Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.

Slides:



Advertisements
Similar presentations
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Advertisements

Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Unified Logs and Reporting for Hybrid Centralized Management
Do More In Less Time Will Schoen Microsoft Corporation April 12, 2011 Realize the future of government productivity with online and.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Microsoft Ignite /17/2017 2:11 PM
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Dell Connected Security Solutions Simplify & unify.
Empowering Your Users-Security & Mobility Bil Martin 1.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Access resources in a federation partner organization.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Manage and secure identities in a cloud and mobile world
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Microsoft 365 Security and Compliance: Training and Resources
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Deployment Planning Services
Windows 10 Enterprise Subscriptions in CSP
Identity & Access Management for a cloud-first, mobile-first world
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Security managed from the cloud.
9/5/2018 8:22 PM The Microsoft information protection strategy across EMS, Office 365, and Windows © 2014 Microsoft Corporation. All rights reserved.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Application Delivery & MAM Policy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Protect your OneDrive and SharePoint files on mobile devices
Securely run and grow your business with Microsoft 365 Business
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Everything Windows User Group Meeting, Aug 2016
Create a Modern Workplace with Microsoft 365
SPO Demos to Business Value Discussion Pillar Mapping
Windows 10 Enterprise Subscriptions in CSP
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Microsoft Virtual Academy
Presentation transcript:

Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern Data protection may get in the way of productivity Compliance rules are complex and always evolving

IT EmployeesCustomersBusiness partners DevicesApps UsersData

Other employee s Customers Business partners SaaS Azure Office 365 Simplify and protect access Cloud Storage Prevent leaks and allow collaboration Stop external threats Stay compliant Cloud Storage How do you empower users and enable collaboration while still protecting corporate assets? Empower your users Enable collaboration

80%+ of employees admit to using unapproved software-as-a- service (SaaS) applications in their jobs 75%+ of all network intrusions are due to compromised user credentials 59% of organizations are projected to start some kind of BYOD initiative this year

Simplify app access with integrated identities and single sign-on Additional layer of security with Azure Multi-Factor Authentication Protect app access with device compliance and conditional access

Self-service Single sign-on Username Identity and access management Simple connection Cloud SaaS Azure Office 365 Public cloud Other Directories Windows Server Active Directory On premises Microsoft Azure Active Directory

Windows Provable PC Health (PPCH) SharePoint Online Exchange Online User Policy verification Microsoft Intune SharePoint Online Exchange Online User Microsoft Intune Policy compliance verification Device management Device compliance Measured boot integrity status (Windows PPCH) Advanced device compliance (antivirus, firewall, patch state, etc.) IT Microsoft Intune User Device enrolled IT

MFA is A trusted additional method of authentication that offers more security with a phone call, app, or SMS MFA prevents Unauthorized access to on-premises and cloud apps with additional authentication required MFA offers Very flexible enforcement with user, device, or per app to reduce compliance risks Azure Multi-Factor Authentication

61% of workers mix personal and work tasks 58% of workers have accidently sent sensitive information to the wrong person 600M Records breached (known) from April 2005 to Dec % of data leakages can be traced back to user behavior

Separation of data at app and device level Detect, monitor, and protect sensitive data Allow secure sharing of information

User Corporate network Microsoft Intune & Office Mobile Apps Apply policies Save Share files and enforce policies File share Personal storage * Some roaming scenarios use Azure Right Management Configure and manage EDP policies with Intune and Azure Rights Management Control app access to corporate data and prevent copy and paste- related data leaks Protect data at rest and in motion* Separate at the app level Corporate versus personal data identifiable wherever it rests on the device MAM and data protection capabilities built into the platform Protect data at rest and in motion* Separate at the platform level Enterprise Data Protection

IT Maximize mobile productivity and protect corporate resources with Office mobile apps—including multi-identity support Extend these capabilities to your existing line-of-business apps using the Intune App Wrapping Tool Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal apps Managed apps User Corporate data Personal data Multi-identity policy

Greatly enhanced security capabilities while retaining rich Office productivity experience Identify, monitor, and protect sensitive information as they move in the organization Educate and empower your users while they work on sensitive content

Admin DLP system walkthrough Centralized policy store Information workers

Configure data protection policies Use policy templates for protecting s Alert Encrypt Append Override Review Redirect Block Classify

Document tracking Access control Data encryption Share internallyShare externally z On any device Authentication and collaboration

Demo

Data loss prevention Azure RMS Intune MAM

The frequency and sophistication of cybersecurity attacks are increasing 200+ The median number of days that attackers reside within a victim’s network before detection $500B The total potential cost of cybercrime for the global economy $3.5M The average cost of a data breach for a company

Stop malicious codes Protect against identity theft Detect and block threats

Block spam Block known malware Block Unknown Malware Time-of-click protection URL tracking and reporting Block malicious links on browser Strong Perimeter Exchange Online Protection Exchange Online Advanced Threat Protection SmartScreen Enables a Windows desktop to be locked down to only run trusted apps, just like many mobile OS’s (e.g. Windows Phone) Resistant to tampering by an administrator or malware Device guard

Detect attacks Digital crime units monitoring the dark web Azure Active Directory telemetry Event logs and SIEM

ATA Devices and servers Behavior al Analytics Forensics for known attacks and issues Advanced Threat Analytics Profile normal entity behavior (normal vs. abnormal) Search for known security attacks & issues Detect suspicious user activities, known attacks, and issues SIEM Active Directory

Demo

Advanced Threat Protection Azure Active Directory Security Reports Advanced Threat Analytics

Analytics for eDiscovery Legal hold Archiving and retention

Productivity first Educate and empower end users to be compliant without affecting productivity Built-in features Deliver rich, low-cost compliance via built-in features Operate across suites Easily apply consistent compliance controls, reports, and UX across Office 365 Bring your own device Get compliant fast Educate and empower people Discover and act on risk

Integrated tools to help you import, store, preserve, and expire data IN-PLACE No need to maintain a separate, duplicate store UNIFIED Unified policy across Exchange, SharePoint, and Skype for Business EXTENSIBLE Migrated data from third-party stores and with more formats Broad and deep service insights and forensics about customer data CENTRALIZED Tenant-based Office 365 wide experiences, no silos CONSISTENT Logging across SharePoint, Exchange, OneDrive for Business, and Azure COMPLETE One API to extract audit data out of Office 365 IN-PLACE HOLD Retain content in place, in real time SEARCH, ANALYTICS AND EXPORT Find up-to-date and relevant content quickly and export for review UNIFIED SharePoint, Skype for Business, and OneDrive for Business and Exchange Applies machine learning to enable users to explore large, unstructured sets of data in order to quickly find what is relevant THEMATIC ANALYSIS Clustering technology to identify data relationships; reducing data sent for review PREDICTIVE CODING Trains the system to identify relevant documents THREADING Reconstruct threads from unstructured data

Engagement Security Operations Compliance Report/dashboards

Simplify and protect access Simplify app access with integrated identities and SSO Additional layer of security with MFA Allow secure sharing of information Allow collaboration while preventing data loss Separation of data at app and device level Detect, monitor, and protect sensitive data Allow secure sharing of information Stop external threats Stop malicious codes Prevent identity theft Detect and block threats Stay compliant Analytics for eDiscovery Legal hold Archiving and retention

SaaS Azure Office 365 Simplify and protect access Cloud Storage Prevent leaks and allow collaboration Stop external threats Stay compliant Cloud Storage Enterprise Mobility Suite Other employee s Customers Business partners Empower your users Enable collaboration