FND2851
Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions exploited weak or stolen credentials * ** >Eighty percent of employees admit to using non- approved software-as-a-service (SaaS) applications in their jobs** 61%>80%>75% * Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies,” Feb. 21, 2013 ** *** Verizon 2013 data breach investigation report
IT EmployeesCustomersBusiness partners DevicesApps UsersData
Place Holder – Godiva Video
It just worksPreserve existing investments Integrated, secure identityAccess from many devices Support iOS, Android, Windows, and 1000s of apps It’s comprehensive It protects Office betterManage and secure productivity Customer’s need:Microsoft’s offer:
It’s integrated - identity is the control plane On premises Microsoft Azure Active Directory One common identity Single sign-on Self-service capabilities
Manage and secure productivity Office mobile apps Data-level protection
iOS, Android, Windows 1000s of SaaS apps LOB apps, RemoteApp
Always up-to-date Works with what you have Simple to set up and connect
RETAIN VITAL BUSINESS CONTENT Save important Office 365 content with robust retention and archiving tools EASILY FIND RETAINED CONTENT Search for and access Office 365 content as needed for legal and business requirements with eDiscovery ENABLE SELF-SERIVCE COMPLIANCE Help users perform their own compliance tasks with permissions control Protection against threats Additional security for today’s security threats Access to all your apps SaaS apps, mobile apps, on-premises, and Windows apps Collaboration on the go Managed and productivity
Identity Application Device Data
Windows 10 Windows Provable PC Health (PPCH) SharePoint Online Exchange Online User Policy verification Microsoft Intune SharePoint Online Exchange Online User Microsoft Intune Policy compliance verification Device management Device compliance Measured boot integrity status (Windows PPCH) Advanced device compliance (antivirus, firewall, patch state, etc.)
Maximize mobile productivity and protect corporate resources with Office mobile apps – including multi-identity support Extend these capabilities to your existing line-of-business apps using the Intune App Wrapping Tool Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal apps Managed apps IT User Corporate data Personal data Multi-identity policy
Personal apps Managed apps CopyPasteSave Maximize productivity while preventing leakage of company data by restricting actions such as copy, cut, paste, and save as between Intune-managed apps and unmanaged apps Save to personal storage Paste to personal app User
Protect ANY file Share with ANY person View on ANY device Track and manage from the cloud Encrypt files and data
Managed productivity Demo
Microsoft Azure Active Directory Microsoft Azure RemoteApp
Intelligent cloud Machine learning Security reports Privileged identity management App security Conditional access Multi-factor authentication (MFA) Cloud app discovery Detect threats User behavioral analysis Simple attack timeline
Security reporting that tracks inconsistent access patterns, analytics, and alerts. Reporting API Built-in security features.
ATA Devices and servers Behavior al Analytics Forensics for known attacks and issues Advanced Threat Analytics Profile normal entity behavior (normal vs. abnormal) Search for known security attacks & issues Detect suspicious user activities, known attacks, and issues SIEM Active Directory
Identity-driven security Demo
Microsoft Azure Active Directory Premium Identity and access management Easily manage identities across on-premises and cloud. Single sign-on and self-service for any application Microsoft Intune Mobile device and app management Manage and protect corporate apps and data on almost any device with MDM and MAM Microsoft Azure Rights Management Premium Information protection Encryption, identity, and authorization to secure corporate files and across on phones, tablets, and PCs Behavior-based threat analytics Advanced Threat Analytics Identify suspicious activities and advanced threats in near real time with simple, actionable reporting
Identify and authorize user Apply device policies Apply application policies Apply content policies User IT Active Directory Premium Rights Management Enterprise Mobility Suite