Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.

Slides:



Advertisements
Similar presentations
The trust questions… Is cloud computing secure? Are Microsoft Online Services secure? Security Where is my data? Who has access to my data ? Transparency.
Advertisements

Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
How do I handle major objections to Office 365?
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Security Controls – What Works
One retention policy for Exchange, SP, OneDrive, Lync and Public Folders Time based policy Delete policies at item or folder level for.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
Why Microsoft makes the cloud shine Nigel Watson, Platform Strategy Advisor.
Optimize for Software + Services Archiving Archiving Protect CommunicationsProtect Communications Advanced SecurityAdvanced Security Manage.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Respond to customer feedback through agile development Deliver new features and valueTrust and compliance Cloud value Continuous innovation with confidence.
Microsoft Ignite /17/2017 2:11 PM
Video gallery HD video or high resolution photos of attendees H.264 SVC support Personalized collaboration experiences Intuitive controls Consistent.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Office 365 Trust Center Answer key questions of Security Compliance Officers Dynamic engaging content that is refreshed every two weeks
PreserveDiscover In-Place Archive with secondary quota Available on-prem, online, or EOA Lync Archives into Exchange Search across Primary & Archive –
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
What are your questions and feedback? How can you best manage change or if there’s a service incident? What tools do you have at your disposal? What’s.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Version 2.0 for Office 365 Wave 15. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureAdministering.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Beyond just & storage and simple document editing.
OUC207. Identity-centric environment Targeted attacks Cloud computing Regulatory/compliance issues Consumerisation of IT Key trends affecting security.
Module 9 Configuring Messaging Policy and Compliance.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of PST files stored outside of IT control.
Empower the User Outlook, Word, PowerPoint, SharePoint, Mobile Apps, etc. Exchange, SharePoint, Lync, AD, File Server, third parties, etc. Exchange/
Paul Andrew. Identity-centric environment Targeted attacks Cloud computing Regulatory/compliance issues Consumerization of IT Key trends affecting security.
Sessions about to start – Get your RIG on! Microsoft Office 365 Security, Privacy, and Compliance Overview Aaron Dinnage Ben Fletcher OSS203.
Module 9 Configuring Messaging Policy and Compliance.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Module 7 Planning and Deploying Messaging Compliance.
The New Exchange - Archiving and Compliance Steve Chew Senior Technical Product Manager Microsoft Corporation EXL333.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
90% 147 $1M Automated time-based criteria to delete Set policies at item or folder level – admin or user Set site level retention polices Search across.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Implementing Microsoft Exchange Online with Microsoft Office 365
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Kamal Janardhan Lead Program Manager Exchange Product Group Microsoft Corporation SESSION CODE: UNC307 Archiving, Retention and Discovery in Exchange Server.
Why Trust Office 365? Office 365 Security, Privacy and Compliance.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Information explosion 1.4X 44X Protect communications.
Trusting Office 365 Privacy Transparency Compliance Security.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Intro to the Office 365 Security & Compliance Center
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Agenda Compliance Vision About Data Governance Demo
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
How do I handle major objections to Office 365?
Rights Management Services (RMS)
Understanding best practices in classifying sensitive data
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Top 10 Tips for GDPR Compliance in Office 365
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Microsoft Data Insights Summit
Make it real: Help your customers comply with the GDPR
Security in SharePoint and Teams with DLP, IRM, and AIP
Cloud Computing for Wireless Networks
Presentation transcript:

Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access control, encryption and strong authentication Security best practices like penetration testing, Defense-in-depth to protect against cyber-threats Unique customer controls with Rights Management Services to empower customers to protect information Compliance Commitment to industry standards and organizational compliance Enable customers to meet global compliance standards in ISO 27001, EUMC, HIPAA, FISMA Contractually commit to privacy, security and handling of customer data through Data Processing Agreements Admin Controls like Data Loss Prevention, Legal Hold, E-Discovery to enable organizational compliance Privacy Privacy by design with complete separation of Enterprise and Consumer services No mining of data for advertising Transparency with the location of customer data, who has access and under what circumstances Customer have greater control over privacy to enable or regulate sharing based on organizational needs

Where is Data Stored? Who accesses and what is accessed? Core Customer Data accessed only for troubleshooting and malware prevention purposes. Core Customer Data access is limited to key personnel on an exception basis only. Clear Data Maps and Geographic boundary information provided ‘Ship To’ address determines Data Center Location Do I get notified? Microsoft notifies you of changes in data center locations.

Will you use my data to build advertising products? Who owns the data I put in your service? You own your data and retain the rights, title, and interest in the data you store in Office 365. You can take your data with you, whenever you want. We do not mine your data for advertising purposes. It is our policy to not use your data for purposes other than providing you productivity services. We design our Office 365 commercial services to be separate from our consumer services so that there is no mixing of data between the two. Learn more about data portability and how we use your data.data portabilityhow we use your data

No Advertising Transparency No advertising products out of Customer Data No scanning of or documents to build analytics or mine data Privacy controls Access to information about geographical location of data, who has access and when Notification to customers about changes in security, privacy and audit information Various customer controls at admin and user level to enable or regulate sharing If the customer decides to leave the service, they get to take to take their data and delete it in the service

Address privacy, security and handling of Customer Data. Going above and beyond the EU Model Clauses to address additional requirements from individual EU member states Enables customers to comply with their local regulations. Office 365 is the first major business productivity public cloud service provider willing to sign EU Model Clauses with all customers. EU Model Clauses a set of stringent European Union wide data protection requirements Data Processing Agreement EU Model Clauses ISO27001 is one of the best security benchmarks available across the world. Office 365 first major business productivity public cloud service to implement rigorous ISO security controls on physical, logical, process and management ISO27001 We are the first and only major cloud based productivity to offer the following

28 member countries of the Article 29 Working Party plus Luxembourg, the Czech Republic, and Spain all agree Microsoft is the first and only cloud provider to receive this type of validation Personal data stored in Microsoft’s enterprise cloud adheres to Europe’s rigorous privacy standards no matter where that data is located Applies to Microsoft Azure, Office 365, Dynamics CRM Online, and Windows Intune Microsoft’s contractual privacy protections meet EU standards for international transfers of data.

Office 365 is built with a focus on privacy and security that allows us to obtain important industry certifications and enables customers to meet international laws and regulations 3rd party certification and audits. Built in Capabilities Customer controls for compliance Data Loss Prevention (DLP) Archiving and Legal Hold E-Discovery

Data Loss Prevention (DLP) Prevents Sensitive Data From Leaving Organization Provides an Alert when data such as Social Security & Credit Card Number is ed. Alerts can be customized by Admin to catch Intellectual Property from being ed out. Empower users to manage their compliance Contextual policy education Doesn’t disrupt user workflow Works even when disconnected Configurable and customizable Admin customizable text and actions Built-in templates based on common regulations Import DLP policy templates from security partners or build your own 10

archiving and retention Preserve Search Secondary mailbox with separate quota Managed through EAC or PowerShell Available on-premises, online, or through EOA Automated and time- based criteria Set policies at item or folder level Expiration date shown in message Capture deleted and edited messages Time-Based In-Place Hold Granular Query-Based In-Place Hold Optional notification Web-based eDiscovery Center and multi-mailbox search Search primary, In-Place Archive, and recoverable items Delegate through roles-based administration De-duplication after discovery Auditing to ensure controls are met In-Place ArchiveGovernance Hold eDiscovery 11

Security best practices like penetration testing, Defense-in-depth to protect against cyber-threats Built in Capabilities Flexible Customer Controls Physical and data security with access control, encryption and strong authentication Unique customer controls with Rights Management Services to empower customers to protect information

Network perimeter Internal network Host Application Data User Facility Threat and vulnerability management, monitoring, and response Edge routers, intrusion detection, vulnerability scanning Dual-factor authentication, intrusion detection, vulnerability scanning Access control and monitoring, anti-malware, patch and configuration management Secure engineering (SDL), access control and monitoring, anti- malware Access control and monitoring, file/data integrity Account management, training and awareness, screening Physical controls, video surveillance, access control

Copyright© Microsoft Corporation TSL/SSL Bit locker AES IRM (RMS) S/MIME Third party e.g: PGP Encrypts the tunnel to help prevent snooping/eavesdropping. Hashes the data on the hard drives in the datacenter so that if someone gets unauthorized access to the machine they can't read it. Prevents sensitive information from being printed, forwarded, or copied by unauthorized people inside the organization Provides peer to peer, cryptographic security services for electronic messaging applications: authentication, message integrity, non-repudiation of origin, privacy and data security Provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, s, files, directories, and whole disk partitions and to increase the security of communications

Data protection at rest Data Protection in motion Information can be protected with RMS at rest or in motion Data protection at rest

Copyright© Microsoft Corporation

RMS can be applied to s Apply RMS to content RMS can be applied to SharePoint libraries Files are protected if they are viewed using Webapps or downloaded to a local machine RMS can be applied to SharePoint libraries Files are protected if they are downloaded to a local machine and opened using rich clients RMS can be applied to any Office documents

Copyright© Microsoft Corporation Exchange Online Policy detection and Enforcement Tenant configuration data and key O365 User Internet User Send Microsoft Account/Organization Account Message Viewing Portal Deliver Post