{"id":47596,"date":"2022-07-20T16:00:00","date_gmt":"2022-07-20T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=117929"},"modified":"2022-07-20T16:00:00","modified_gmt":"2022-07-20T16:00:00","slug":"how-microsoft-purview-and-priva-support-the-partner-ecosystem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/","title":{"rendered":"How Microsoft Purview and Priva support the partner ecosystem"},"content":{"rendered":"<p>Today, many enterprise organizations are multicloud and multiplatform. Critical enterprise data is located across clouds and platforms, requiring security and compliance no matter where it lives. To solve the complexity that comes with these environments, organizations have invested in multiple point solutions, which in turn can make it hard for them to manage the fragmented compliance and risk posture covering their entire data estate. To help organizations meet today\u2019s global compliance and risk requirements across their multicloud, multiplatform data environments, we announced <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\">Microsoft Purview<\/a> in April 2022.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"391\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-1024x391.png\" alt=\"Three columns with text explaining that Microsoft Purview helps customers understand and govern data across their environment, safeguard their data across clouds, apps, and devices, and improve data risk and compliance posture with regulatory requirements.\" class=\"wp-image-118181\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-1024x391.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-300x114.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-768x293.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture.png 1232w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure>\n<p>Microsoft Purview is a portfolio of solutions for information protection, data governance, risk management, and compliance that enables organizations to effectively manage their data all from one place. It provides enhanced visibility that organizations can leverage across their environment to help close gaps that can lead to data exposure, simplify tasks through automation, stay up-to-date with regulatory requirements, and keep their most important asset\u2014their data\u2014secured. Partners play a critical role in helping customers manage their entire data estate.&nbsp;We\u2019ve invested in connectors, APIs, and extensibility to support partners and help customers manage their data.&nbsp;<\/p>\n<h2>Microsoft Purview product announcements<\/h2>\n<p>Today, we are excited to announce the general availability of the new Microsoft Graph APIs for <a href=\"https:\/\/www.microsoft.com\/security\/business\/risk-management\/microsoft-purview-ediscovery\">Microsoft Purview eDiscovery<\/a>. With the new Microsoft Purview eDiscovery APIs, organizations can leverage automation to streamline common, repetitive workflows that require a lot of manual effort in the product experience.<\/p>\n<p>Customers and partners find automation and extensibility of eDiscovery workflows critically important because of the ability to reduce the potential for human error in highly sensitive workflows. For example, efficiently managing repeatable, defensible processes is critical to managing risk for organizations that have significant requirements for litigation and investigation.<\/p>\n<p>Here are some of the ways partners are building value-added solutions and services using our Microsoft Purview eDiscovery APIs:<\/p>\n<h3><strong>Relativity integrates with Microsoft Purview eDiscovery (Premium)<\/strong><\/h3>\n<p>Relativity, Microsoft\u2019s Security ISV of the Year for 2022, shared that \u201c<em>using the right tools to put business\u2019s data into action is essential for many eDiscovery and compliance use cases. RelativityOne integration with Microsoft Purview eDiscovery significantly expedites the eDiscovery review process, minimizes data copies across multiple platforms, facilitates third-party collaboration, and ultimately reduces costs while the data remains secure within the Microsoft cloud. Now is the time to benefit from RelativityOne\u2019s integration with Microsoft\u2019s Purview\u2019s eDiscovery platform<\/em>,\u201d said Chris Izsak, Strategic Partnerships GTM Manager, Relativity.<\/p>\n<figure class=\"wp-block-image size-full\"><img width=\"960\" height=\"540\" data-animated_src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Relativity-Microsoft-eDP-GIF-960x540-1.gif\" alt=\"Relativity's RelOne user experience showing integration with Microsoft Purview eDiscovery.\" class=\"wp-image-118340\"><\/figure>\n<h3><strong>BDO\u2019s Athenagy integrates with Microsoft Purview eDiscovery<\/strong><\/h3>\n<p>BDO\u2019s Athenagy creates dashboards using both Microsoft Purview eDiscovery and RelativityOne. Their \u201c<em>patent-pending business intelligence dashboards now provide legal, IT, and compliance professionals a whole new level of data transparency and cost containment by surfacing up critical insights inside both Microsoft Purview eDiscovery\u2014using the newly released Microsoft Purview eDiscovery APIs\u2014and RelativityOne tied to legal hold, collect, preservation, processing, and review for every investigation, compliance, and litigation matter<\/em>,\u201d said Daniel Gold, inventor of Athenagy and managing director of E-Discovery Managed Services, BDO.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"725\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Day-2-Inspire-2-1024x725.jpg\" alt=\"Athenagy's user experience showing data from Microsoft Purview eDiscovery.\" class=\"wp-image-118199\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Day-2-Inspire-2-1024x725.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Day-2-Inspire-2-300x212.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Day-2-Inspire-2-768x543.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Day-2-Inspire-2.jpg 1132w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure>\n<h3><strong>Epiq Global integrates with Microsoft Purview eDiscovery<\/strong><\/h3>\n<p>Epiq leverages Microsoft Purview eDiscovery APIs to create an end-to-end eDiscovery workflow. \u201c<em>Utilizing the Microsoft Purview eDiscovery APIs allows us to automate within Microsoft Purview to use inputs from our customer\u2019s existing legal hold system of record to seamlessly orchestrate an end-to-end workflow including sending hold notices, preserving data in place, and performing searches, collections, and exports. When updates are made in the system of record, the changes are propagated directly to the appropriate piece of eDiscovery to ensure parity.&nbsp;An automated solution eliminates human error, reduces administrative costs, and ensures that eDiscovery processes are in sync with your issuance of legal holds<\/em>,\u201d said Jon Kessler, Vice President of Information Governance Services, Epiq.<\/p>\n<h3><strong>Lighthouse integrates with Microsoft Purview eDiscovery<\/strong><\/h3>\n<p>Lighthouse uses Microsoft Purview eDiscovery APIs to create \u201c<em>a rich and intuitive user experience, taking advantage of custodian data mapping, in-place preservation, modern attachment retrieval, and advanced culling. Our automation and orchestration solution is designed to improve user efficacy with job failure oversight, completion notification, and automatic provisioning and management of Azure storage containers. Clients embracing this solution benefit from automation and orchestration to fully leverage Purview Premium eDiscovery\u2019s apps securely and at scale<\/em>,\u201d said John Collins, Director of Advisory Services, Lighthouse (winner of the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/06\/06\/announcing-2022-microsoft-security-excellence-awards-winners\/\">Compliance and Privacy Trailblazer award<\/a> for 2022).<\/p>\n<h2>Growth opportunities for partners<\/h2>\n<p>The opportunity for our partners who invest in the Microsoft compliance ecosystem continues to grow. Our partners are finding success by building value-added solutions and services around Microsoft\u2019s solutions at an increasing rate. For example, partners are creating solutions that connect disparate information repositories for enterprise-wide compliance initiatives.<\/p>\n<p>Microsoft partners continue to have the ability to participate in our successful go-to-market program, the partner build-intent workshops. These workshops cover the Microsoft Security portfolio and help drive customer success with Microsoft products and partner services through prescriptive scenarios that address the top pain points of our customers. These workshops have been updated to give partners the ability to uncover additional opportunities leveraging the most up-to-date tools and solutions. Discover all our <a href=\"http:\/\/aka.ms\/MCI\/Workshops\" target=\"_blank\" rel=\"noreferrer noopener\">partner workshops<\/a> and get started with unlocking opportunities and value with your customers.<\/p>\n<h2>How Microsoft supports the partner ecosystem<\/h2>\n<p>The Microsoft Purview platform enables our customers and partners to adapt, extend, integrate, and automate information protection, data governance, risk management, and compliance scenarios. These capabilities are enabled through our investments in these key building blocks:<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/compliance\/compliance-extensibility?view=o365-worldwide#apis\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Purview APIs<\/strong><\/a>:<strong> <\/strong>We are constantly expanding our API surface area. With our investments in Microsoft Graph APIs we currently enabling extensibility scenarios across Purview Information Protection, Purview Data Lifecycle Management, Purview eDiscovery, Purview Audit, and more. Partners are using these APIs to build value-added services and solve unique customer scenarios.<\/p>\n<p><strong><a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/compliance\/archiving-third-party-data?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Data Connectors<\/a><\/strong>:<strong> <\/strong>To enable high-fidelity data ingestion\u2014including sources such as Slack, Zoom, and WhatsApp, we have partnered with Veritas, TeleMessage, 17a-4, and CellTrust to deliver more than 70 ready-to-use connectors. Our extensibility push provides more opportunities for partners to join this connector ecosystem.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/azure\/purview\/microsoft-purview-connector-overview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Purview Data Catalog<\/strong><\/a>: Microsoft Purview\u2019s unified data governance capabilities help with managing on-premises, multicloud, and software as a service (SaaS) data. Microsoft Purview Data Catalog supports multicloud data classification and covers data repositories such as Azure Cosmos DB and Amazon Web Services (AWS) S3 buckets. There is also an <a href=\"https:\/\/docs.microsoft.com\/azure\/purview\/manage-kafka-dotnet\" target=\"_blank\" rel=\"noreferrer noopener\">Atlas Kafka API<\/a> that facilitates extensibility scenarios for our partners and customers.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/compliance\/compliance-manager-templates?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Purview Compliance Manager<\/strong><\/a>: With universal templates, we help partners and customers extend compliance management capabilities to non-Microsoft environments.<\/p>\n<p><strong>Power Automate<\/strong> <strong>integrations<\/strong>: Microsoft Purview solutions including <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/extending-microsoft-purview-ecosystem-with-new-apis-power\/ba-p\/3401529\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Data Lifecycle Management<\/a>, <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/compliance\/insider-risk-management-settings?view=o365-worldwide#power-automate-flows-preview\" target=\"_blank\" rel=\"noreferrer noopener\">Insider Risk Management<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/compliance\/communication-compliance-investigate-remediate?view=o365-worldwide#step-5-consider-power-automate-flows\" target=\"_blank\" rel=\"noreferrer noopener\">Communication Compliance<\/a> have built-in Power Automate integrations. This offers unique opportunities for our partners and customers to streamline and automate workflows and business scenarios.<\/p>\n<p>Another way Microsoft supports the ecosystem is through the <a href=\"https:\/\/www.microsoft.com\/security\/business\/intelligent-security-association\">Microsoft Intelligent Security Association<\/a> (MISA). MISA is an ecosystem of independent software vendors and managed service providers that have integrated their products and services with Microsoft\u2019s security technology. Over the last year, MISA has extended its qualifying products to include a broad range of Microsoft Purview and <a href=\"https:\/\/www.microsoft.com\/security\/business\/privacy\/microsoft-priva-risk-management\">Microsoft Priva<\/a> products. MISA offers members co-marketing benefits and the opportunity to deepen their technology integrations and relationship within the Microsoft security ecosystem. MISA offers members co-marketing benefits and the opportunity to deepen their technology integrations and relationship within the Microsoft security ecosystem.<\/p>\n<h2>Partner with Microsoft Purview<\/h2>\n<p>Here are a few ways that partners can join the Microsoft Purview ecosystem:<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/20\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are excited to announce the general availability of the new Microsoft Graph APIs for Microsoft Purview eDiscovery. With the new Microsoft Purview eDiscovery APIs, partners and customers can leverage automation to streamline common, repetitive workflows that require a lot of manual effort in the product experience.<br \/>\nThe post How Microsoft Purview and Priva support the partner ecosystem appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,9249,347,6871,10072],"class_list":["post-47596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-compliance-series","tag-cybersecurity","tag-data-governance","tag-microsoft-purview"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-20T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-1024x391.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Microsoft Purview and Priva support the partner ecosystem\",\"datePublished\":\"2022-07-20T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png\",\"keywords\":[\"compliance\",\"Compliance Series\",\"Cybersecurity\",\"Data governance\",\"Microsoft Purview\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\",\"name\":\"How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png\",\"datePublished\":\"2022-07-20T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png\",\"width\":1024,\"height\":391},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Microsoft Purview and Priva support the partner ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/","og_locale":"en_US","og_type":"article","og_title":"How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-20T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/picture-1024x391.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Microsoft Purview and Priva support the partner ecosystem","datePublished":"2022-07-20T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png","keywords":["compliance","Compliance Series","Cybersecurity","Data governance","Microsoft Purview"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/","url":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/","name":"How Microsoft Purview and Priva support the partner ecosystem 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png","datePublished":"2022-07-20T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/how-microsoft-purview-and-priva-support-the-partner-ecosystem.png","width":1024,"height":391},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-purview-and-priva-support-the-partner-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"How Microsoft Purview and Priva support the partner ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47596"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47597"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}