Presentation is loading. Please wait.

Presentation is loading. Please wait.

Deployment Planning Services

Similar presentations


Presentation on theme: "Deployment Planning Services"— Presentation transcript:

1 Deployment Planning Services
3/13/2018 Deployment Planning Services Enterprise Mobility + Security (EMS) Identity Driven Security PARTNER ENGAGEMENT GUIDE © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Microsoft Identity-Driven Security

3 Protect at the front door
3/13/2018 Protect at the front door Azure Active Directory (AD) Premium Secure single sign-on and self-service identity management capabilities for 1000’s of cloud and on-premises apps with a single identity managed and protected Multi-Factor Authentication (MFA)for user sign-ins and transactions to add an additional security layer Secure remote access for on-premises apps without using a virtual private network (VPN) Identity protection with machine learning-based threat detection and calculations of risk severity for every user and sign-in attempt Risk-based conditional access through an intelligent assessment of granting or blocking access and automatic protection from future threats Discovery and restriction of privileged identities and their access to resources (i.e. time limited “Just in Time” admin access) with Privileged Identity Management © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Protect data against user mistakes
3/13/2018 Protect data against user mistakes Cloud App Security Complete visibility into employee cloud app usage and Shadow IT Ongoing risk detection, powerful reporting, and analytics on users, upload/download traffic, usage patterns, and transactions for discovered apps Granular-level control and data policies for on-going data protection in cloud apps Microsoft Intune Unparalleled management of Office mobile apps with or without device enrollment into MDM Selective wipe of corporate data (apps, , data, management policies, and networking profiles) from user devices while leaving personal data intact Security policy enforcement for mobile devices, apps, and PCs Azure Information Protection Persistent data classification and protection that ensures data is protected at all times—regardless of where its stored or with whom its shared Safe sharing with people inside and outside of your organization Simple, intuitive controls for data classification and protection Deep visibility and control of shared data for users and IT © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Detect attacks before they cause damage
3/13/2018 Detect attacks before they cause damage Microsoft Advanced Threat Analytics (ATA) Identification of advanced persistent threats (APTs) on-premises by detecting suspicious user and entity behavior using machine learning and event logs Detection of known malicious attacks almost as instantly as they occur A simple attack timeline with clear and relevant attack information so you can quickly focus on what is important Cloud App Security Behavioral analytics that assess risk and identify attackers targeting your cloud apps Identification of anomalies and policy violations that may be indicative of a security breach Azure Active Directory Premium Identity protection that provides a consolidated view of all the risky events and possible configuration vulnerabilities with notifications, analysis, and recommended remediation based on 10 TB of cloud data processed daily Advanced security reporting to protect against suspicious behaviors and advanced attacks Access and usage reports that give visibility into the integrity and security of your organization’s directory with access and usage reports © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 Engagement Options Choose from 3, 5, 10, or 15 days GOAL ACTIVITY
Assess, Prioritize & Plan Assess, Prioritize, Plan & POC or Limited Online Pilot Pre-engagement Questionnaire Define Customer Problem Statement and Objectives Provide Infrastructure Overview and Solution Concept Deliver Implementation Plan and Next Steps Microsoft FastTrack Customer Success Plan ACTIVITY ACTIVITY

7 Engagement Structure and Prerequisites
3/13/2018 Engagement Structure and Prerequisites Customize the engagement to meet your customer’s unique requirements Engagement Activities Understand the customer’s business objectives and security concerns, and assess computer environment for EMS readiness Create an EMS Identity- Driven Security Implementation Plan to prepare the customer to move to EMS components Run a pilot to demonstrate the value of EMS Identity-Driven Security Note: If your knowledge of your customer environment allows you to move more quickly through the engagement and complete further steps than the ones described, the program will honor the engagement as long as the deliverables from an engagement reflect and justify the tasks. For example, if you are conducting a 5-day engagement and your knowledge of the customer environment allows you to move more quickly through the assessment, you are welcome to begin a pilot. Please note the change in the Engagement Completion Template. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 Tools & Resources Websites
3/13/2018 Tools & Resources Websites Support resources for Azure Rights Management Microsoft Cloud and Enterprise Partner Resources (Use MPN credentials to access this material) Support forum SDKs for native app integration    Customer Success Story Plan for and deploy Azure AD Premium ExpressJet Airlines Learn more Get started Training EMS Cloud Solution Partner Training Plan for and deploy Windows Intune Azure Active Directory: Identity Management and Protection video Get started with mobile device management Azure AD Password Reset Plan for and deploy Azure Rights Management Hybrid Identity Design Considerations Deploy Support resources for Windows Intune Technical documentation library Trust Center © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Deployment Planning Services"

Similar presentations


Ads by Google