Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enterprise Mobility Suite Technical and Business Briefing

Similar presentations


Presentation on theme: "Enterprise Mobility Suite Technical and Business Briefing"— Presentation transcript:

1 Enterprise Mobility Suite Technical and Business Briefing
SLIDE OBJECTIVE: Introduce yourself and provide an overview of the session. KEY MESSAGES: Briefly discuss your role at Microsoft and establish your credibility in discussing Cybersecurity. Set up the key shift in thinking around Cyber – from Protect to Protect, Detect and Respond – assume breach. Introduce Microsoft’s Cybersecurity solution. You’ll leave with a few actionable steps you can take to improve your security posture.

2 Cybersecurity used to mean building a bigger moat & a bigger wall
SLIDE OBJECTIVE: Create a shift in thinking on security today and the impact the cloud applications and mobility has with user identity and corporate data. KEY MESSAGES: EMS is not just a mobility message but a security message design to address the new challenges that have arisen in the last few years. Setting the stage - the world has gotten more complex. We no longer can rely on “Castle mentality” of inside vs. outside for security We no longer have a single account in an AD domain, accounts and identities are everywhere

3 How do you build a moat or wall to protect a cloud? (You can’t.)
SLIDE OBJECTIVE: Create a shift in thinking KEY MESSAGES: Setting the stage - the world has gotten more complex. We no longer can rely on “Castle mentality” of inside vs. outside for security We no longer have a single account in an AD domain, accounts and identities are everywhere We no longer have one device per user or even own all of the devices that a user has. We no longer keep all data and applications with in our organization. The landscape has changed but the way most companies try to address this has not leaving very large security gaps (you can ask them to think of any recent data breach, all due to security gaps).

4 “Cybersecurity is a CEO-level issue.”
McKinsey & Company, January 2014 Cyberthreats in Today’s Cloud & Mobile World Extend trust & data to unmanaged mobile devices Extend trust to 3rd party cloud providers Protect new forms of value generation from ‘Big Data’ analytics 1.8 successful attacks experienced every week Secure new patterns of data creation & social sharing SLIDE OBJECTIVE: Create a sense of urgency KEY MESSAGES: Cyber is a CEO-level issue – ask if IT is now regularly meeting with the Board of directors – answer is probably yes. This growth in size and complexity is being instantiated at the Device layer (Mobile devices everywhere) Human/interaction layer (Social relationships everywhere) Infrastructure layer (Cloud/hybrid models abounding) - Extending trust – key idea – you cant change how your business works – if your business model involves partners (example Car Companies and dealers, Insurance company and agents, Manufacturing and suppliers) you can’t stop doing business or go back to the old way that did not involve technology. Data Layer (Analytics and Big Data are emerging) Source 1 (HEADING): Cyber security is a CEO issue: tacks

5 What's Driving Change? IT Devices Apps Data Users Employees Customers
Animated slide. Ask them what is was like 10 years ago…. They managed corporate devices, controlled deployments, applications mostly in house, same with data and limited or no mobile access. Today complete change People have average of 2+ devices and want to be productive on them and most of the time it’s a personal device. Applications exist on a mobile device, on premise and in the cloud and often companies don’t know how many “applications” they really have with in their corporate environment since a department and set up a cloud app on their own. Data is similar to applications existing on a mobile device, on premise and in the cloud and if you don’t know where data is being stored or have the ability to manage it directly – it’s a huge opportunity for leakage. Finally you have to consider not only employees but your business partners and customers who you are now connected with. Employees Customers Business Partners

6 Enterprise Mobility Suite
Identity & Access Management Mobile Device & App Management Information Protection Behavior based threat analytics Microsoft Azure Active Directory Premium Microsoft Azure Rights Management Premium Advanced Threat Analytics Microsoft Intune How is Microsoft addressing these challenges…. With targeted solutions in each area that work together and with other key tools (Office) to provide a true integrated solution. Easily manage identities across on-premises and cloud. Single sign-on & self- service for any application Manage and protect corporate apps and data on almost any device with MDM & MAM Encryption, identity, and authorization to secure corporate files and across phones, tablets, and PCs Identify suspicious activities and advanced threats in near real time, with simple, actionable reporting

7 EMS Technical and Business Briefing
Session Audience Goal Time Introduction Overview of the session agenda and introduction to the EMS components. CISO CIO IT Directors Outline the plan for the day 15 min. Use Case Scenarios Discuss security challenges facing businesses today through three representative use cases: Network breach (ATA, PAM, AADP) Disgruntled employee (MAM, RMS, MFA) New user with iPhone (MDM, SSO, MIM, conditional access) IT Directors Infrastructure Security Mobility Desktop Identify how the customer addresses common security challenges. Show how EMS strengthens and streamlines security in each use case. 1 hr. Cloud identity deep dive Business alignment and technical deep-dive/demo of Azure Active Directory Premium Ascertain customer needs during deep-dive/demo. Align AADP to their needs and discuss any concerns. Outline potential deployment plans. 2 hrs. LUNCH 30 min. Mobile device and application management Business alignment and technical deep-dive/demo of Microsoft Intune. Align Intune to their needs and discuss any concerns. Breach defense Business alignment and technical deep-dive/demo of Advanced Threat Analytics and privilege management. Align ATA and PAM to their needs and discuss any concerns. BREAK Self-protecting documents Business alignment and technical deep-dive/demo of Azure Rights Management. Ascertain customer needs during deep-dive/demo Align RMS to their needs and discuss any concerns. Review Learnings Recap session results in preparation for delivering follow-up document that provides blue print for EMS moving forward. CISO IT Directors Provide tangible action plan for next steps (Session write-up will follow with in 3-5 business days) 45 min.


Download ppt "Enterprise Mobility Suite Technical and Business Briefing"

Similar presentations


Ads by Google