FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.

Slides:



Advertisements
Similar presentations
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Advertisements

| Copyright© 2010 Microsoft Corporation the future of productivity Kurt DelBene President, Microsoft Office Division.
Microsoft Ignite /16/2017 3:28 PM
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Mobility is the new normal 52% of information workers across 17 countries report using three or more devices for work* 52% 90% of enterprises will have.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Empowering Small Businesses: Microsoft Office 365 P-Suite Danny Burlage MVP Office 365 Wortell.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Empowering Your Users-Security & Mobility Bil Martin 1.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Manage and secure identities in a cloud and mobile world
User and Device Management
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
61% of workers mix personal and work tasks in their devices* * Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise.
>80% >70% 72% Mobile & Cloud | Challenging Security Paradigms 72% of employees who use smartphones for work select their smartphones personally 1 >80%
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Microsoft 365 Security and Compliance: Training and Resources
The time to address enterprise mobility is now
Deployment Planning Services
Enterprise Mobility Suite Technical and Business Briefing
Identity & Access Management for a cloud-first, mobile-first world
Deployment Planning Services
Security as A Service Components
Journey to Microsoft Secure Cloud
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Azure AD for the client management guy (or gal!)
Mobile Device Management options in Office 365 and beyond
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
Security managed from the cloud.
Migrate SharePoint to the cloud the Microsoft IT way
9/5/2018 8:22 PM The Microsoft information protection strategy across EMS, Office 365, and Windows © 2014 Microsoft Corporation. All rights reserved.
Extending classification ,labeling , and protection to 3rd party applications Kartik Microsoft Tony Digital Guardian Amit Cohen.
Microsoft Intune MAM without Device Enrollment
Application Delivery & MAM Policy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Protect your OneDrive and SharePoint files on mobile devices
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Everything Windows User Group Meeting, Aug 2016
Mobility Workshop Microsoft Mobility + Security Vision
SPO Demos to Business Value Discussion Pillar Mapping
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Microsoft 365 Business Technical Fundamentals Series
Azure AD Simon May Technical Evangelist.
Presentation transcript:

FND2851

Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions exploited weak or stolen credentials * ** >Eighty percent of employees admit to using non- approved software-as-a-service (SaaS) applications in their jobs** 61%>80%>75% * Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies,” Feb. 21, 2013 ** *** Verizon 2013 data breach investigation report

IT EmployeesCustomersBusiness partners DevicesApps UsersData

Place Holder – Godiva Video

It just worksPreserve existing investments Integrated, secure identityAccess from many devices Support iOS, Android, Windows, and 1000s of apps It’s comprehensive It protects Office betterManage and secure productivity Customer’s need:Microsoft’s offer:

It’s integrated - identity is the control plane On premises Microsoft Azure Active Directory One common identity Single sign-on Self-service capabilities

Manage and secure productivity Office mobile apps Data-level protection

iOS, Android, Windows 1000s of SaaS apps LOB apps, RemoteApp

Always up-to-date Works with what you have Simple to set up and connect

RETAIN VITAL BUSINESS CONTENT Save important Office 365 content with robust retention and archiving tools EASILY FIND RETAINED CONTENT Search for and access Office 365 content as needed for legal and business requirements with eDiscovery ENABLE SELF-SERIVCE COMPLIANCE Help users perform their own compliance tasks with permissions control Protection against threats Additional security for today’s security threats Access to all your apps SaaS apps, mobile apps, on-premises, and Windows apps Collaboration on the go Managed and productivity

Identity Application Device Data

Windows 10 Windows Provable PC Health (PPCH) SharePoint Online Exchange Online User Policy verification Microsoft Intune SharePoint Online Exchange Online User Microsoft Intune Policy compliance verification Device management Device compliance Measured boot integrity status (Windows PPCH) Advanced device compliance (antivirus, firewall, patch state, etc.)

Maximize mobile productivity and protect corporate resources with Office mobile apps – including multi-identity support Extend these capabilities to your existing line-of-business apps using the Intune App Wrapping Tool Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal apps Managed apps IT User Corporate data Personal data Multi-identity policy

Personal apps Managed apps CopyPasteSave Maximize productivity while preventing leakage of company data by restricting actions such as copy, cut, paste, and save as between Intune-managed apps and unmanaged apps Save to personal storage Paste to personal app User

Protect ANY file Share with ANY person View on ANY device Track and manage from the cloud Encrypt files and data

Managed productivity Demo

Microsoft Azure Active Directory Microsoft Azure RemoteApp

Intelligent cloud Machine learning Security reports Privileged identity management App security Conditional access Multi-factor authentication (MFA) Cloud app discovery Detect threats User behavioral analysis Simple attack timeline

Security reporting that tracks inconsistent access patterns, analytics, and alerts. Reporting API Built-in security features.

ATA Devices and servers Behavior al Analytics Forensics for known attacks and issues Advanced Threat Analytics Profile normal entity behavior (normal vs. abnormal) Search for known security attacks & issues Detect suspicious user activities, known attacks, and issues SIEM Active Directory

Identity-driven security Demo

Microsoft Azure Active Directory Premium Identity and access management Easily manage identities across on-premises and cloud. Single sign-on and self-service for any application Microsoft Intune Mobile device and app management Manage and protect corporate apps and data on almost any device with MDM and MAM Microsoft Azure Rights Management Premium Information protection Encryption, identity, and authorization to secure corporate files and across on phones, tablets, and PCs Behavior-based threat analytics Advanced Threat Analytics Identify suspicious activities and advanced threats in near real time with simple, actionable reporting

Identify and authorize user Apply device policies Apply application policies Apply content policies User IT Active Directory Premium Rights Management Enterprise Mobility Suite