Microsoft’s Vision for Data Governance

Slides:



Advertisements
Similar presentations
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Client Solution Secure collaboration with partners on customer initiatives and transactions Internal users push content to site without multiple authentication.
Business Intelligence in the 2007 Microsoft Office System Rob Gray Product Marketing Manager SharePoint Technologies.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
Exchange 2007 Overview. What Will We Cover? New features in Microsoft® Exchange 2007 The Exchange Management Console The Exchange Management Shell New.
Understanding Active Directory
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Services Course WordPress.com. 2 Outlook Live Live Messenger Live SkyDrive Office Live Workspace WordPress.com Live Groups.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Microsoft Dynamics AX 2009 Integration and Development with the.NET Framework Introduction to the Course.
Security Planning and Administrative Delegation Lesson 6.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Timesheet Deployment Considerations with Microsoft Office EPM Solution David Ducolon Program Manager Project Microsoft Corporation.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Windows Role-Based Access Control Longhorn Update
Wellington SharePoint Users Group 2007 Microsoft Office System Overview Ryan Duguid.
Module 8 : Configuration II Jong S. Bok
Windows Small Business Server 2003 R2 Powering Small Businesses.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
11 | Managing User Info Jeremy Foster Michael Palermo
Microsoft Imagine Academy
Deployment Planning Services
Deployment Planning Services
Centralized Management for Barracuda Networks products
MODULE 10 – PROJECT SERVER
Module Overview Installing and Configuring a Network Policy Server
6/2/2018 3:37 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
The New Employee Self Service Functionality Review
Examine common architectures for hybrid identity
The Information Protection Problem
Rights Management Services (RMS)
Protect your OneDrive and SharePoint files on mobile devices
Name Title Group Microsoft Corporation
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Access and Information Protection Product Overview October 2013
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Internal social media units
Digital display units This template is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION.
Intranet web banner units
Microsoft Office System 2007: Records Management
{ Security Technologies}
Intranet web banner units
Internal social media units
Microsoft Virtual Academy
Technology 1 Computer system Computer types Devices
The new way of IT – Maturity levels
Microsoft Virtual Academy
AbbottLink™ - IP Address Overview
Protecting your data with Azure AD
Microsoft Azure Managing Users & Resources with Azure Resource Manager
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
The membership community is a very powerful engagement tool
Microsoft Build /20/ :42 PM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY,
SQL Server Assessment Results
Microsoft Virtual Academy
Mark Quirk Head of Technology Developer & Platform Group
Using Software Restriction Policies
What's new in Project Pro for Office365 and Sync to SharePoint Online
Overview Presentation
Security Insights: Secure Messaging
Presentation transcript:

Microsoft’s Vision for Data Governance 11/9/2018

Restricting Data Sharing Data can take many paths Dad Mom Tim Eve Ray Pat Guy Your community can consist of family, friends, club members, and your religious congregation. When sharing data in your community it can get passed on in many ways. Individuals need to feel that their data is protected once it leaves their computers. Kim Ian Doctor Ski Club 11/9/2018

Restricting Enterprise Data Enterprise Environment E-mail Access Media Customer record Medical history Data can come from anywhere Employees want access to all of the data Transactions New content can get added over time Enterprises need to be able to track all data that belongs to specific individuals or companies. They also need to be able to manage access to this data based on a user’s role. Most systems today do not provide a holistic role-based access control system. Customers, partners, and web visitors often share their information with enterprises Additional content is often added to the original record How do we limit what employees can access? 11/9/2018

Data Governance in Action Access request is checked against policy Each access blocked until verified Each access logged for later reporting At login employee is assigned a set of roles Policy Expression language Access In a world where RBAC has been deployed, when a user logs into active directory he is assigned the roles, tasks, operations, and applications that will be applied to his experience while using the network. When attempting to access content the RBAC module for each application will access the policy database to determine if the access and allowed and to what extent. Once gaining access the user’s access will be audited for reporting purposes. RBAC with conditions and exceptions Customer record Transaction data Office documents E-mail Media ISA Server keeps sensitive data inside the enterprise 11/9/2018

11/9/2018 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. 11/9/2018