Friday, November 15, 2024
HomeCloudMicrosoft To Ban 50+ Products For Users In Russia

Microsoft To Ban 50+ Products For Users In Russia

Published on

Softline Group, a major IT solutions provider, has confirmed the suspension of access to cloud products offered by Microsoft, Amazon, and Google for Russian customers.

Microsoft Corporation has recently announced the suspension of new sales in Russia.

This disruption is effective March 20, 2024, and applies to a wide range of cloud-based software, including:

- Advertisement - SIEM as a Service
  • Power BI (business intelligence)
  • Dynamics CRM (customer relationship management)
  • (and potentially others)

The Cause:

These restrictions stem from the European Union’s “12th package of sanctions” implemented in December 2023.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, which helps you to quantify risk accurately:

These sanctions limit the supply of specific software categories, including business intelligence and customer relationship management (CRM) tools, to Russia.

The list of products to be banned includes a wide range of corporate applications, such as those for business process management, corporate accounting, automation, business analysis, project management, IT environment management, collaboration, and applications for small and medium-sized enterprises (SMEs). Notably, the ban will also affect software development tools, including the popular Visual Studio development environment, and applications connected with databases like Access DBMS and SQL Server, Russian media Outlet reports.

The Impact:

As of March 20th, Russian companies will no longer be able to:

  • Use the affected cloud products.
  • Access data stored within these products.

The specific regulation cited (EU Regulation 833/2014) restricts the supply of various software types to Russia.

This will likely cause significant disruption to Russian businesses and organizations that rely on these Microsoft products for their daily operations.

The ban extends to applications that are integral to various business functions, from accounting and resource planning to data analysis and software development.

Softline Group emphasizes that the suspension could potentially encompass all cloud products from Microsoft, Amazon, and Google that fall under these restrictions.

Softline has been advising Russian companies to back up their data and transition to domestically made alternatives.

The Russian government has also been promoting local alternatives to ensure the continued operations of private companies and organizations.

Microsoft’s ban on its cloud products in Russia is a clear indication of the tech industry’s alignment with international sanctions policies.

The move underscores the challenges that Russian businesses face as they navigate an increasingly isolated technological landscape.

As the situation develops, it will be crucial for affected organizations to find viable alternatives to maintain their operations.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...