{"id":2987,"date":"2023-01-17T08:00:00","date_gmt":"2023-01-17T16:00:00","guid":{"rendered":""},"modified":"2026-04-09T08:56:34","modified_gmt":"2026-04-09T15:56:34","slug":"microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability","status":"publish","type":"ms-industry","link":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/","title":{"rendered":"Microsoft for Defense and Intelligence: Secure the digital defense ecosystem and improve interoperability"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">\u201cHow do we achieve the necessary level of interoperability while ensuring that our data is secure?\u201d It\u2019s a critical question that surfaces time and again in our conversations with defense and intelligence customers and partners across the globe. While legacy thinking, policy perceptions, and risk aversion once triggered responses focused on sovereign and on-premises solutions, lessons learned from recent global conflicts have challenged traditional thinking.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There\u2019s now a greater understanding that in the face of aggressive and integrated cyber and kinetic actions, the physical dispersal of critical infrastructure, systems, and data is a critical defense strategy. Data security and resiliency are now being enhanced by the distribution of digital operations and data assets across borders and into other countries. It\u2019s underscored the value of, and need for, the migration of <a href=\"https:\/\/newed.any0.dpdns.org\/industry\/government\/defense-and-intelligence\">defense and intelligence<\/a> workloads to the cloud\u2014so long as that cloud is built from a foundation of trust, privacy, and security, like <a href=\"http:\/\/azure.microsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">&#8220;<em>Before the invasion of Ukraine, governments thought that data needed to stay inside a country in order to be secure. After the invasion, migrating data to the cloud and moving outside territorial borders is now a part of resiliency planning and good governance.<\/em>&#8220;\u2014Cristin Flynn Goodwin, Associate General Counsel, Customer Security and Trust, Microsoft.<sup>1<\/sup><\/p>\n<\/blockquote>\n\n\n\n<div class=\"alignwide is-style-inline wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t<h2 class=\"wp-block-heading\">Microsoft for Defense and Intelligence<\/h2><p class=\"wp-block-paragraph\">Learn how defense and intelligence agencies advance their missions to promote stability and security for residents, nations, and multinational alliances with the help of Microsoft Cloud solutions.<\/p><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/newed.any0.dpdns.org\/industry\/government\/defense-and-intelligence\">Read more<\/a><\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/11\/DoD_Misc_1.jpg\" alt=\"\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Digital transformation in defense hinges on partnership and interoperability<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Recent geopolitical events have highlighted advances in cyber threat intelligence and end-point protection. They\u2019ve also demonstrated that a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive attacks, espionage, and influence operations is required.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The latter point recognizes the principle at the heart of interoperability\u2014that allies and industry must collaborate and develop a collective response for the most effective defense. When responding to adversaries, allied support and coordination are critical. With today\u2019s adversaries engaging in hybrid warfare methods, cyberattacks, disinformation campaigns, and domestic terrorism, defense agencies are increasingly reliant on data-sharing and collaborating\u2014across organizations, agencies, and national and international borders.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Furthermore, it\u2019s clear that digital transformation and technology acceleration in defense hinges on partnerships with the defense industrial base and non-traditional technology vendors\u2014including commercial tech companies and the start-up ecosystem.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nevertheless, the risk appetite for sharing resources remains low due to legacy policies that continue to guide the adoption of on-premises solutions that are vulnerable to modern attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Instead, through the adoption of hyper-scale cloud and edge, with a cybersecurity approach built on a foundation of trust and security, defense and intelligence organizations can achieve their goals as it relates to both security and interoperability. When defense and intelligence organizations migrate workloads into the Microsoft Azure Cloud, they benefit from an unprecedented, ever-deepening, and unwavering commitment to securing data from the ever-increasing number of cyber threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The <a href=\"https:\/\/newed.any0.dpdns.org\/msrc\/cdoc\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cyber Defense Operations Center (CDOC)<\/a> is one example of the more than USD20 billion we\u2019ve committed to investing over the next five years in security, data protection, and risk management. The CDOC brings together cybersecurity specialists and data scientists in an every day facility to combat threats in real-time. Microsoft is connected to more than 8,500 security professionals globally across our product development teams, information security groups, and legal teams to protect our cloud infrastructure and services, products and devices, and internal resources.<sup>2<\/sup><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So let\u2019s take a look at the threat environment that is shaping the Microsoft cybersecurity approach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Current threat environment<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">National defense and intelligence organizations around the world are facing three types of cyber adversaries that threaten national security:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Cybercriminals<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Cybercriminals look to monetize compromised data either through ransomware directly from victims or by selling it to Foreign Nation States.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Foreign Nation State actors<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Foreign Nation State actors aim to engage in intellectual property theft, espionage, surveillance, credential theft, and disruptive and destructive attacks to further their national interests.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Hacktivists<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Hacktivists conduct cyberattacks to cause disruption in order to further social or political goals.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Given the motivation, scale, organization, and sophistication of adversaries launching cyberattacks, defense and intelligence organizations must modernize their cybersecurity systems and approach. Otherwise, they risk being outmaneuvered by more sophisticated adversaries (or even less sophisticated actors with access to technology) leveraging AI, automation, and the scale of hyper-cloud systems to carry out their attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Three steps to improving cybersecurity capabilities<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Below are three key actions defense and intelligence organizations can take to modernize and improve their cybersecurity capabilities:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Enhance early-detection systems across the defense digital ecosystem continuum<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Leveraging a hyper-scale cloud enables defense and intelligence organizations to detect, respond, and deter attacks early. For example, <a href=\"https:\/\/newed.any0.dpdns.org\/microsoft-cloud\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cloud<\/a> spans over 200 data centers across 140 countries and analyzes 43 trillion security signals daily. Combined with the intelligence gained by tracking more than 250 unique nation-states, cybercriminals, and other threat actors, we provide defense and intelligence organizations with a unique global perspective. This global threat intelligence perspective enables early detection and response to emerging threats across multi-cloud, hybrid, on-premises, and heterogeneous platforms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Adopt an organization-wide Zero Trust philosophy<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond the technical architecture and products necessary to implement a <a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2022\/11\/22\/microsoft-supports-the-dods-zero-trust-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Framework<\/a>, every individual at every level of the organization must live by, implement, and adhere to the three core principles of Zero Trust:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Explicitly verify<\/strong>: Always authenticate and authorize users based on all available data points before allowing access to resources. This includes user identity, location, device health, service or workload, data classification, and anomalies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Use least privilege access<\/strong>: Limit user access with just-in-time (JIT) and just-enough-access (JEA), risk-based adaptive policies, and data protection to help secure both data and productivity.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Assume breach<\/strong>: Assume system defenses have been breached and systems might be compromised. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">3. Use Automation as a force multiplier to mitigate threats at scale<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">According to the <a href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\" target=\"_blank\" rel=\"noreferrer noopener\">2022 (ISC)\u00b2 Cybersecurity Workforce Study<\/a>, there\u2019s a global shortage of 3.4 million workers in cybersecurity. With this deficit, modern automated security platforms must be used by all organizations, including the defense and intelligence community, as a force multiplier to fill in the cyber talent gap.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft offers best-in-class capabilities across all security pillars of the digital estate. According to the <a href=\"https:\/\/newed.any0.dpdns.org\/security\/business\/forrester-tei-study\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester Total Economic Impact Studies<\/a>, Microsoft Security tools reduce the likelihood of a data breach by 45 percent,<sup>3 <\/sup>reduce the time to threat mitigation by 50 percent,<sup>4<\/sup> and reduce the amount of labor associated with advanced investigations by 80 percent.<sup>5<\/sup><em>&nbsp;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A foundation that supports the mission<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As mentioned, defense and intelligence organizations seek to simultaneously increase security, while also increasing interoperability. In the face of the threat environment highlighted above, Microsoft is committed to meeting the increasing need for defense and intelligence organizations to interoperate with allies and collaborate with trusted partners. Hyperscale cloud serves as the digital foundation for interoperability and collaboration while offering improved security postures over traditional legacy, on-premises approaches.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s not to say that the cloud is appropriate for every single scenario. Certainly, in our industry, we know that\u2019s not the case. For instance, there are currently requirements for mission data to remain air-gapped. Nonetheless, we also recognize that the vast majority of workloads across all industries\u2014defense and intelligence included\u2014can and should be serviced in the public hyper-scale cloud because it is the gold standard for security, resilience, and economics.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So how can we deliver on the unique needs of our defense and intelligence customers who work across the entire classification spectrum, and for which classified mission workloads must be air-gapped? We take an end-to-end view of our customer\u2019s needs\u2014from the enterprise to tactical edge\u2014and include coalition and industry requirements for interoperability and collaboration.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For classified mission workloads, hybrid and on-premises capabilities remain an important part of the overall landscape and Microsoft will deliver on that need. We also recognize the need to leverage contemporary capabilities, such as AI, digital twin, and simulation, and understand how information superiority, through the application of these capabilities, is a force multiplier.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s why we support your mission by first leveraging our hyper-scale capabilities, to meet as many customer requirements as we can, across the entire classification spectrum. Where this isn\u2019t possible (like some classified and mission workloads) we leverage our <a href=\"https:\/\/azure.microsoft.com\/products\/azure-stack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Stack portfolio<\/a> for air-gapped and disconnected operations, whilst continuing to invest in hybrid infrastructure and provision of control plane technologies that bring all of these environments seamlessly together.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Achieving a secure digital backbone <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The task to modernize and increase interoperability while navigating today\u2019s threat environment is achievable with partnership across defense, intelligence, government, non-government organizations and industry, academia, and the science and technology (S&amp;T) community. Cybersecurity threats are increasing and will continue to evolve as threat actors gain access to technology and evolve their techniques to conduct destructive cyber-attacks, espionage, and influence operations. Defense and intelligence organizations can have confidence knowing Microsoft Azure is designed to implement the steps discussed to improve cybersecurity and serve as the organization\u2019s secure digital backbone to achieve the mission.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We recognize, though, that transformational progress can be often tempered by policies that seek to simply reinforce legacy approaches rather than inspire new ones. To move forward, we encourage open discussion between defense and industry and across government alliances, working together to express your interest in sharing a common digital backbone and data fabric.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To discuss how Microsoft can help you deliver a secure digital <a href=\"https:\/\/newed.any0.dpdns.org\/industry\/government\/defense-and-intelligence\">defense and intelligence<\/a> backbone, we invite you to connect with us on LinkedIn or reach out to your account team representative.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.linkedin.com\/in\/alvarovitta\/\">Alvaro Vitta | LinkedIn<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.linkedin.com\/in\/jonathon-jono-beesley-dsm-gaicd-865a0885\/\">Jonathon (Jono) Beesley, DSM, GAICD | LinkedIn<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.linkedin.com\/in\/lloyd-r-hewitt\/\">Lloyd Hewitt | LinkedIn<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">For more insights, you can also listen to a two-part cybersecurity miniseries on the Microsoft Public Sector Future Podcast, <a href=\"https:\/\/wwps.microsoft.com\/episodes\/cyber-resilience-government\" target=\"_blank\" rel=\"noreferrer noopener\">Episode 36: Cyber Resilience in Government<\/a> and <a href=\"https:\/\/wwps.microsoft.com\/episodes\/military-lessons-cyberdefense\" target=\"_blank\" rel=\"noreferrer noopener\">Episode 37: Military Lessons on Cyberdefense<\/a>, where we discuss how public sector organizations can be better prepared for future attacks, best practices for protecting sensitive data, and why making risk-based decisions are so important.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/newed.any0.dpdns.org\/security\/business\/microsoft-digital-defense-report-2022\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report 2022 | Microsoft Security<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup> <a href=\"https:\/\/docs.microsoft.com\/security\/msrc\/fy18-strategy-brief\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cybersecurity Defense Operations Center\u2014Security | Microsoft Docs<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>3 <\/sup><a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4GoKL\" target=\"_blank\" rel=\"noreferrer noopener\">The Total Economic Impact\u2122 Of Securing Apps With Microsoft Azure Active Directory<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>4<\/sup> <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWxD0n\" target=\"_blank\" rel=\"noreferrer noopener\">The Total Economic Impact\u2122 of Defender for Cloud from Forrester Consulting<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>5<\/sup> <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4IgFh\" target=\"_blank\" rel=\"noreferrer noopener\">The Total Economic Impact\u2122 of Microsoft Sentinel from Forrester Consulting.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security and resiliency are now being enhanced by the distribution of digital operations and data assets with Microsoft Azure.<\/p>\n","protected":false},"author":0,"featured_media":10150,"template":"","categories":[1373,1117],"tags":[],"content-type":[118],"job-function":[],"coauthors":[1460,1439,1461],"class_list":["post-2987","ms-industry","type-ms-industry","status-publish","has-post-thumbnail","hentry","category-defense-and-intelligence","category-government","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog<\/title>\n<meta name=\"description\" content=\"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog\" \/>\n<meta property=\"og:description\" content=\"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Microsoft Cloud Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T15:56:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@MSCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Lloyd Hewitt, Jonathon Beesley, Alvaro Vitta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/\",\"name\":\"Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp\",\"datePublished\":\"2023-01-17T16:00:00+00:00\",\"dateModified\":\"2026-04-09T15:56:34+00:00\",\"description\":\"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp\",\"width\":800,\"height\":448,\"caption\":\"A graphic representation of a keyhole in the shape of a key overlayed over a globe. The graphic looks like blue digital connections that represent a network.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industries\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/ms-industry\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft for Defense and Intelligence: Secure the digital defense ecosystem and improve interoperability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/\",\"name\":\"The Microsoft Cloud Blog\",\"description\":\"Build the future of your business with AI\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#organization\",\"name\":\"Microsoft Cloud Blog\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"width\":400,\"height\":400,\"caption\":\"Microsoft Cloud Blog\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/MSCloud\",\"https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/\",\"https:\/\/www.youtube.com\/@MicrosoftCloud\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog","description":"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/","og_locale":"en_US","og_type":"article","og_title":"Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog","og_description":"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/","og_site_name":"The Microsoft Cloud Blog","article_modified_time":"2026-04-09T15:56:34+00:00","twitter_card":"summary_large_image","twitter_site":"@MSCloud","twitter_misc":{"Est. reading time":"8 minutes","Written by":"Lloyd Hewitt, Jonathon Beesley, Alvaro Vitta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/","name":"Secure the digital defense ecosystem with Microsoft | The Microsoft Cloud Blog","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp","datePublished":"2023-01-17T16:00:00+00:00","dateModified":"2026-04-09T15:56:34+00:00","description":"Data security and resiliency are now being enhanced by the Microsoft Azure digital backbone, supporting Defense and Intelligence mission.","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/01\/Picture4-Featured.webp","width":800,"height":448,"caption":"A graphic representation of a keyhole in the shape of a key overlayed over a globe. The graphic looks like blue digital connections that represent a network."},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/defense-and-intelligence\/2023\/01\/17\/microsoft-for-defense-and-intelligence-secure-the-digital-defense-ecosystem-and-improve-interoperability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/"},{"@type":"ListItem","position":2,"name":"Industries","item":"https:\/\/newed.any0.dpdns.org\/en-us\/innovation\/blog\/ms-industry\/"},{"@type":"ListItem","position":3,"name":"Microsoft for Defense and Intelligence: Secure the digital defense ecosystem and improve interoperability"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/","name":"The Microsoft Cloud Blog","description":"Build the future of your business with AI","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#organization","name":"Microsoft Cloud Blog","url":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","width":400,"height":400,"caption":"Microsoft Cloud Blog"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/MSCloud","https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/","https:\/\/www.youtube.com\/@MicrosoftCloud"]}]}},"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/2987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/types\/ms-industry"}],"version-history":[{"count":1,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/2987\/revisions"}],"predecessor-version":[{"id":12299,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/2987\/revisions\/12299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media\/10150"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media?parent=2987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/categories?post=2987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/tags?post=2987"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/content-type?post=2987"},{"taxonomy":"job-function","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/job-function?post=2987"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/coauthors?post=2987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}