Secure your complete data lifecycle using Azure Information Protection

Slides:



Advertisements
Similar presentations
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Advertisements

MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Understanding Active Directory
Session 1.
Feature: Print Remaining Documents © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Suggested Item Enhancements – Sales Script and Additional Information © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
demo Demo.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

Sage Franch | Technical Evangelist Susan Ibach | Technical Evangelist.
Microsoft Virtual Academy
ActiveSync & DLP management in Exchange Online
The time to address enterprise mobility is now
Deployment Planning Services
Azure Information Protection
Azure Information Protection
Deployment Planning Services
Using Office 365 Across All Your Devices
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Microsoft Virtual Academy
Deployment Planning Services
MIX 09 5/29/ :31 AM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Azure Information Protection Strategy and Roadmap
Deployment Planning Services
6/17/ :27 AM BRK3341 Unlock extensibility by connecting your service to PowerApps and Microsoft Flow Theresa (Tessa) Palmer–Sr. Program Manager Sunay.
Microsoft Ignite /30/2018 6:28 PM
Protect sensitive information with Office 365 DLP
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
The Information Protection Problem
Information Protection
Secure your complete data lifecycle using Azure Information Protection
Microsoft Dynamics NAV 2018 – what’s new
Azure Information Protection
Rights Management Services (RMS)
Understanding best practices in classifying sensitive data
Microsoft Intune MAM without Device Enrollment
Azure Information Protection
Self Service Group Management (SSGM)
RMS with Microsoft SharePoint
Ochrana (nejen) poštovních zpráv pomocí AIP (Azure Information Protection) Miroslav Knotek MVP: Cloud and Datacenter Management, MCSE: Productivity IT.
Power Apps & Flow for Microsoft Dynamics SL
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Azure Information Protection
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Azure Information Protection
Azure Information Protection
Azure Information Protection
Azure Information Protection
Build /2/ The future of Azure devops: Building and managing cloud applications lifecycle across your teams Bradley Millington Program.
Understand your Azure cloud assets dependencies with BMC Discovery
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Windows 8 Security Internals
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Шитманов Дархан Қаражанұлы Тарих пәнінің
Microsoft Data Insights Summit
Make it real: Help your customers comply with the GDPR
Azure AD Simon May Technical Evangelist.
How to Build a Passive Income Portfolio
Microsoft Data Insights Summit
Presentation transcript:

Secure your complete data lifecycle using Azure Information Protection Microsoft Inspire 2/15/2018 6:55 AM Microsoft Inspire Session CE412p Secure your complete data lifecycle using Azure Information Protection Watch session video © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Microsoft Inspire 2/15/2018 6:55 AM Session objective: Learn how Azure Information Protection provides persistent protection for your data – throughout complete data lifecycle © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Data is shared more often and more widely than ever. Legal review Remote team Corporate Personal Project Lead Online backup Project Lead Private cloud Project Manager Data is shared more often and more widely than ever. Purpose of slide: Summarize the implications of the mobile-first, cloud-first world on data protection. Key takeaways With the adoption of mobility and cloud services, data is travelling to more locations than ever before. While it has helped users to become more productive and collaborative, securing and monitoring the data has become harder. To address data protection in this mobile-first, cloud-first world, it is important to step back and think holistically about the data life cycle. You need to consider what protective measures you should take along the way: when data is created or modified when a user wants to access it when data moves to mobile and cloud apps when it gets breached Sales teams Graphic designer Vendors SaaS Ex-employees Offshore teams Public Agency teams © 2017 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

How to provide persistent data protection on-premises and in the cloud Online backup Email Out of your control Mobile devices, SaaS apps On-premises SaaS apps Cloud storage Mobile devices How to provide persistent data protection on-premises and in the cloud Purpose of slide: Transition to the scenario about providing persistent data protection on-premises and in the cloud Key takeaway Even identifying the data that needs protection can be a major challenge. So how can you discover your data and keep it protected when it’s being stored in disparate locations and shared across boundaries? On-premises

Protect data on-premises and in the cloud with Azure Information Protection Classification and labeling Classify data based on sensitivity and add labels— manually or automatically. Protection Encrypt your sensitive data and define usage rights or add visual markings when needed. Monitoring Use detailed tracking and reporting to see what’s happening with your shared data and maintain control over it. Purpose of slide: Summarize benefits of Azure Information Protection Key takeaways The best way to protect data at all times, regardless of where it is stored, with whom it is shared, or if the device is running iOS, Android or Windows, is to build classification and protection into the file itself so protection can travel with the data wherever it goes. Microsoft Azure Information Protection (AIP) is designed to provide persistent data protection both on-premises and in the cloud.

Classification and labeling Policies can be set by IT Admins for automatically applying classification and protection to data. Automatic classification HIGHLY CONFIDENTIAL CONFIDENTIAL PERSONAL GENERAL Based on the content you’re working on, you can be prompted with suggested classification. Recommended classification PUBLIC You can override a classification and optionally be required to provide a justification. Manual reclassification Purpose of slide: Summarize Azure Information Protection features for classification and labeling. Key takeaways Data classification is an important part of any data governance plan. Adopting a classification scheme that applies throughout your business can be particularly helpful in responding to what the GDPR calls data subject (i.e., your EU employee or customer) requests, because it enables enterprises to identify more readily and process personal data requests. There are different levels of classifications, from public to highly confidential, and different methods for classifying data. Azure Information Protection can be used to help you classify and label your data at the time of creation or modification. Users can choose to apply a sensitivity label to the email or file they are working on with a single click. User-specified classification

Protection Protection policies IT Admins can set policies to automatically control, protect, and watermark data. Protection policies Azure Information Protection encrypts files containing personal data according to policies. File encryption Purpose of slide: Describe Azure Information Protection protection. Key takeaways After classifying and labeling data properly, securing and controlling data is the next step. Azure Information Protection provides an identity-based security approach that can be used for this purpose. Azure Information Protection gives you flexibility in defining policies to control and protect. Once you have policies in place, you can use AIP to encrypt files containing personal data and manage access rights in accordance with the appropriate policy in line with the GDPR. This screen shot shows an administrator policy that automatically protects all data labeled as “Confidential.” Visual markings such as a footer and watermark are also applied to such data.

Protection Secure sharing Safely share data with people inside and outside of your organization. Define explicit permissions for recipients, e.g., allow people to view and edit, but not print or forward. Secure sharing Purpose of slide: Discuss Azure Information Protection’s support for secure sharing Key takeaways Azure Information Protection also helps your users share sensitive data in a secure manner. In this example, information about a sensitive acquisition was encrypted and restricted to a group of people who were granted only a limited set of permissions on the information – they could modify the content but could not copy or print it. Decryption will be conditional to the user being authorized by the access policy – thereby enforcing the intended safeguards around the personal data (i.e., unauthorized persons will not have access). With the rights-based encryption in place, sharing becomes less cumbersome. You have the means to prevent personal data from leaking to unauthorized persons, with audit logs to track each access.

Demo Classify, Label and Protect sensitive data

Monitoring Distribution visibility Analyze the flow of personal and sensitive data and detect risky behaviors. Distribution visibility Track who is accessing documents and from where. Access logging Purpose of slide: Show screenshots to demonstrate how AIP enables monitoring and control of documents. Key takeaways The first screenshot shows how Azure Information Protection tracks documents geographically. You see an actual map of the location of people who have attempted to access the document “Code Blue.” You can see that, whereas most of the people who have accessed the document are in the United States, someone in Australia attempted to access the document, and was blocked. The other screenshot shows how you can revoke access and send a message stating why. Prevent data leakage or misuse by changing or revoking document access remotely. Access revocation

Demo Securely share sensitive data and monitor its distribution

Resources Follow @ https://twitter.com/MSFTMobility 2/15/2018 6:55 AM Resources Follow @ https://twitter.com/MSFTMobility Technical Documentation @ https://docs.microsoft.com For questions email AskIPteam@Microsoft.com IT Pro Blog @ https://blogs.technet.microsoft.com/enterprisemobility/ Download @ https://www.microsoft.com/en-us/download/details.aspx?id=53018 Product page @ https://www.microsoft.com/en-us/cloud-platform/azure-information-protection © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Microsoft Inspire 2/15/2018 6:55 AM Session objective: Learn how Azure Information Protection provides persistent protection for your data – throughout complete data lifecycle © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Microsoft Inspire 2/15/2018 6:55 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.