Prevent Costly Data Leaks from Microsoft Office 365

Slides:



Advertisements
Similar presentations
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Advertisements

Deployment Planning Services
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Enterprise Security in Practice
Azure File Sync Setup, configuration and management
Use any Amazon S3 application with Azure Blob Storage
6/3/2018 9:04 PM BRK2374 Stop data exfiltration and advanced threats in Microsoft Office 365 and Azure Jigar Shah, Megha Tamvada Palo Alto Networks © Microsoft.
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Azure Cloud Shell Magic of Modern Command-line Management
Windows 10 and the cloud: Why the future needs hybrid solutions
6/17/ :27 AM BRK3341 Unlock extensibility by connecting your service to PowerApps and Microsoft Flow Theresa (Tessa) Palmer–Sr. Program Manager Sunay.
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Office 365 Groups Governance and Compliance
Modernizing your Remote Access
Azure SDKs and Tools for You
6/26/2018 5:24 AM THR1083 Enabling Advanced Security Capabilities: Drive consistent authorization across multiple applications Bryan Bolling Solution Architect,
Decoding audit events in Microsoft Office 365
Optimizing Microsoft OneDrive for the enterprise
Protect sensitive information with Office 365 DLP
Location – the next frontier in analytics
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
8/6/2018 3:21 AM THR2261 Groups, and Teams and Sites, Oh My! The Ultimate Office 365 Groups Teardown John Peluso SVP Product Strategy, AvePoint Inc. Microsoft.
SQL Server on Linux on All-Flash Arrays
Microsoft Ignite /31/ :08 AM
8/6/ :17 AM THR2214 Hybrid Cloud Activated A customer case study optimizing on-premises & Azure performance and cost Mor Cohen-Tal Senior Product.
Understanding Windows Analytics Update Compliance
Workflow Orchestration with Adobe I/O
Customize Office 365 Search and create result sources
The utility belt for managing security and compliance in Office 365
Find, try and get line-of-business apps on Microsoft AppSource
User Group Best Practices
Best Practices for Securing Hybrid Clouds
Azure Security in four steps
Understanding best practices in classifying sensitive data
9/18/ :06 AM BRK2212 Gain visibility into Network performance and availability with Network monitoring solutions in Azure Vijay Tinnanur Abhishek.
9/22/2018 3:49 AM BRK2247 Learn from MVPs: Panel discussion on all things SharePoint and OneDrive © Microsoft Corporation. All rights reserved. MICROSOFT.
Azure PowerShell Aaron Roney Senior Program Manager Cormac McCarthy
Port your AWS Knowledge to Azure
Continuous Delivery with Visual Studio Team Services
Azure Advisor: Optimization in the best way
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Accelerate Office 365 Adoption Through Microsoft FastTrack Services
Microsoft products for non-profits
Automating security for better, continuous compliance in the cloud
Five mistakes to avoid when deploying Enterprise Mobility + Security
Five cool things you can do with Windows PowerShell on Office 365
What do YOU get from SharePoint Hybrid?
Microsoft Exchange: Through the eyes of MVPs (Panel discussion)
Overview: Dynamics 365 for Project Service Automation
Understand your Azure cloud assets dependencies with BMC Discovery
Surviving identity management in a hybrid world
Breaking Down the Value of A Yammer Post: 20 Things to Do
Cool Microsoft Edge Tips and Tricks
When Bad Things Happen to Good Applications
Getting the most out of Azure resources with Azure Advisor
“Hey Mom, I’ll Fix Your Computer”
4/21/2019 7:09 AM THR2098 Unlock New Opportunities with Nintex Hawkeye Process Intelligence and Workflow Analytics Sr. Product.
Business Continuity and the Microsoft Cloud
4/28/2019 3:30 AM THR1061 Learn how Dynamics 365, Office 365 and related applications work together to transform the workplace Donna Edwards Solution Architect.
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Ask the Experts: Windows 10 deployment and servicing
Passwordless Service Accounts
Azure Networking inside and out
Digital Transformation: Putting the Jigsaw Together
WCF and .NET Framework Microservices in Containers
Diagnostics and troubleshooting in Azure App Service Support Center
Optimizing your content for search and discovery
Microsoft Data Insights Summit
Presentation transcript:

Prevent Costly Data Leaks from Microsoft Office 365 9/20/2018 9:21 AM THR1035 Prevent Costly Data Leaks from Microsoft Office 365 Anuj Sawani Palo Alto Networks © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Office 365 Apps Storing Data in the Cloud OneDrive SharePoint Exchange Yammer

How Do Data Leaks Happen? MALICIOUS OUTSIDER ACCIDENTAL DATA EXPOSURE MALICIOUS INSIDER 59% 23% 14% SOURCE OF BREACH DATA – 2013-2017 – breachlevelindex.com

Native Office 365 Security Controls Identity Management Data Compliance Rights Management Malware Detection

Extend Native Security Controls 9/20/2018 9:21 AM Extend Native Security Controls When you need… Data protection for other cloud apps In-line visibility and granular app control Leverage advanced DLP capabilities Threat protection across network, cloud and endpoints Protection against zero-day malware © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Abundant Use of SaaS Applications Sanctioned Remote users Tolerated Unsanctioned On-prem users

The Overlay (and Insufficient) Approach Sanctioned Remote users CLOUD PROXY Pac File Merge Or Addt’l VPN Agent Tolerated Pac File Merge CLOUD PROXY Unsanctioned Log Forwarder On-prem users Traffic Forwarder AD Connector

The Overlay Approach Does Not Scale Sanctioned Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent CLOUD PROXY Tolerated CLOUD PROXY Unsanctioned Evasion tools

Palo Alto Networks’ Platform Approach Monitor and control in-cloud activity with Aperture Sanctioned Remote users Complete visibility and control for remote users via GlobalProtect Tolerated Complete visibility and control for on premise activity with PAN-OS Next Generation Firewall Unsanctioned On-Prem users

344 KB slideshare-uploading PowerPoint slideshare prodmgmt HTTP application function PowerPoint file type “Confidential and Proprietary” content slideshare application 344 KB prodmgmt group HTTP protocol file-sharing URL category mjacobsen user SSL protocol canada destination country 172.16.1.10 source IP 64.81.2.23 destination IP TCP/443 destination port

Discover Cloud Apps and Assess Risk SaaS Usage Reporting Interactive SaaS Dashboard

Aperture Security Components DLP Malware Prevention User Anomalies and Activity Monitoring Machine Learning Control third-party apps Cloud Asset and Risk Discovery

Comprehensive Cloud App Coverage API-BASED INLINE 2500+ APPS (SAAS AND NON-SAAS) https://applipedia.paloaltonetworks.com

Comprehensive Protection for Microsoft Environments In the Cloud Securely enable Office 365 and Azure migrations Protect cloud environments from threats Prevent data loss in Office 365 On the Network Next-generation firewall; appliance or virtualized Securely enable Microsoft applications Prevent known and unknown threats On the Endpoint Enforce policy consistency for all users and devices Prevent known and unknown threats

Please evaluate this session Tech Ready 15 9/20/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

http://go.paloaltonetworks.com/secureo365 9/20/2018 9:21 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9/20/2018 9:21 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Backup

Aperture For Cloud-based Email Email Security Threat Prevention and DLP 0-Day Malware detection tied to WildFire Detection of sensitive content and exposure Activity monitoring and anomalies Email Controls Monitoring Detection of auto-forwarding to untrusted domains Detection of Public Folders Detection of Retention Policy Violations APERTURE THREAT INTELLIGENCE CLOUD

Aperture For SharePoint & OneDrive Protect against Data exfiltration Detection of sensitive content Activity monitoring and anomalies Monitor SharePoint Sites Users OneDrive Folders Remediate accidental exposure Stop Malware Propagation Detect Malware Quarantine APERTURE THREAT INTELLIGENCE CLOUD