Microsoft Defender for Cloud is a unified infrastructure security management system that strengthens the security posture (CSPM) of cloud infrastructure and hybrid data centers, and provides built-in advanced threat protection, with Azure Defender, across hybrid workloads wherever they are, in Azure and beyond.

Microsoft Sentinel is a cloud-native SIEM and SOAR platform that uses built-in AI to help analyze large volumes of data across an enterprise—fast. Microsoft Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud.

Microsoft Defender for IoT is a global Microsoft group delivering OT and IoT security. The group is comprised of top-notch engineers, product people, researchers and business developers. The group's solutions are deployed worldwide in every possible vertical, ranging from energy and manufacturing to smart spaces and standard enterprise environments, in which a plethora of IoT devices is used.

MSTIC-IL hunts, tracks and protects against nation-state threats (and other advanced threats) as part of MSTIC (the Microsoft Threat Intelligence Center). MSTIC-IL also builds SPECTRE - the platform Microsoft threat analysts use to collaborate on threat hunting and customer protection for advanced adversary encounters.

Microsoft 365 Defender​ is a recognized market leading XDR solution for Microsoft 365, that automatically detects attacks and blocks them. It offers built in, automated and coordinated protection services across the M365 security portfolio products and a unified portal for security teams to manage it. The M365 Defender products portfolio includes: Microsoft 365 Defender (M365D) serving as the one unified portal for all portfolio products and as the platform, orchestrator and portal on which all M365 Defender portfolio services run.

Microsoft Defender for Endpoint (MDE)​ A holistic, cloud-delivered endpoint security solution that works across all OS platforms and device form factors, offering behavior-based next gen Antimalware, risk-based vulnerability management and assessment, security posture configuration, Endpoint detection and response (EDR), Automatic remediation and Managed hunting services (Microsoft Threat Experts).

Microsoft Defender for Identity (MDI)​ A cloud-based security solution that leverages on-premises Active Directory and hybrid on-premises and cloud connector (ADFS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions.

Cloud Access Security Broker (CASB)​ A solution that supports various deployment modes, including log collection, API connectors, and reverse proxy. It provides security teams with rich visibility (discovery), threat detection and control (data protection and compliance) for over 25K applications used by the enterprise users and sophisticated analytics to identify and combat cyberthreats across Microsoft and third-party cloud services.

Microsoft Defender for Office 365​ Protecting all of Office 365 against advanced threats like business email compromise and credential phishing. Automatically investigating and remediating attacks. Improves SecOps efficiency through unparalleled scale and effectiveness using automated workflows.

Azure Information Protection enables organizations to discover, classify and protect documents and emails, by applying labels to content, with multi-cloud support to scan, classify, govern and protect their data estate.


BlueHat IL is home to the largest Infosec community in Israel. With a thriving local ecosystem that is globally renowned for its excellence, innovation and creativity, it isn’t surprising that Israeli companies have a huge impact on cybersecurity worldwide. Our community includes industry leaders, entrepreneurs, academia, government officials, independent researchers and hobbyists.

Every year, thousands of security professionals take part in our initiatives:

BlueHat IL conference - the biggest Israeli security research conference.
F BlueHat Meetup - an open stage for casual gatherings and sharing knowledge.

Follow us on


Can you
hack it?