{"id":1473,"date":"2022-03-09T20:24:00","date_gmt":"2022-03-09T20:24:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/defender-for-business\/"},"modified":"2023-05-17T02:20:02","modified_gmt":"2023-05-17T02:20:02","slug":"defender-for-business","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/defender-for-business\/","title":{"rendered":"Defender for Business: enterprise-grade endpoint protection"},"content":{"rendered":"<p>A new way for SMBs to protect against cyber threats.<\/p>\n<p>With cyberattacks increasingly focused on small and mid-sized businesses (SMBs), security remains a major challenge for businesses today. In the past year, <a href=\"https:\/\/abcnews.go.com\/Politics\/dhs-secretary-warns-ransomware-attacks-rise-targets-include\/story?id=77512872\" target=\"_blank\" rel=\"noopener\">ransomware attacks have increased by 300% \u2014 and SMBs comprise between 50-75% of victims.<\/a> Additionally, as security threats become more automated, indiscriminate, and sophisticated, businesses are faced with a higher rate of successful attacks.<\/p>\n<p>To address this concern, Microsoft is purposefully investing in security solutions geared toward SMBs with the introduction of tools such as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/microsoft-defender-business\" target=\"_blank\" rel=\"noopener\">Defender for Business<\/a>. With general availability expected in Microsoft&#8217;s Q4, Microsoft Defender for Business is a new standalone security solution designed to provide easy-to-use enterprise-grade endpoint security for businesses with up to 300 employees.<\/p>\n<p>Pax8 provides your first look at this exciting, cost-effective offering meant to empower SMBs to take control of their business\u2019 security posture.<\/p>\n<h2>Defender for Business At-a-Glance<\/h2>\n<table style=\"font-weight: 400; height: 877px; vertical-align: middle; padding: 10px;\" border=\"1\" width=\"100%\">\n<tbody>\n<tr>\n<td style=\"text-align: left; vertical-align: middle; padding: 10px; background-color: #ededed;\" colspan=\"1\" rowspan=\"1\">\n<p style=\"text-align: center;\"><strong>Client Size <\/strong><\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px; background-color: #ededed;\"><strong> &lt; 300 Seats<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px; background-color: #ededed;\" colspan=\"2\" rowspan=\"1\">\n<p style=\"text-align: center;\"><strong> &gt; 300 Seats<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Endpoint Capabilities <\/strong><\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Microsoft Defender for Business (included with M365BP, currently in preview)<\/strong><\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Microsoft Defender for Endpoint Plan 1 (included with M365E3, currently in preview)\u00a0<\/strong><\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Microsoft Defender for Endpoint Plan 2 (included with M365E5)<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Centralized Management<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Simplified Client Configuration<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Threat and Vulnerability Management<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Attack Surface Reduction<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Next-Gen Protection<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Endpoint Detection and Response<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Automated Investigation and Response<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Threat Hunting and 6-months Data Retention<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Threat Analytics<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Cross-platform support for Windows, MacOS, iOS, and Android<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Microsoft Threat Experts<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Partner APIs for Exporting to SIEM<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; padding: 10px;\"><strong>Microsoft 365 Lighthouse for Partners for Viewing Security Incidents Across Customers<\/strong><\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\u2714<\/p>\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<td style=\"vertical-align: middle; padding: 10px;\">\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2><\/h2>\n<h2>Why Choose Defender for Business?<\/h2>\n<h3>Elevated Security for Your Clients<\/h3>\n<p>Traditional anti-virus simply isn\u2019t enough protection against today&#8217;s sophisticated cyberthreats. As an endpoint security solution, Defender for Business helps SMBs elevate their overall security posture beyond the capabilities of traditional anti-virus.<\/p>\n<p>Defender for Business provides SMBs with an easy-to-use package that gives them enterprise-grade protection through technologies such as next-generation protection, endpoint detection &amp; response, threat &amp; vulnerability management, and automated investigation &amp; remediation \u2014 all at an SMB-friendly price point.<\/p>\n<table style=\"font-weight: 400; height: 200px; vertical-align: middle; padding: 10px;\" border=\"1\" width=\"100%\">\n<tbody>\n<tr>\n<td style=\"padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Enterprise-Grade Protection<\/strong><\/p>\n<p style=\"text-align: left;\">Security for all devices, with next-gen protection, endpoint detection &amp; response, and threat &amp; vulnerability management.<\/p>\n<\/td>\n<td style=\"padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Easy to Use<\/strong><\/p>\n<p style=\"text-align: left;\">Streamline onboarding with wizard-driven set up and recommended security policies activated out-of-the-box to quickly secure devices.<\/p>\n<\/td>\n<td style=\"padding: 10px;\">\n<p style=\"text-align: center;\"><strong>Cost-Effective<\/strong><\/p>\n<p style=\"text-align: left;\">Endpoint security that keeps organizations productive and works with their IT without compromising budget.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Benefits for MSPs<\/h3>\n<p>In addition to the features and capabilities clients receive, there are also <a href=\"https:\/\/cloudpartners.transform.microsoft.com\/products\/ms-defender-for-business\" target=\"_blank\" rel=\"noopener\">benefits<\/a> for partners who choose to offer Defender for Business:<\/p>\n<p><strong><span class=\"s3\"><b>&#8211;<\/b>Reduce risk: <\/span><\/strong>AI-powered automation assists in increasing the security posture for your clients and their devices to quickly protect, detect, and respond to cyberthreats.<\/p>\n<p><strong><span class=\"s3\"><b>&#8211;<\/b>Manage your clients with ease: <\/span><\/strong>Standardize with one solution across client devices, no matter which operating system they use. Combined with Microsoft 365 Lighthouse, you will be able to view security incidents across your clients.<\/p>\n<p><strong><span class=\"s3\"><b>&#8211;<\/b>Grow revenue and reduce operational costs:<\/span><\/strong> Build higher-margin, standardized endpoint security services while reducing operational costs with a simplified security solution.<\/p>\n<h2>Upselling to the Broader Microsoft Portfolio<\/h2>\n<p>Because security is top-of-mind for SMBs, Defender for Business is an excellent entry point for new clients who are interested in the Microsoft ecosystem. Once a client has gained interest in Defender for Business, it becomes easier to upsell to the broader Microsoft portfolio with other SMB offerings like Microsoft 365 Business Premium.<\/p>\n<p>While Defender for Business can be sold as a standalone solution, the best part is that it will also be included in Microsoft 365 Business Premium! With the introduction of Defender for Business, Microsoft 365 Business Premium will offer a comprehensive suite of solutions for SMB needs that provides:<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Access to productivity solutions such as Office and Teams<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Enterprise-grade security for endpoint\/device protection with Defender for Business<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Email and collaboration protection against phishing with Defender for Office 365<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Device management with Intune<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Identity protection and remote access with Azure Active Directory<\/p>\n<p style=\"padding-left: 40px;\"><strong><span class=\"s3\"><b>\u2022 <\/b><\/span><\/strong>Data protection with Azure Information Protection &amp; DLP<\/p>\n<p>This only covers a fraction of the tools available when upgrading to Microsoft 365 Business Premium \u2013 providing great value in an easy-to-use package that comes without the additional costs of going for individual solutions.<\/p>\n<h2>Get Started with Defender for Business<\/h2>\n<p>Microsoft Defender for Business is now available to users with Microsoft 365 Business Premium. Defender for Business as a standalone solution is expected to be available in Microsoft&#8217;s Q4, but partners can continue to sign up for the preview. Preview trials for Defender for Business will last 90 days from activation, after which, clients and partners will need to purchase licenses.<\/p>\n<p>Learning more about <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-business\/?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Defender for Business<\/a> or the details of the preview is as easy as reaching out to your Pax8 rep for a one-on-one conversation today!<\/p>\n<p><a class=\"btn-primary\" href=\"\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new way for SMBs to protect against cyber threats. With cyberattacks increasingly focused on small and mid-sized businesses (SMBs), security remains a major challenge for businesses today. In the past year, ransomware attacks have increased by 300% \u2014 and SMBs comprise between 50-75% of victims. Additionally, as security threats become more automated, indiscriminate, and [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":373,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10,5],"tags":[],"class_list":["post-1473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defender for Business: enterprise-grade endpoint protection - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/defender-for-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defender for Business: enterprise-grade endpoint protection - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/defender-for-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T20:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T02:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Defender for Business: enterprise-grade endpoint protection\",\"datePublished\":\"2022-03-09T20:24:00+00:00\",\"dateModified\":\"2023-05-17T02:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/\"},\"wordCount\":770,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Defender-for-Business.png\",\"articleSection\":[\"Microsoft\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/\",\"name\":\"Defender for Business: enterprise-grade endpoint protection - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Defender-for-Business.png\",\"datePublished\":\"2022-03-09T20:24:00+00:00\",\"dateModified\":\"2023-05-17T02:20:02+00:00\",\"description\":\"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Defender-for-Business.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Defender-for-Business.png\",\"width\":600,\"height\":314,\"caption\":\"Defender for Business\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/defender-for-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defender for Business: enterprise-grade endpoint protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defender for Business: enterprise-grade endpoint protection - Pax8 Blog","description":"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/defender-for-business\/","og_locale":"en_US","og_type":"article","og_title":"Defender for Business: enterprise-grade endpoint protection - Pax8 Blog","og_description":"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.","og_url":"https:\/\/www.pax8.com\/blog\/defender-for-business\/","og_site_name":"Pax8 Blog","article_published_time":"2022-03-09T20:24:00+00:00","article_modified_time":"2023-05-17T02:20:02+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Defender for Business: enterprise-grade endpoint protection","datePublished":"2022-03-09T20:24:00+00:00","dateModified":"2023-05-17T02:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/"},"wordCount":770,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png","articleSection":["Microsoft","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/","url":"https:\/\/www.pax8.com\/blog\/defender-for-business\/","name":"Defender for Business: enterprise-grade endpoint protection - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png","datePublished":"2022-03-09T20:24:00+00:00","dateModified":"2023-05-17T02:20:02+00:00","description":"Pax8 has your first look at Microsoft Defender for Business \u2014 a new cost-effective offering that provides enterprise-grade endpoint security for SMBs.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/defender-for-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Defender-for-Business.png","width":600,"height":314,"caption":"Defender for Business"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/defender-for-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Defender for Business: enterprise-grade endpoint protection"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1473"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/373"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}