James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.

Slides:



Advertisements
Similar presentations
Server side Industrial Revolution Consumer devices Gold Rush.
Advertisements

Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Jan Peterson Microsoft Dynamics CRM Mobility Update - Productivity on the Go PRD24 1.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Andrew Hennessy Automating Server Application migrations to the Cloud – Goodbye Server INF21 3.
Kevin Francis Azure Media Services Architecture Deep Dive CLD31 2.
Jeff Alexander & Andrew McMurray Runtime Provisioning in Windows 10 WIN327.
Michael Niehaus Using the Windows Store for Business: New Capabilities for Managing Apps in the Enterprise WIN335.
User and Device Management
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Orin Thomas 30 Bad Habits of Server Administrators INF32 3.
Craig Pringle & Derek Moir
Clint Wyckoff | Microsoft Product Strategy Veeam Software: Availability Strategies for Microsoft Azure and Hyper-V, A Deep Dive.
Identities and Azure AD Premium
James Bannan The Cloud That Chuck Norris Built: Resilient Architecture in Azure ARC44 3.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
A deep dive into Azure AD B2C
Microsoft 365 Security and Compliance: Training and Resources
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Deployment Planning Services
What's New in System Center Configuration Manager, Current Branch and Intune INF324a Steven Hosking.
Deployment Planning Services
Deployment Planning Services
Journey to Microsoft Secure Cloud
Building Business Application with Office 365 and Other Line Business Systems
Azure Information Protection Strategy and Roadmap
Deployment Planning Services
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Virtual Academy
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
Power BI Security Best Practices
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Microsoft Intune MAM without Device Enrollment
Application Delivery & MAM Policy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Protect your OneDrive and SharePoint files on mobile devices
Microsoft Ignite /20/2018 2:21 PM
11/27/ :16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Modern cloud PaaS for mobile apps, web sites, API's and business logic apps
Five mistakes to avoid when deploying Enterprise Mobility + Security
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Empower your users with Azure Active Directory Premium
Microsoft Data Insights Summit
Securing ASP.NET in an Azure Environment
Strengthening the GDPR business opportunity with Microsoft 365
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1

A bit about us…

“Some organizations, especially outside the U.S., are paying an opportunity cost by allowing unwarranted fears about security to inhibit their use of public cloud services.” Gartner Source:

Security teams: putting the “no” into “technology”.

Leadership in security, privacy & trust Customers know where their data is stored Customers know who can access their data and why Customers can stay in the know by choosing to receive updates regarding changes to security, privacy and audit information No use of data for advertising purposes. No data mining of your data by Microsoft. No co-mingling of consumer and business data. Your data is yours and you can take it any time ISO Australia Certified Cloud Services List EU Model Clauses HIPAA-HITECH FERPA FISMA U.K. G-Cloud IL2 CJIS 24 hour monitored physical datacenters Logical isolation of data between tenants Network segregation. Encryption at rest and in transit Data loss prevention Anti-virus/anti spam 99.9% uptime Financial guarantees on uptime Redundancy in both functionality as well data Automated monitoring and recovery systems 24x7 on-call engineering team available to handle issues

Leadership in security, privacy & trust Customers know where their data is stored Customers know who can access their data and why Customers can stay in the know by choosing to receive updates regarding changes to security, privacy and audit information No use of data for advertising purposes. No data mining of your data by Microsoft. No co-mingling of consumer and business data. Your data is yours and you can take it any time ISO Australia Certified Cloud Services List EU Model Clauses HIPAA-HITECH FERPA FISMA U.K. G-Cloud IL2 CJIS 24 hour monitored physical datacenters Logical isolation of data between tenants Network segregation. Encryption at rest and in transit Data loss prevention Anti-virus/anti spam 99.9% uptime Financial guarantees on uptime Redundancy in both functionality as well data Automated monitoring and recovery systems 24x7 on-call engineering team available to handle issues

Office 365 built-in features Mobile device and app management Information protection Basic identity management via Azure AD Single sign-on for Office 365 Basic multifactor authentication Basic mobile device management via MDM Device settings management Selective wipe Built into Office 365 Management Console RMS protection via RMS for Office 365 Protection for content stored in Office (on-premises or Office 365) Access to RMS SDK Bring Your Own Key Identity & Access Management

EMS benefits for Office 365 customers Enterprise Mobility Suite Mobile device and app management Information protection Azure AD for Office 365+ Single sign-on for all cloud apps Advanced multifactor authentication for all workloads Self-service group management and password reset with write back to on- premises directory Advanced security reports FIM (now MIM), Server + CAL MDM for Office 365+ PC management Mobile app management (prevent cutting/copying/pasting/saving from corporate apps to personal apps) Secure content viewers Certificate provisioning System Center integration RMS for Office 365+ Protection for on-premises Windows Server file shares notifications when sharing documents notifications when shared documents are forwarded Identity & Access Management

Assessment matrix ThreatSourceRisk LikelihoodRisk ImpactRisk RatingRisk Mitigation What the threat is. Where the threat comes from. What is the chance it will happen? What is the impact if it does happen? Based on Likelihood and Impact assign a rating. What can be done to mitigate the residual risk?

Top five common risks Data leakage or loss Weak authentication Poor separation of duties Malware / phishing Access from untrusted devices.

Commercial Assessments Trust Center is your starting point Work with Partners or Microsoft to get additional answers.

Trust Portal

Admin account protection improvements No longer just one Administrator account Full multi-factor authentication support.

Office 365 Management APIs (preview) Don’t replace the current Reporting API Extends coverage of policy events in both Office 365 and Azure Active Directory Designed primarily for use by ISVs.

Control which devices access your data Support for devices with iOS 7+, Android 4+ Enforce device policy - security, no jailbrake, encryption Supports selective or full device remote wipe.

Extend your protection using EMS Managed iOS/Android apps deployed via Intune Company Portal Blocks copy / paste of content into other apps Includes desktop/laptop management.

Data Leakage Protection Available for Exchange Online, SharePoint Online and OneDrive for Business Access via Compliance Center in admin portal Australian-centric rules are available for use Rolling out now to tenants.

Please do an evaluation!

Continue your Ignite learning path Visit Microsoft Virtual Academy for free online training visit Visit Channel 9 to access a wide range of Microsoft training and event recordings Head to the TechNet Eval Centre to download trials of the latest Microsoft products