Enterprise Mobility Suite Technical and Business Briefing

Slides:



Advertisements
Similar presentations
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Advertisements

Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently work away from their desks.***
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
EMS Everywhere Agenda Session Audience Goal Time Introduction
Microsoft 365 Security and Compliance: Training and Resources
The time to address enterprise mobility is now
Deployment Planning Services
3 Do you monitor for unauthorized intrusion activity?
Cloud App Security vs. O365 Advanced Security Management
Security As a Service Value Proposition
Deployment Planning Services
Microsoft Ignite /27/2018 9:00 AM THR2016
EMS Everywhere Workshop Overview February 2017
Upsell Small Business Customers to an Office 365 plan
Transforming business
Deployment Planning Services
Journey to Microsoft Secure Cloud
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
SaaS Application Deep Dive
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Virtual Academy
Examine common architectures for hybrid identity
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Protect sensitive information with Office 365 DLP
Azure RMS Deep Dive.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Sales Readiness Series
Microsoft 365 Business Customer Targeting 2/6/18
Microsoft Intune MAM without Device Enrollment
Welcome! Microsoft Tech Talks - Charlotte, NC
CYB 100 Teaching Effectively-- snaptutorial.com
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
11/11/2018 Azure Active Directory Privileged Identity Management Deployment Training - Module 5   November 2016 Ed Wu, Senior Program Manager Mark Wahl,
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Protect your OneDrive and SharePoint files on mobile devices
Azure AD Deployment Are you maximising your Azure AD investment?
Strong Security for Your Weak Link:
11/19/2018 4:38 AM Microsoft 365 Business Customer Targeting Janine Brittain - EXEED 2/6/18 © Microsoft Corporation. All rights reserved. MICROSOFT.
Microsoft Ignite /20/2018 2:21 PM
Navigating Security Seas in a Small Ship with a Limited Crew
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
12/1/ :04 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Everything Windows User Group Meeting, Aug 2016
Five mistakes to avoid when deploying Enterprise Mobility + Security
Office 365 Identity Management
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Microsoft Data Insights Summit
Microsoft 365 Business Technical Fundamentals Series
Microsoft 365 Business Technical Fundamentals Series
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Microsoft Virtual Academy
Presentation transcript:

Enterprise Mobility Suite Technical and Business Briefing SLIDE OBJECTIVE: Introduce yourself and provide an overview of the session. KEY MESSAGES: Briefly discuss your role at Microsoft and establish your credibility in discussing Cybersecurity. Set up the key shift in thinking around Cyber – from Protect to Protect, Detect and Respond – assume breach. Introduce Microsoft’s Cybersecurity solution. You’ll leave with a few actionable steps you can take to improve your security posture.

Cybersecurity used to mean building a bigger moat & a bigger wall SLIDE OBJECTIVE: Create a shift in thinking on security today and the impact the cloud applications and mobility has with user identity and corporate data. KEY MESSAGES: EMS is not just a mobility message but a security message design to address the new challenges that have arisen in the last few years. Setting the stage - the world has gotten more complex. We no longer can rely on “Castle mentality” of inside vs. outside for security We no longer have a single account in an AD domain, accounts and identities are everywhere

How do you build a moat or wall to protect a cloud? (You can’t.) SLIDE OBJECTIVE: Create a shift in thinking KEY MESSAGES: Setting the stage - the world has gotten more complex. We no longer can rely on “Castle mentality” of inside vs. outside for security We no longer have a single account in an AD domain, accounts and identities are everywhere We no longer have one device per user or even own all of the devices that a user has. We no longer keep all data and applications with in our organization. The landscape has changed but the way most companies try to address this has not leaving very large security gaps (you can ask them to think of any recent data breach, all due to security gaps).

“Cybersecurity is a CEO-level issue.” McKinsey & Company, January 2014 Cyberthreats in Today’s Cloud & Mobile World Extend trust & data to unmanaged mobile devices Extend trust to 3rd party cloud providers Protect new forms of value generation from ‘Big Data’ analytics 1.8 successful attacks experienced every week Secure new patterns of data creation & social sharing SLIDE OBJECTIVE: Create a sense of urgency KEY MESSAGES: Cyber is a CEO-level issue – ask if IT is now regularly meeting with the Board of directors – answer is probably yes. This growth in size and complexity is being instantiated at the Device layer (Mobile devices everywhere) Human/interaction layer (Social relationships everywhere) Infrastructure layer (Cloud/hybrid models abounding) - Extending trust – key idea – you cant change how your business works – if your business model involves partners (example Car Companies and dealers, Insurance company and agents, Manufacturing and suppliers) you can’t stop doing business or go back to the old way that did not involve technology. Data Layer (Analytics and Big Data are emerging) Source 1 (HEADING): Cyber security is a CEO issue: http://www.mckinsey.com/insights/business_technology/why_senior_leaders_are_the_front_line_against_cyberat tacks

What's Driving Change? IT Devices Apps Data Users Employees Customers Animated slide. Ask them what is was like 10 years ago…. They managed corporate devices, controlled deployments, applications mostly in house, same with data and limited or no mobile access. Today complete change People have average of 2+ devices and want to be productive on them and most of the time it’s a personal device. Applications exist on a mobile device, on premise and in the cloud and often companies don’t know how many “applications” they really have with in their corporate environment since a department and set up a cloud app on their own. Data is similar to applications existing on a mobile device, on premise and in the cloud and if you don’t know where data is being stored or have the ability to manage it directly – it’s a huge opportunity for leakage. Finally you have to consider not only employees but your business partners and customers who you are now connected with. Employees Customers Business Partners

Enterprise Mobility Suite Identity & Access Management Mobile Device & App Management Information Protection Behavior based threat analytics Microsoft Azure Active Directory Premium Microsoft Azure Rights Management Premium Advanced Threat Analytics Microsoft Intune How is Microsoft addressing these challenges…. With targeted solutions in each area that work together and with other key tools (Office) to provide a true integrated solution. Easily manage identities across on-premises and cloud. Single sign-on & self- service for any application Manage and protect corporate apps and data on almost any device with MDM & MAM Encryption, identity, and authorization to secure corporate files and email across phones, tablets, and PCs Identify suspicious activities and advanced threats in near real time, with simple, actionable reporting

EMS Technical and Business Briefing Session Audience Goal Time Introduction Overview of the session agenda and introduction to the EMS components. CISO CIO IT Directors Outline the plan for the day 15 min. Use Case Scenarios Discuss security challenges facing businesses today through three representative use cases: Network breach (ATA, PAM, AADP) Disgruntled employee (MAM, RMS, MFA) New user with iPhone (MDM, SSO, MIM, conditional access) IT Directors Infrastructure Security Mobility Desktop Identify how the customer addresses common security challenges. Show how EMS strengthens and streamlines security in each use case. 1 hr. Cloud identity deep dive Business alignment and technical deep-dive/demo of Azure Active Directory Premium Ascertain customer needs during deep-dive/demo. Align AADP to their needs and discuss any concerns. Outline potential deployment plans. 2 hrs. LUNCH   30 min. Mobile device and application management Business alignment and technical deep-dive/demo of Microsoft Intune. Align Intune to their needs and discuss any concerns. Breach defense Business alignment and technical deep-dive/demo of Advanced Threat Analytics and privilege management. Align ATA and PAM to their needs and discuss any concerns. BREAK Self-protecting documents Business alignment and technical deep-dive/demo of Azure Rights Management. Ascertain customer needs during deep-dive/demo Align RMS to their needs and discuss any concerns. Review Learnings Recap session results in preparation for delivering follow-up document that provides blue print for EMS moving forward. CISO IT Directors Provide tangible action plan for next steps (Session write-up will follow with in 3-5 business days) 45 min.