Extending classification ,labeling , and protection to 3rd party applications Kartik Kanakasabesan @ Microsoft Tony Themelis @ Digital Guardian Amit Cohen.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Empower Enterprise Mobility Jasbir Gill Azure Mobility.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
One Drive for Business: More Than a File Share Erica Toelle
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Secure your complete data lifecycle using Azure Information Protection
The time to address enterprise mobility is now
Deployment Planning Services
Cloud App Security vs. O365 Advanced Security Management
Azure Information Protection
Agenda Compliance Vision About Data Governance Demo
Deployment Planning Services
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Accelerate Azure Information Protection Deployment and Adoption
“Introduction to Azure Security Center”
Manage and protect Office 365 mobile apps with Microsoft Intune
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Azure Information Protection Strategy and Roadmap
Conduct a successful pilot deployment of Microsoft Intune
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
SaaS Application Deep Dive
Office 365 Security and Compliance Overview
Office 365 Groups Governance and Compliance
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Protect your data in Office 365 with Data Loss Prevention
Wait, Microsoft is in the Security Game?
Secure your complete data lifecycle using Azure Information Protection
The utility belt for managing security and compliance in Office 365
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Understanding best practices in classifying sensitive data
Office 365 with confidence: security features for Office 365
Christophe Fiessinger
Microsoft Intune MAM without Device Enrollment
Microsoft Ignite /18/2018 9:42 AM
Security for your digital transformation
Data Loss Prevention in O365:The Basics
Prevent Costly Data Leaks from Microsoft Office 365
Ochrana (nejen) poštovních zpráv pomocí AIP (Azure Information Protection) Miroslav Knotek MVP: Cloud and Datacenter Management, MCSE: Productivity IT.
Application Delivery & MAM Policy
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Protect your OneDrive and SharePoint files on mobile devices
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Microsoft Ignite /20/2018 2:21 PM
11/27/ :16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Managing Content: You Need To Think About More Than Office 365
SharePoint User Group Zürich – 1 November 2016.
Everything Windows User Group Meeting, Aug 2016
Five mistakes to avoid when deploying Enterprise Mobility + Security
Create a Modern Workplace with Microsoft 365
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Simplify the management of your M365 workplace with analytics
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Strengthening the GDPR business opportunity with Microsoft 365
Make it real: Help your customers comply with the GDPR
Microsoft Data Insights Summit
Office 365 Security Features For SharePoint Admins
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Extending classification ,labeling , and protection to 3rd party applications Kartik Kanakasabesan @ Microsoft Tony Themelis @ Digital Guardian Amit Cohen @ Varonis

Microsoft’s information protection solutions help you protect sensitive data throughout the lifecycle – across devices, apps, cloud services and on-premises

Microsoft’s information protection solutions 8/27/2018 6:02 PM Microsoft’s information protection solutions Comprehensive protection of sensitive data across devices, cloud services and on-premises environments Devices OFFICE 365 CLOUD SERVICES, SaaS APPs & ON-PREMISES PCs, tablets, mobile Exchange Online, SharePoint Online & OneDrive for Business Highly regulated Azure 3rd-Party SaaS Datacenters, file shares Windows Information Protection & BitLocker for Windows 10 Office 365 DLP Office 365 Advanced Data Governance Intune MDM & MAM for iOS & Android Azure Information Protection Microsoft Cloud App Security © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Microsoft’s approach to information protection 8/27/2018 6:02 PM Microsoft’s approach to information protection Comprehensive protection of sensitive data throughout the lifecycle – across devices, apps, cloud services and on-premises Detect Classify Protect Monitor Devices cloud On premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

MICROSOFT’S INFORMATION PROTECTION TECHNOLOGIES AZURE INFORMATION PROTECTION Classify, label & protect files – beyond Office 365, including on-prem & hybrid MICROSOFT CLOUD APP SECURITY Visibility into 15k+ cloud apps, data access & usage, potential abuse DETECT OFFICE 365 DLP Prevent data loss across Exchange Online, SharePoint Online, OneDrive for Business OFFICE 365 ADVANCED SECURITY MANAGEMENT Visibility into Office 365 app usage and potential data abuse ISV PARTNER APPLICATIONS Enable ISVs to consume labels, apply protection MICROSOFT’S INFORMATION PROTECTION TECHNOLOGIES MONITOR CLASSIFY WINDOWS INFORMATION PROTECTION Separate personal vs. work data on Windows 10 devices and prevent work data from traveling to non-work locations OFFICE APPS Protect sensitive information while working in Excel, Word, PowerPoint, Outlook MESSAGE ENCRYPTION Send encrypted emails in Office 365 to anyone – inside or outside of the company PROTECT OFFICE 365 ADVANCED DATA GOVERNANCE Apply retention and deletion policies to sensitive and important data in Office 365 CONDITIONAL ACCESS Control access to files based on policy, such as identity, machine configuration, geo location SHAREPOINT & GROUPS Protect files in libraries and lists

INFORMATION PROTECTION INTEGRATION Working towards deeper integration across classification, labeling & protection (CLP) GOALS: Cover all organizational data, across Microsoft and Partner environments Consistency across all common end points, applications and services Native integration into apps and services to help maintain productivity Unified policies across workloads, services

Information Protection Ecosystem Congruity Cross platform and Simplified SDK Classification and Protection in a single SDK Light weight and robust Compatible with Microsoft Information Protection Solutions and ADRMS

Information Protection Ecosystem Congruity Source available publicly + Or + Getting developers to build Information Protection solutions faster

MICROSOFT’S INFORMATION PROTECTION TECHNOLOGIES Persistence across various Partner solutions SECURE PRINTING END POINT DLP SOLUTIONS DETECT E-DISCOVERY SOLUTIONS EMAIL GATEWAY SERVICES MOBILE DEVICE MANAGEMENT MICROSOFT’S INFORMATION PROTECTION TECHNOLOGIES MONITOR CLASSIFY CLOUD APPLICATION SECURITY BROKERS MOBILE APPLICATION MANAGEMENT ENTERPRISE FILE SHARING SERVICES PROTECT DLP APPLIANCES NATIVE APPLICATION INTEGRATIONS DATA GOVERNANCE SOLUTIONS

Featured Partners One of the largest Enterprise DLP providers One of the largest Data Security Platform providers

Digital Guardian Data Protection Platform and Azure Information Protection Tony Themelis @ Digital Guardian

A Recognized Leader. Just ask Gartner. Digital Guardian is the only Enterprise Data Loss Prevention Gartner MQ Leader exclusively focused on data protection. Magic Quadrant Leader

The Convergence of DLP & EDR WELCOME TO The Convergence of DLP & EDR DETECT & REMEDIATE EXTERNAL THREATS STOP DATA THEFT BY INSIDERS & OUTSIDERS

The DG Data Protection Platform Discovery Data Classification Data Loss Prevention Cloud Data Protection Endpoint Detection & Response SOLUTIONS DG Agent(s) DG Appliance DIGITAL GUARDIAN PLATFORM DG Analytics & Reporting Cloud DG Management Console

Digital Guardian – Demo Video 8/27/2018 6:02 PM Digital Guardian – Demo Video We will show a user interacting with two files A sensitive file downloaded from OneDrive for Business A non-sensitive file received by webmail The user copies both files to a Box Sync folder DG automatically applies AIP protection on the sensitive file only The user then sends both files by email DG recognizes an unauthorized leakage and warns the user User cancels the email, and removes the offending file © 2017 Microsoft Corporation. All rights reserved. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

AIP and DG: Working with Labels and Protection Trusted Knowledge workers Users Classify Files Workers not authorized to classify The DLP System Classifies Files Hybrid Both DLP System and User classification

Varonis Data Security Platform & Microsoft Azure Information Protection Amit Cohen @ Varonis

It’s All About the Data We know where our sensitive data lives Sustain a secure state without manual effort Only the right people have access Cyber threats are detected and stopped

Finding sensitive data can be hard

Classification Made Easy Out of the box identifiers, find sensitive data right away GDPR – Personal information, per country, for the entire 28 EU countries HIPAA – Medical terms, Medical conditions, etc. PCI – credit card numbers Possible graphics: Icons which represent the patterns categories we have… Regulation logos OUT OF THE BOX IDENTIFIERS, FIND SENSITIVE DATA RIGHT AWAY 360 built-in Identifiers! Addresses, Banking data… SSN, National IDs, Driver’s license… Cyber Threat Detection Active Directory Monitoring Classification Labels Automatic Quarantining Data Least Privilege Enforcement Data Access Governance User Behavior Analytics Not sure it will be used

Classification Made Easy Out of the box identifiers, find sensitive data right away GDPR – Personal information, per country, for the entire 28 EU countries HIPAA – Medical terms, Medical conditions, etc. PCI – credit card numbers Possible graphics: Icons which represent the patterns categories we have… Regulation logos OUT OF THE BOX IDENTIFIERS, FIND SENSITIVE DATA RIGHT AWAY HIPAA Medical terms, Medical conditions, etc. GDPR Personal information, per country, for the entire 28 EU countries Cyber Threat Detection Active Directory Monitoring Classification Labels Automatic Quarantining Data Least Privilege Enforcement Data Access Governance User Behavior Analytics PCI Credit card numbers Not sure it will be used And much more…

Labeling and Protection Enforce Policies Secured Persistent

The Best of Both Worlds Automatic Manual

Leveraging Security with Classification Labels Alert on misbehavior Ensure least privilege Meet compliance requirements

Even Stronger Together Cyber Threat Detection Active Directory Monitoring Data Access Governance Automatic Quarantining Data Classification Least Privilege Enforcement File & Email User Behavior Analytics Persistent Enforce Policies Secured

Success! Thank You

Information Protection related sessions Date / Time Keep what you need and don’t horde everything with intelligent data governance in Office 365 Tues, 9:00am-10:15am Protecting complete data lifecycle using Microsoft information protection capabilities Tues, 10:45am-12:00pm Elevating your security with Office 365 clients Tues, 4:30pm-5:45pm Discover what’s new in Azure Information Protection and learn about the roadmap and strategy Weds, 9am-10:15am Protect sensitive information with Office 365 DLP Weds, 10:20am-10:40am Accelerate Azure information protection deployment and adoption Weds, 12:30pm-1:45pm Understanding best practices in classifying sensitive data as part of your information protection strategy Weds, 2:00pm-2:45pm Deploying and managing Windows Information Protection Weds, 4:00pm-5:15pm Extending classification, labeling and protection to third-parties with Azure Information Protection Weds, 5:05pm-5:25pm Encryption key management strategies for compliance Thu, 10:15am-11am Protect your sensitive emails through encryption and rights management capabilities in Office 365 Thurs, 2:00pm-2:45pm Understanding advanced concepts in getting the most out of Office 365 Data Loss Prevention Fri, 9:00am-10:15am

8/27/2018 6:02 PM © 2017 Microsoft Corporation. All rights reserved. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Classification Made Easy Out of the box identifiers, find sensitive data right away GDPR – Personal information, per country, for the entire 28 EU countries HIPAA – Medical terms, Medical conditions, etc. PCI – credit card numbers Possible graphics: Icons which represent the patterns categories we have… Regulation logos 360 built-in Identifiers! SSN, National IDs, Driver’s license… Addresses, Banking data… Cyber Threat Detection Active Directory Monitoring Classification Labels Automatic Quarantining Data Least Privilege Enforcement Data Access Governance User Behavior Analytics Not sure it will be used