Download presentation
Presentation is loading. Please wait.
1
Go mobile. Stay in control.
Enterprise Mobility + Security Speaker Name Title
2
Mobile-first, cloud-first reality
Data breaches 63% of confirmed data breaches involve weak, default, or stolen passwords. 63% Shadow IT More than 80 percent of employees admit to using non-approved software as a service (SaaS) applications in their jobs. 80% 0.6% IT Budget growth Gartner predicts global IT spend will grow only 0.6% in 2016. 63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report) 70% of the 10 most commonly used devices have serious vulnerabilities (HP 2014) More than 80% of employees admit using non-approved SaaS apps for work purposes (Stratecast, December 2013) 33% of user breaches come from user error (VansonBourne February 2014) 88% organizations who are no longer confident in their ability to detect and prevent threats to their sensitive files and s 0.6%
3
Is it possible to keep up?
Is it possible to stay secure? Lost device Users Data leaks Data Business partners Apps Compromised identity Customers Devices Employees Stolen credentials
4
Is it possible to keep up?
The Microsoft vision Users Secure and protect against new threats Data Maximum productivity experience Apps Employees Business partners Customers IT cannot afford to live in the past. Successful businesses of today (and tomorrow) realize the power of mobility to support employee productivity and collaboration. You need to prepare to mitigate the risks of providing freedom and space to your employees. You need to meet compliance and regulatory standards, maintain company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience, so that they’re motivated to follow protocol. You need an enterprise mobility partner that can help you achieve all of this, so that everyone is a winner, and your business stays out of the headlines. Microsoft’s vision includes management and protection across four key layers: users, device, app, and data – for both your employees, business partners, and customers. Our strategy is to ensure management across these layers while ensuring your employees, business partners, and customers by providing access to everything they need from everything; protecting corporate data across and collaboration apps all while integrating these new capabilities with what customers already have like Active Directory and System Center. Devices Comprehensive and integrated
5
Microsoft Enterprise Mobility + Security
Customers need Secure against new threats User freedom Do more with less ENTERPRISE MOBILITY + SECURITY Identity – driven security Productivity without compromise Comprehensive solutions Mobility tools are often point solutions that address specific security needs, but even multiple point solutions are still disconnected from one another, leaving cracks. Microsoft believes you should have an integrated mobility solution that provides security across multiple layers. You should have a comprehensive set of tolls that use identity as a control plane, provide the visibility and insights required to quickly pinpoint and resolve issues or threats, and simplify mobile device and application management. Identity-driven security. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity-based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline. Managed mobile productivity. Encourage your workers to use secure applications for work — even on personal devices — by providing the Office tools they know and love. Management capabilities built into Office make it easier for IT to protect company information. Conditional access policies restrict actions such as copy, paste, edit, and save —ensuring that workers only access corporate files through approved, managed apps and not personal workarounds where information can be corrupted or leaked. Nobody manages Office better than Microsoft. Sharing is a mainstay of collaboration for the mobile workforce, but poses a serious challenge to security. Microsoft gives you another integrated approach to information protection with a layer of security at the file level. Encryption, rights management, and authorization policies can be applied to any file type and remain with the data, wherever it goes and even in motion. Only authorized users can access protected files, and only on the sender’s terms. Comprehensive Solution: Meet new business challenges with the flexibility of a cloud-first mobility solution. Microsoft cloud services are designed to work seamlessly with your on-premises infrastructure and existing investments. Stay ahead of your BYOD workers with rapid release cycles to support the latest devices and apps. Scale quickly to onboard new hires, devices, apps, and more. It’s fast, it’s cost-effective, and it’s always up-to-date. Manage across multiple OS types (iOS, Android, Windows) and thousands of cloud apps. Identity-driven security Comprehensive solution Managed mobile productivity Microsoft solution
6
ENTERPRISE MOBILITY + SECURITY
Identity-driven security. Identity is the new control plane for security and management in the mobile-first, cloud-first world. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity-based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues. Identity-driven security Managed mobile productivity Comprehensive solution
7
Identity-driven Security
63% Data Breaches 63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report) 200+ days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline.
8
Identity is the foundation for enterprise mobility
Build 2012 9/29/2017 IDENTITY – DRIVEN SECURITY Identity is the foundation for enterprise mobility Simple connection SaaS Azure Public cloud Cloud On-premises Other directories Windows Server Active Directory Self-service Single sign-on Microsoft has a solution for this [Click] Traditional identity and access management solutions providing sing-sign on to on-premises applications and directory services such as Active Directory and others are used from the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world. [Click] Now, as we have discussed, there are new pressing requirements to provide the same experience to cloud applications hosted in any public cloud. [Click] Azure Active Directory can be the solution to this new challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way. [Click] In order to do that, one simple connection is needed from on-premises directories to Azure AD. [Click] and everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises [Click] And we don’t forget the users. Azure AD provides Self-service capabilities and easy access to all the application, consumer or business, they need. in the cloud but on-premises too (Application Proxy) Microsoft Azure Active Directory
9
Identity at the core of your business
IDENTITY – DRIVEN SECURITY Identity at the core of your business Enable business without borders Manage access at scale 1000s of apps, 1 identity Provide one persona to the workforce for SSO to 1000s of cloud and on-premises apps with multifactor authentication. Stay productive with universal access to every app and collaboration capability and self service capabilities to save money Manage identities and access at scale in the cloud and on-premises
10
Access thousands of apps with one identity
Windows Server Management Marketing 9/29/2017 Access thousands of apps with one identity Microsoft Azure OTHER DIRECTORIES 2500+ pre-integrated popular SaaS apps and self-service integration via templates Connect and sync on-premises directories with Azure Easily publish on-premises web apps via Application Proxy + custom apps Web apps (Azure Active Directory Application Proxy) Integrated custom apps SaaS apps © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
11
Security landscape has changed
IDENTITY – DRIVEN SECURITY Security landscape has changed Identity Devices Apps & Data Shadow IT Cloud apps SaaS Azure Employees Partners Customers Data breach Identity breach On-premises apps Transition to cloud & mobility New attack landscape Current defenses not sufficient
12
Identity anchors our approach to security
9/29/2017 IDENTITY – DRIVEN SECURITY Identity anchors our approach to security Holistic Identity-driven Innovative Intelligent Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises and in the cloud Offers one protected common identity for secure access to all corporate resources, on- premises and in the cloud, with risk-based conditional access Protects your data from new and changing cybersecurity attacks Enhances threat and anomaly detection with the Microsoft Intelligent Security Graph driven by a vast amount of datasets and machine learning in the cloud. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
13
Three steps to identity-driven security
1. Protect at the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Protect your data against user mistakes Gain deep visibility into user, device, and data activity on- premises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics. Safeguard your resources at the front door. Our solution calculates risk severity for every user and sign-in attempt, so risk-based conditional access rules can be applied to protect against suspicious logins. Protect your data against users mistakes: Gain deeper visibility into user, device, and data activity on-premises and in the cloud to create more effective, granular-level policies. Classify and label files at creation, track their usage, and change permissions when necessary. Detect attacks before they cause damage: Identify attackers in your organization using innovative behavioral analytics and anomaly detection technologies – all driven by vast amounts of Microsoft threat intelligence and security research data.
14
Protect at the front door
9/29/2017 1:20 AM IDENTITY – DRIVEN SECURITY Protect at the front door User Conditions Actions Allow access Or Location Device state Enforce MFA per user/per app MFA User/Application Risk Block access Azure AD Identity Protection Azure AD Privileged Identity Management © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
15
Protect your data against user mistakes
9/29/2017 1:20 AM IDENTITY – DRIVEN SECURITY Protect your data against user mistakes Cloud App Security Risk scoring Shadow IT Discovery Policies for data control How do I gain visibility and control of my cloud apps? Microsoft Intune How do I prevent data leakage from my mobile apps? LOB app protection DLP for Office 365 mobile apps Optional device management Azure Information Protection Classify & Label Protect How do I control data on-premises and in the cloud Monitor and Respond © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
16
Detect attacks before they cause damage
IDENTITY – DRIVEN SECURITY Detect attacks before they cause damage On-premises detection Detection in the cloud Microsoft Advanced Threat Analytics (ATA) Cloud App Security + Azure Active Directory Premium Behavioral Analytics Behavioral analytics Detection of known malicious attacks Anomaly detection Detection of known security issues Security reporting and monitoring © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
17
Enterprise Mobility +Security
IDENTITY - DRIVEN SECURITY Enterprise Mobility +Security Extend enterprise-grade security to your cloud and SaaS apps Microsoft Cloud App Security Microsoft Intune Azure Active Directory Premium Manage identity with hybrid integration to protect application access from identity attacks Azure Information Protection Protect your data, everywhere Protect your users, devices, and apps Microsoft’s enterprise & security solutions provide a holistic framework to protect your corporate assets across, on prem, cloud and mobile devices Advanced Threat Analytics helps IT detect threats early and provide forensic investigation to keep cybercriminals out Azure Active Directory Premium security reports help identify risky log ins. That paired with Azure Active Directory Identity Protection gives IT the ability to automatically block access to apps based on real time risk scoring of identities and log ins. Microsoft Cloud App Security provides deep visibility and control of data inside cloud applications Microsoft Intune manages and secures corporate data on mobile devices and collaborated within corporate apps. Azure Information Protection helps keep data secure and encrypted throughout a customers environment and extends security when data is shared outside the organization. Detect threats early with visibility and threat analytics Microsoft Advanced Threat Analytics
18
Identity-driven security
Protect against advanced threats
19
ENTERPRISE MOBILITY + SECURITY
Enterprise Mobility Suite (EMS) helps to provide employees with secure and seamless access to corporate and documents as well as familiar and productivity experiences with Office mobile apps such, as Outlook, Word, Excel, and PowerPoint. EMS helps protect corporate data on the device itself and beyond with four layers of protection—all without affecting the personal data on the device. IT can even manage these apps without requiring the device to be enrolled for management. Identity-driven security Managed mobile productivity Comprehensive solution
20
Managed mobile productivity
Unsecured apps 80% Unsecured apps pose a serious risk for IT. EMS can ensure that you provide your end users great apps that are secure and manageable. More than 80% of employees admit to using non-approved software as a service (SaaS) applications in their jobs.
21
Mobile device, application, and information protection
MANAGED MOBILE PRODUCTIVITY Mobile device, application, and information protection Manage and secure devices Office mobile apps Data-level protection User self-service Protect your Office Mobile apps without compromising your Office experience: EMS is the only solution built with and for Microsoft Office. This means that and other Office files can be secured without compromising the Office experience – the gold standard of productivity. Enable easy access to resources: Sign in once for secure access to all corporate resources, on-premises and in the cloud, from any device. This includes pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps. Enable users to protect and control data: Employees can encrypt virtually any type of file, set granular permissions, and track usage. With Office files, encryption can be applied with just one click. The encryption stays with the file where it goes, enabling more secure file sharing, internally and externally. Empower users with self-service capabilities: Users can update passwords and join and manage groups via a single portal to help save your IT helpdesk time and money. This applies across all iOS, Android, and Windows devices in your mobile ecosystem.
22
Manage and secure mobile devices
MANAGED MOBILE PRODUCTIVITY Manage and secure mobile devices Conditional access Device settings & Compliance enforcement Multi-identity support Access management Mobile app management (w & w/o a device enrollment) File level classification, labeling, and encryption Built-in security Office mobile apps Familiar and trusted Gold standard
23
Multi-identity policy
MANAGED MOBILE PRODUCTIVITY Mobile app management Corporate data Personal Multi-identity policy Managed apps Personal apps Managed apps Managed apps attachment Copy Paste Save Paste to personal app Save to personal storage If we take a closer look at our user’s newly enrolled device which is now compliant and ready to go, we can see that she is still able to maintain a personal experience on her device. She has organized her applications the way she wants, with all of her apps available on one screen. She has her managed corporate apps—the Office mobile apps she knows and loves and personal apps that she uses outside of work and may even consider using these personal apps to try to boost her productivity at work. Even though our user has all of her apps at hand on her personal device, IT is able to enjoy unparalleled management of the Office mobile apps, so that with Microsoft Intune, our IT pro has a different perspective on the organization of our user’s personal device. With the new multi-identity management feature, you an enable users to access both their personal and work accounts using the same Office mobile apps while only applying the MAM policies to their work account – providing a seamless experience while employees are on-the-go. For our IT pro, there is still a clear separation of the managed corporate apps and our user’s personal apps. But, this doesn’t affect the user’s access to apps. By applying policy at the app level, our IT pro can support mobile productivity while maintaining user preferences, and still have the ability to protect corporate data and resources with the Intune-managed Office mobile apps. The Intune App Wrapping Tool also allows IT to apply similar policies to your existing line-of-business applications so that these resources are equally protected through the organization’s proprietary apps. You can enable users to securely view content on devices within your managed app ecosystem using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps for Intune as well. Let’s now take a closer look at how app-level policies can help keep company data and information secure. Our user receives a work through her managed Outlook account with an attached Excel spreadsheet containing information she needs for a report. Our user opens the attachment in her Excel mobile application to find the information she needs. She then wants to copy the info to add to her report. But when she tries to paste it into her personal notepad, it doesn’t work—the personal notepad is not a managed app and our IT pro has applied policies that restrict copy, paste, and cut functions to only apps that are part of the managed app ecosystem (for Intune enrolled devices). So our user opens her Microsoft Word mobile app which is managed by Intune and she is successfully able to paste her information. Now our user wants to save the working copy of her report to her personal OneDrive account so that she can access it from her home computer. Because her personal OneDrive account is not one of the managed applications, she’s unable to save it here. IT has applied policies restricting the ability to save to only apps that are part of the managed app ecosystem. So our user must save her working copy to her managed OneDrive for Business account, which means when she does want to work on this report from another device, this device will have to be an enrolled for management . By using the mobile application management capabilities of Intune, the IT pro can help prevent leakage of important company data and make sure that this information doesn’t get into the wrong hands. Personal apps Personal apps
24
Data level protection Protect your data at all times
MANAGED MOBILE PRODUCTIVITY Data level protection Protect your data at all times Enable safe sharing internally and externally Empower users to make right decisions Maintain visibility and control With Microsoft Azure Information Protection, you can: Provide persistent protection Data itself carries the protection. This ensures data is always protected – regardless of where its stored or with whom its shared Enable safe sharing Access to shared data is identity driven. This enables safe sharing with internal employees as well as customers and partners. Empower users Deep integration with Office 365 enables users to apply protection easily without interrupting your employees normal course of work. In product notifications empower users to make right decisions and tools such as document tracking help them gain visibility into use of shared data Maintain control Different key management and deployment options are available to fit your requirements. IT can use powerful logging and reporting to monitor, analyze and reason over data. Classify your data based on sensitivity Policies classify and label data at time of creation or modification based on source, context, and content. Classification can be fully automatic, driven by users, or based on recommendation. Protect your data at all times Embed classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Add visibility and control Users can track activities on shared files and revoke access if they encounter unexpected activities. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data.
25
Classify and label data based on sensitivity
MANAGED MOBILE PRODUCTIVITY Classify and label data based on sensitivity STRICTLY CONFIDENTIAL CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules FINANCE CONFIDENTIAL Classify data according to policies – automatically or by user Add persistent labels defining sensitivity to files
26
Making the lives of users (and IT) easier
Windows Server Management Marketing 9/29/2017 MANAGED MOBILE PRODUCTIVITY Making the lives of users (and IT) easier Company branded, personalized application Access Panel: + iOS and Android Mobile Apps Integrated Office 365 app launching Manage your account, apps and groups Self-service password reset Application access requests © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
27
Managed mobile productivity
Secure access to company data with maximum productivity
28
ENTERPRISE MOBILITY + SECURITY
Identity-driven security Managed mobile productivity Comprehensive solution
29
Comprehensive solution
Global IT Budget growth 2016 0.6% 0.6% IT is continually being asked to do “more with less”. As business embraces a mobile first cloud first world IT budgets aren’t increasing. Finding a vendor that offers a comprehensive, cost effective, integrated solution is key to maximizing limited budgets.
30
Comprehensive. Integrated. Cost Effective.
COMPREHENSIVE SOLUTION Comprehensive. Integrated. Cost Effective. Integrates with what you have Simple to set up Easy to maintain Saves you money
31
Protect users, apps, data, and devices
Microsoft Consumer Channels and Central Marketing Group 9/29/2017 COMPREHENSIVE SOLUTION Protect users, apps, data, and devices Secure and protect against new threats Users Apps Data Devices Maximum productivity experience Microsoft’s vision for Enterprise Mobility expands the boundaries of current thinking. Managing devices with MDM or Identities with IAM is not enough. Microsoft EMS protects holistically across users, devices, apps, and data with a comprehensive solution that no other vendor provides. Employees Business partners Customers Comprehensive and integrated © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
32
Flexible architecture that just works
Microsoft Consumer Channels and Central Marketing Group 9/29/2017 COMPREHENSIVE SOLUTION Flexible architecture that just works Always up to date Real-time updates Keep up with new apps and devices Simple to set up and connect Easy, secure connections Simplified management Works with what you have Support multiple platforms Use existing investments © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
33
Simple set up with FastTrack
COMPREHENSIVE SOLUTION Simple set up with FastTrack Envision Define your vision and plan for a successful rollout Onboard Move to EMS smoothly and with confidence Drive Value Boost user engagement and manage change FastTrack is included with EMS to accelerate your deployments FastTrack will: Get organizational identities to the cloud Set up single sign-on for test apps (including Azure Active Directory Application Proxy apps) Configure self-service options like password reset and Azure Multi-Factor Authentication in the MyApps site Azure Active Directory Premium Microsoft Intune FastTrack will: Setup and deploy mobile app management policies to help prevent Office 365 data leakage Setup and deploy device security policies like pin or device encryption Integrate on-premises System Center Configuration Manager with Intune Enable conditional access and compliance policies to control access to data FastTrack will: Retain control of sensitive documents locally and over Automatically protect mail containing privileged information Ensure files stored in SharePoint are rights protected Azure Rights Management
34
Microsoft offers you more for less
Microsoft Consumer Channels and Central Marketing Group 9/29/2017 COMPREHENSIVE SOLUTION Microsoft offers you more for less For the cost of Identity & Access Management and MDM/ MAM from other vendors, EMS provides advanced security capabilities to protect users, devices, apps and data. Included with Microsoft EMS E5 Available separately from other vendors Information protection User and Entity Behavioral Analysis Cloud Access Security Broker Identity and access management Mobile device and application management Total cost (per user/month) $82 $$1 $102 $15 $18+ 1. Individual pricing not currently available. 2. Okta Enterprise Edition as of 3/1/ AirWatch Orange Management Suite Cloud as of 3/1/2015. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
35
Comprehensive solution
Stay secure and maximize your budget
36
ENTERPRISE MOBILITY + SECURITY
Holistic, intelligent, innovative security to keep up with new threats. Identity-driven security Encourage secure work habits by providing the best apps with built-in security. Managed mobile productivity Secure your enterprise fast – while keeping what you have and saving money. Comprehensive solution ENTERPRISE MOBILITY + SECURITY
37
Enterprise Mobility + Security
EMS Overview 9/29/2017 Enterprise Mobility + Security Identity and access management Managed mobile productivity Information protection Identity-driven security Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities (includes all capabilities in P1) Azure Information Protection Premium P2 Intelligent classification and encryption for files shared inside and outside your organization (includes all capabilities in P1) Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications EMS E5 Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Information Protection Premium P1 Encryption for all files and storage locations Cloud-based file tracking Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics EMS E3 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
38
Empower your employees by creating a secure productive enterprise
Microsoft Envision 2016 9/29/2017 1:20 AM Empower your employees by creating a secure productive enterprise Our unique approach Trust Collaboration Intelligence Mobility Protect your organization, data and people Create a productive workplace to embrace diverse workstyles Provide insights to drive better business decisions faster Enable your people to get things done anywhere © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
39
Secure Productive Enterprise
Microsoft Envision 2016 9/29/2017 1:20 AM Secure Productive Enterprise Delivered through enterprise cloud services Office 365 Enterprise Mobility + Security Windows 10 Enterprise Our unique approach © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
40
EMS Benefits for O365 customers
EMS Overview 9/29/2017 EMS Benefits for O365 customers Identity and access management Managed mobile productivity Information protection Identity-driven security Enterprise Mobility + Security Azure AD for O365+ Advanced security reports Single sign-on for all apps Advanced MFA Self-service group management & password reset & write back to on-premises, Dynamic Groups, Group based licensing assignment MDM for O365+ PC management Mobile app management (prevent cut/copy/paste/save as from corporate apps to personal apps) Secure content viewers Certificate provisioning System Center integration RMS for O365+ Automated intelligent classification and labeling of data Tracking and notifications for shared documents Protection for on-premises Windows Server file shares Cloud App Security Visibility and control for all cloud apps Advanced Threat Analytics Identify advanced threats in on premises identities Azure AD Premium P2 Risk based conditional access Basic identity mgmt. via Azure AD for O365: Single sign-on for O365 Basic multi-factor authentication (MFA) for O365 Basic mobile device management via MDM for O365 Device settings management Selective wipe Built into O365 management console RMS protection via RMS for O365 Protection for content stored in Office (on-premises or O365) Access to RMS SDK Bring your own key Advanced Security Management Insights into suspicious activity in Office 365 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
41
EMS benefits for Windows 10 customers
EMS Overview 9/29/2017 EMS benefits for Windows 10 customers Identity and access management Managed mobile productivity Information protection Identity-driven security Conditional access policies for secure single sign-on MDM auto-enrollment Self-Service Bitlocker recovery Password reset with write back to on-premises Cloud-based advanced security reports and monitoring Enterprise State-Roaming Mobile device management Mobile app management Secure content viewer Certificate, Wi-Fi, VPN, profile provisioning Agent-based management of Windows devices (domain- joined via ConfigMgr and internet-based via Intune) Automated intelligent classification and labeling of data Tracking and notifications for shared documents Protection for content stored in Office and Office 365 & Windows Server on premises Cloud App Security Visibility and control for all cloud apps Advanced Threat Analytics Behavioral analytics for advanced threat detection Azure AD Premium Risk based conditional access Enterprise Mobility +Security Windows 10 Single sign-on for business cloud apps Device setup and registration for Windows devices Windows Store for Business Traditional domain join manageability Manageability via MDM and MAM Encryption for data at rest and generated on device Encryption for data included in roaming settings Windows Defender Advanced Threat Protection Identify advanced threats focused on Windows 10 behavioral sensors © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
42
9/29/2017 1:20 AM © 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.