Security for your digital transformation

Slides:



Advertisements
Similar presentations
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Advertisements

Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Azure Stack Foundation
Secure your complete data lifecycle using Azure Information Protection
IT Operations Management
The time to address enterprise mobility is now
Deployment Planning Services
Hybrid Management and Security
Protect your organization against external threats (Security)
Deployment Planning Services
Learn about Office 365 Secure Score - actionable security analytics
Information Protection
Identity & Access Management for a cloud-first, mobile-first world
Deployment Planning Services
Security as A Service Components
Accelerate GDPR compliance with Microsoft 365
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Journey to Microsoft Secure Cloud
Microsoft Ignite /2/2018 6:37 AM BRK2293
Azure Information Protection Strategy and Roadmap
Microsoft Azure: The only consistent Hybrid Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
SaaS Application Deep Dive
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
IT Operations Management
Microsoft Ignite /31/ :08 AM
Threat Management Gateway
Information Protection
How do I handle major objections to Office 365?
Secure your complete data lifecycle using Azure Information Protection
The utility belt for managing security and compliance in Office 365
Automated Response with Windows Defender ATP
Security in Windows Store apps
Project Portfolio Management Vision and Product Roadmap
Understanding best practices in classifying sensitive data
Microsoft Intune MAM without Device Enrollment
Microsoft 365 Education – Partner Quick Reference Card
Prevent Costly Data Leaks from Microsoft Office 365
The Microsoft 365 Powered Device
SAM Financial Services Cybersecurity Assessment
Microsoft Azure P wer Lunch
SAM GDPR Assessment <Insert partner logo here>
Azure Active Directory
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Ed oms team OMS: Log Analytics Ed oms team.
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft Virtual Academy
Everything Windows User Group Meeting, Aug 2016
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Five mistakes to avoid when deploying Enterprise Mobility + Security
Mobility Workshop Microsoft Mobility + Security Vision
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
What’s new in the Fall Creators Update for Windows Defender ATP
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Azure AD Simon May Technical Evangelist.
Continuous Services and Connected Devices
Microsoft Data Insights Summit
Microsoft Virtual Academy
Presentation transcript:

Security for your digital transformation 9/18/2018 11:32 AM Security for your digital transformation <name> <title> © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9/18/2018 11:32 AM Microsoft mission Empower every person and every organization on the planet to achieve more MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OUR COMMITMENT TO YOU 9/18/2018 11:32 AM SECURITY PRIVACY & CONTROL COMPLIANCE MSFT Field - Please view presenter notes at: https://microsoft.sharepoint.com/sites/infopedia/pages/layouts/KCDoc.aspx?k=G01KC-1-18252 TRANSPARENCY RELIABILITY © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9/18/2018 11:32 AM Microsoft Secure Ensuring security to enable your digital transformation through a comprehensive platform, unique intelligence, and broad partnerships MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

TURBULENT TIMES 2 Billion records compromised in the last year 9/18/2018 11:32 AM TURBULENT TIMES 2 Billion records compromised in the last year 99+ DAYS between infiltration and detection $15 MILLION of cost/business impact per breach MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

YOUR IT ENVIRONMENT 9/18/2018 11:32 AM MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

YOUR YOUR IT ENVIRONMENT OPPORTUNITY 9/18/2018 11:32 AM MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

YOUR YOUR IT ENVIRONMENT O P P O R T U N I T Y Smart cities Sensors 9/18/2018 11:32 AM Smart cities Sensors Vehicles Partners Energy systems Cloud Equipment On-premises YOUR YOUR IT ENVIRONMENT O P P O R T U N I T Y Mobile devices MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx Marketplaces Manufacturers Citizens Supply Chains Customers © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

YOUR IT ENVIRONMENT 9/18/2018 11:32 AM MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OUR UNIQUE APPROACH Platform Intelligence Partners Microsoft Inspire 9/18/2018 11:32 AM OUR UNIQUE APPROACH Platform Intelligence Partners © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

SECURE FOUNDATION Platform Intelligence Partners Physical security Operational security SECURE FOUNDATION Platform Intelligence Partners Global datacenter

Platform

BUILT IN SECURITY Platform Identity & access management Threat protection BUILT IN SECURITY Platform Information protection Security management

EMS Overview 9/18/2018 Identity & Access Management Prove users are authorized and secure before granting access to apps and data Protect at the front door Simplify access to devices and apps Safeguard your credentials Microsoft’s Identity and Access Management solution and technologies are designed to prove users authorized before granted access and apps to data. If identity is our new control plane and our perimeter, we need to protect that identities and protect our organization from identity breaches. Here we will focus on three key areas: First, protecting at the front door. No matter where you’re accessing from, we will help you to protect your organization. No matter where you’re coming in, we will be the first line of defense to protect your organization. So we build that security into your users experience. But that security we build in needs to be simple. At Microsoft, we heavily invest in making that security simple. Why? As we have seen the statistics earlier, users will bypass any protection if we don’t make it simple. Passwords are not sustainable, they’re weak and they’re not the best form of authentication. I heard from one of the customers, the opposite of security is convenience. Our job is to make sure that the experience is convenient and yet secure. And remember, another important distinction: security needs to be almost invisible but not completely invisible, Because otherwise, we wont know if our security is breached. We need to get indications that we’re protected. We need strike a balance. Sadly, there are no technologies that can change passwords over night. This is why we also help you safeguard credentials, we help you protect credentials – privileged and non privileged ones - in the first place. © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 15

organizations from advanced cyber attacks EMS Overview 9/18/2018 THREAT PROTECTION Protect against advanced attacks; detect and respond quickly if breached PROTECT organizations from advanced cyber attacks DETECT malicious activities RESPOND to threats quickly Microsoft believes the goal for threat protection should be: Enabling organizations to have the ability to protect themselves from advanced cyber attacks. Providing organizations with solutions which can help detect suspicious behavior within the organization. Finally, since no security solution is ever 100% effective, there must be processes and tools to quickly respond to threats which enable damage control and limit the effects from an attack. With these targeted solutions in mind, Microsoft has built Threat Protection security services which are ideal for today’s businesses. We offer a combination of traditional approaches such as anti-malware and new innovations such as user and entity behavior analytics (UEBA) and endpoint detection and response (EDR). We are investing in both the prevention of attacks and post-breach detection and response. © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

information protection 9/18/2018 11:32 AM information protection Protect sensitive data throughout the lifecycle – inside and outside the organization Detect Classify Protect Monitor We see four primary elements of the information protection lifecycle: Detect, classify, protect and monitor. Each step has its own set of requirements and unique considerations. First, let’s talk about the Detect phase: Detecting sensitive data is the first step. As data travels to various location – often outside of the organization’s environment, you want to know what sensitive data you have and where it’s located. Data may have different levels of sensitivity, and not all data needs the same level of protection. Classify: After sensitive data has been detected, it’s important to classify the data into distinct categories so that custom controls, such as policies and actions, can be applied. Once the classification scheme is set by the organization, policies can be configured and customized so that sensitive data such as intellectual property, customer info, health records, etc., are protected, stored and shared in a manner that adheres to the organization’s unique requirements. Classification and labeling persists with the file and can be understood and honored by other services, avoiding the need to reclassify and re-label throughout the file’s journey. Protect: Classifying and labeling data often results a policy rule to apply some level of protection to sensitive data. Monitor: Gaining visibility into how users are using or distributing sensitive information is an important component of your information protection strategy. In the case of unexpected activity or events involving sensitive information, organizations also need to be able to respond quickly and accurately.   Microsoft’s information protection solutions addresses each of these steps. This includes protecting sensitive information across Devices, SaaS applications and cloud services, as well as on premises environments. Devices cloud On premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

INTELLIGENT SECURITY MANAGEMENT DEVICES APPS / DATA INFRASTRUCTURE IDENTITY INTELLIGENT SECURITY MANAGEMENT DEVICES APPS / DATA INFRASTRUCTURE IDENTITY An effective security management solution is not about a single console. Effective security management integrates where it counts, but also offers specialized tools for different functions. We can help you consolidate from many to few while ensuring that your specialized teams have the flexibility and freedom to manage their security as per the unique needs of that component, whether it is identity, devices, apps or infrastructure. However, the key that makes Microsoft security management consoles much more effective is the intelligence sharing, which helps your organization maintain a consistent and robust security posture. With Microsoft, intelligence is shared through the Microsoft Intelligent Security Graph. Harnessing the power of machine learning, processing trillions of pieces of data from billions of devices, we make the security management solutions work for you. This shared intelligence is leveraged by the management consoles across Identity, Devices, Apps & Data and Infrastructure- helping security admins and operation center teams to get important information optimized for their workloads. The key for a CISO’s success in managing security is not about a single console across everything, but integration wherever it makes sense. You don’t need all the point solutions to manage, data points to sift through to secure your end user devices and expanding networks. With single vendor mgmt., built-in controls that come with MS solutions and the unmatched intelligence, Microsoft becomes your trusted partner in achieving intelligent security management. In short, Microsoft provides you intelligent security management with: Specialized Controls based on your security teams’ needs; Visibility where needed; And Guidance on how to harden your organization’s security posture based on unmatched intelligence. Powered by the Intelligent Security Graph VISIBILITY CONTROL GUIDANCE Understand the security state and risks across resources Define consistent security policies and enable controls Enhance security through built-in intelligence and recommendations

Identity & access management Threat protection Information protection Security management Protect users’ identities & control access to valuable resources based on user risk level Protect against advanced threats and recover quickly when attacked Ensure documents and emails are seen only by authorized people Gain visibility and control over security tools Azure Information Protection Office 365 Data Loss Prevention Windows Information Protection Microsoft Cloud App Security Office 365 Advanced Security Mgmt. Microsoft Intune Advanced Threat Analytics Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection Office 365 Threat Intelligence Azure Active Directory Conditional Access Windows Hello Windows Credential Guard Azure Security Center Office 365 Security Center Windows Defender Security Center

OUR UNIQUE APPROACH Platform Intelligence Partners

INTELLIGENCE Multi-factor authentication Data encryption User accounts 9/18/2018 11:32 AM Multi-factor authentication Data encryption User accounts Device log-ins Malware Unauthorized data access Attacks INTELLIGENCE User log-ins Phishing Denial of service Spam System updates Enterprise security © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OUR UNIQUE INTELLIGENCE 9/18/2018 11:32 AM OUR UNIQUE INTELLIGENCE 450B user authentications each month 1B Windows devices updated 400B emails analyzed for spam and malware Be clear about how to position and pitch Intelligent Security Graph © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OUR INTELLIGENCE OUR INTELLIGENCE INTELLIGENCE 9/18/2018 11:32 AM MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OUR UNIQUE APPROACH Platform Intelligence Partners

Platform Intelligence PARTNERSHIP APPROACH Partners Partner with peers Work with industry alliances PARTNERSHIP APPROACH Partners Work with government

9/18/2018 11:32 AM Microsoft Secure Ensuring security to enable your digital transformation through a comprehensive platform, unique intelligence, and broad partnerships MSFT Field - Please view associated material at: https://microsoft.sharepoint.com/sites/Infopedia_G01/Pages/OneMicrosoftSecurity.aspx © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.