complexities. Research shows companies pay an additional 10 to 20% to address tech debt on top of project base costs.<sup>3<\/sup>&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Modernizing infrastructure is costly and not easily adaptable as the risk landscape evolves. In fact, 59% of cybersecurity teams identify integration of legacy operational technology (OT) and modern information technology (IT) systems as their biggest challenge to securing OT.<sup>4<\/sup> If you\u2019re a CISO, how do you solve the challenge of securing both IT and OT against modern and fast-changing threats?&nbsp;<\/p>\n\n\n\n<p>The answer is to work with technology partners who not only understand threat actors around the world, but who also recognize the business risks and operational concerns across the industry.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"increasing-security-and-efficiency-without-sacrificing-value\">Increasing security and efficiency without sacrificing value&nbsp;<\/h2>\n\n\n\n<p>With a unified security stack running on the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud?rtc=1\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cloud<\/a>, utilities can significantly reduce the number of tools they manage every day for lower costs, time-savings, and better insight into IT and OT environments.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For example, Turkish energy provider Enerjisa \u00dcretim partnered with Senkron.Energy Digital Services to <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1711956075760053884-enerjisauretim-azure-energy-en-turkiye\" target=\"_blank\" rel=\"noreferrer noopener\">build Senkron ROC<\/a>, a remote operations center that represents a critical piece of becoming cloud-native. Knowing that a single cyberthreat could shut down operations, Enerjisa \u00dcretim also established its Operational Technology-Specific Security Operation Center (OT SOC), which relies on Microsoft Defender for IoT and Microsoft Sentinel to operate around the clock and process 3.3 million security events daily.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>The <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/example-scenario\/apps\/deploy-ibm-maximo-application-suite\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Maximo Application Suite on Azure<\/a> for asset operations and maintenance is another example. High performance and ultra-low latency combined with the multi-layered security capabilities of the Microsoft Azure stack provide a foundation for secure analytics that boost operational resiliency and reliability. With those advanced security features, utility providers can scale their operations to handle varying workloads without compromising operational security.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security-solutions-to-meet-your-needs\">Security solutions to meet your needs&nbsp;<\/h2>\n\n\n\n<p>With <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security services<\/a>, customers can leverage the latest technologies and deep industry understanding to enhance their security posture today. <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/endpoint-security\/microsoft-defender-iot?msockid=301aefe0f92a674e27d8fcb3f8076611\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for IoT<\/a> offers a complete inventory and continuous monitoring of connected assets across vendors and protocols; <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/microsoft-purview\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview<\/a> can secure and govern data across your entire estate while helping to reduce risk and meet compliance requirements; and <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> provides enterprise-grade intelligent security analytics that help detect previously undetected threats and minimize false positives.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Microsoft security solutions can also offer improvements across key use cases, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Augmentation of security operations centers (SOCs)<\/strong>: Microsoft security solutions empower SOCs with cloud-native capabilities that enable faster detection and response times\u2014even automating entire responses to security events. Machine learning, AI, and advanced analytics perform the heavy lifting so SOC workers can clarify what\u2019s happening in the SOC environment and focus on the highest-priority events. Our unified security platform eases tool fatigue in SOCs with solutions that work together seamlessly for optimal visibility and efficiency. Solutions such as <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/services\/microsoft-defender-experts-xdr?msockid=1c2f35bb2203638512f224ba23b0627f\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender Experts for XDR<\/a> and <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/microsoft-incident-response\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Incident Response<\/a> allow for expanded capabilities to support the SOC analysts in their mission.<\/li>\n\n\n\n<li><strong>Business continuity and disaster recovery<\/strong>:<strong> <\/strong>Microsoft security solutions provide automated backup processes that are both scalable and cost-effective, and they can be integrated with on-premise data protection solutions. Our solutions include features like encryption and multi-factor authentication, which protect data during the backup and recovery process and help keep sensitive information secure. This holistic approach helps utility organizations quickly recover from data loss incidents, minimizing downtime and maintaining business continuity.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"supporting-the-energy-customer-and-partner-ecosystem-for-a-secure-future\">Supporting the energy customer and partner ecosystem for a secure future&nbsp;<\/h2>\n\n\n\n<p>To support continued innovation in data security and cloud adoption, we collaborated with the Idaho National Laboratory (INL) and the Department of Energy\u2019s Grid Deployment Office on an initiative for seamless integration of cloud technology into the grid of the future. Now in its pilot phase, the <a href=\"https:\/\/inl.gov\/cirrus\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cirrus cloud feasibility assessment tool<\/a> (Cirrus) offers strategic guidance on how to prepare for, or deploy, a cloud solution responsibly, with the ultimate objective to strengthen the resilience and future adaptability of a decarbonized electric grid.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Built on the security and reliability of Azure, the online version of Cirrus is also accessible through independent platforms with a license. The tool provides valuable insights to integrators, stakeholders, and operators by clarifying goals, future plans, and risk tolerance. &nbsp;<\/p>\n\n\n\n<p>With visual outputs like key performance indicator (KPI) graphs and consequence diagrams, Cirrus offers contextualized understanding, helping users prioritize critical systems and data based on potential benefits and risks associated with cloud disruptions. Additionally, Cirrus incorporates threat detection and alerts, leveraging Cyber-Informed Engineering (CIE) principles to empower organizations to make risk-informed decisions and address high-consequence events.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"opportunities-on-the-horizon-with-ai\">Opportunities on the horizon with AI&nbsp;<\/h2>\n\n\n\n<p>It\u2019s an exciting time for the industry as AI creates tremendous potential for energy companies to increase their security posture.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Imagine equipping workers with <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/ai-machine-learning\/microsoft-security-copilot?rtc=1\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Copilot for Security<\/a> to help them identify threats earlier, build their risk mitigation skills, and respond to incidents faster. What took hours or days to complete can now be finished in minutes with AI. The efficiency is about more than labor costs. Every minute that goes by gives attackers more opportunity to wreak havoc across the board.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With AI advancements analyzing trillions of security signals daily, together we can build a safer, more resilient digital energy ecosystem.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more-with-microsoft-for-energy-and-resources\">Learn more with Microsoft for energy and resources&nbsp;<\/h2>\n\n\n\n<p>Ready to dive deeper? Don\u2019t miss our webinar, <a href=\"https:\/\/forum.canarymedia.com\/canary-media1\/Rethinking-cyber-security-in-a-renewable-powered-energy-system\" target=\"_blank\" rel=\"noreferrer noopener\">Rethinking cybersecurity in a renewable-powered energy system<\/a> on October 10, 2024, where we will be sharing how leading energy companies are using the power of technology to safeguard their businesses. Read more about the webinar and sign up to attend. &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/energy\">Microsoft for energy and resources<\/a> page.<\/li>\n\n\n\n<li>Read the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/\">Microsoft Industry Blogs: Energy and resources<\/a> blog to learn about\u202fthemes and actions critical for energy transition.<\/li>\n\n\n\n<li>Learn about <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/solutions\/security?msockid=301aefe0f92a674e27d8fcb3f8076611\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft security solutions<\/a>.<\/li>\n\n\n\n<li>Read more from the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report 2023<\/a>.<\/li>\n\n\n\n<li>Check out the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/microsoft-defender?msockid=301aefe0f92a674e27d8fcb3f8076611\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender family of products<\/a>.<\/li>\n\n\n\n<li>Visit our <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/products\/microsoft-copilot-for-security\/?sort-by=newest-oldest&amp;date=any\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Copilot for Security Blog<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/info.microsoft.com\/ww-landing-security-broad-reach-interest-capture.html?lcid=en-us\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for news and insights<\/a> from Microsoft Security.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><sup>1<\/sup> <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report<\/a>, October 2023.<\/p>\n\n\n\n<p><sup>2<\/sup> <a href=\"https:\/\/guidehouse.com\/insights\/energy\/2024\/the-power-industry-presently-and-projected\" target=\"_blank\" rel=\"noreferrer noopener\">The Power Industry: Presently and Projected<\/a>, Guidehouse, July 2024.<\/p>\n\n\n\n<p><sup>3<\/sup> <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/breaking-technical-debts-vicious-cycle-to-modernize-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">Breaking technical debt\u2019s vicious cycle to modernize your business<\/a>, McKinsey &amp; Company, April 2023. <\/p>\n\n\n\n<p><sup>4<\/sup> <a href=\"https:\/\/www.weforum.org\/agenda\/2023\/10\/why-the-energy-sector-and-critical-infrastructure-is-particularly-vulnerable-to-cyber-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">How is cyber innovation disrupting the energy sector and critical infrastructure?<\/a>, World Economic Forum, October 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With AI advancements analyzing trillions of security signals daily, together we can build a safer, more resilient digital energy ecosystem.<\/p>\n","protected":false},"author":794,"featured_media":118156,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[3927,4279],"post_tag":[4289,4291,4293,4292,4413],"content-type":[1483],"coauthors":[4238,4795],"class_list":["post-118149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-energy-and-resources","category-power-and-utilities","tag-ai","tag-azure","tag-copilot","tag-iot","tag-the-microsoft-cloud","content-type-thought-leadership","review-flag-1593580416-594","review-flag-1-1593580433-637","review-flag-2-1593580438-395","review-flag-3-1593580443-547","review-flag-4-1593580449-167","review-flag-information-technology","review-flag-iot","review-flag-lever-1593580266-799","review-flag-new-1593580249-279","review-flag-on-pr-1593580817-713","review-flag-partn-1593580285-60"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"With AI advancements analyzing trillions of security signals daily, together we can build a safer, more resilient digital energy ecosystem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hanna Grene, Mikhail Falkovich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hanna Grene, Mikhail Falkovich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/hanna-grene\/\",\"@type\":\"Person\",\"@name\":\"Hanna Grene\"},{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/mikhail-falkovich\/\",\"@type\":\"Person\",\"@name\":\"Mikhail Falkovich\"}],\"headline\":\"How energy firms power the world with secure Microsoft technologies\",\"datePublished\":\"2024-08-29T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\"},\"wordCount\":1350,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg\",\"keywords\":[\"AI\",\"Azure\",\"Copilot\",\"IoT\",\"The Microsoft Cloud\"],\"articleSection\":[\"Energy and resources\",\"Power and utilities\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\",\"name\":\"How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg\",\"datePublished\":\"2024-08-29T15:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg\",\"width\":9504,\"height\":6336,\"caption\":\"Field engineer inspects solar panels on a wind farm using remote assist with a Surface tablet.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How energy firms power the world with secure Microsoft technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/","og_locale":"en_US","og_type":"article","og_title":"How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs","og_description":"With AI advancements analyzing trillions of security signals daily, together we can build a safer, more resilient digital energy ecosystem.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2024-08-29T15:00:00+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034-1024x683.jpg","type":"image\/jpeg"}],"author":"Hanna Grene, Mikhail Falkovich","twitter_card":"summary_large_image","twitter_image":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg","twitter_misc":{"Written by":"Hanna Grene, Mikhail Falkovich","Est. reading time":"5 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/hanna-grene\/","@type":"Person","@name":"Hanna Grene"},{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/mikhail-falkovich\/","@type":"Person","@name":"Mikhail Falkovich"}],"headline":"How energy firms power the world with secure Microsoft technologies","datePublished":"2024-08-29T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/"},"wordCount":1350,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg","keywords":["AI","Azure","Copilot","IoT","The Microsoft Cloud"],"articleSection":["Energy and resources","Power and utilities"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/","name":"How energy firms power the world with secure Microsoft technologies - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg","datePublished":"2024-08-29T15:00:00+00:00","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2024\/08\/CLO22_GreenEnergyFarm_034.jpg","width":9504,"height":6336,"caption":"Field engineer inspects solar panels on a wind farm using remote assist with a Surface tablet."},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/energy-and-resources\/2024\/08\/29\/how-energy-firms-power-the-world-with-secure-microsoft-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"How energy firms power the world with secure Microsoft technologies"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/118149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/794"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=118149"}],"version-history":[{"count":18,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/118149\/revisions"}],"predecessor-version":[{"id":118184,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/118149\/revisions\/118184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/118156"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=118149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=118149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=118149"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=118149"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=118149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}