Presentation is loading. Please wait.

Presentation is loading. Please wait.

Microsoft Cloud App Security

Similar presentations


Presentation on theme: "Microsoft Cloud App Security"— Presentation transcript:

1 Microsoft Cloud App Security
Microsoft Ignite 2016 6/5/2018 8:08 AM BRK2012 Microsoft Cloud App Security GET VISIBILITY, DATA CONTROL AND THREAT PROTECTION TO YOUR CLOUD APPS Yinon Costica & Demi Albuz – Microsoft Bryan Hendricks & Ryan Marchant – LDS Church © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Mobile-first, cloud-first reality
72% 63% 1/3 Shadow IT By 2022, a third of successful attacks experienced by enterprises will be on their shadow IT resources. Mobile devices 72% of the U.S. workforce will be mobile by 2020, relying on devices other than their laptop to be productive. Data breaches 63% of confirmed data breaches involved weak, default, or stolen passwords.

3 Market is attempting to solve the problem
Data Loss Prevention Information Rights Management Discovery Mobile Device & Application Management Secure collaboration Mobile Data Loss Prevention Identity governance Cloud Data Loss Prevention User & Entity Behavioral Analytics Single- sign on Cloud anomaly detection Identity & Access Management Conditional access Cloud Access Security Broker SIEM Threat Detection Cloud visibility

4 Mobile Device & Application Management
Data Loss Prevention Information Rights Management Mobile Device & Application Management Protect at the front door Protect your data anywhere Detect & remediate attacks User & Entity Behavioral Analytics Identity & Access Management Identity & Access Management Mobile Device & App Management User & Entity Behavioral Analytics Cloud Access Security Broker Data Loss Prevention Cloud Access Security Broker Cloud Access Security Broker

5 Microsoft Enterprise Mobility + Security
Protect at the front door Protect your data anywhere Detect & remediate attacks Microsoft Enterprise Mobility + Security

6 Supporting your GDPR compliance journey with Microsoft Enterprise Mobility + Security
MICROSOFT INTUNE MICROSOFT CLOUD APP SECURITY Classify CONDITIONAL ACCESS Location ! AZURE INFORMATION PROTECTION Access granted to data Apps ! Risk Audit Label Device Protect AZURE ACTIVE DIRECTORY ! MICROSOFT ADVANCED THREAT ANALYTICS

7 Microsoft Ignite 2016 6/5/2018 8:08 AM Shadow IT On average, an organization has 28 cloud storage apps routinely used by its employees. Only 27% of these support multi-factor authentication. Only 54% of these encrypt data at-rest. Only 10% of these are compliant with SOC 2, HIPAA and PCI DSS. Only 49% of these apps claims they are preserving user's right on his own data. Only 20% of these apps commit on deleting user’s data after account deletion/termination. On average, an organization has 41 collaboration apps routinely used by its employees. Only 22% of these support multi-factor authentication. Only 24% of these encrypt data at-rest. Only 6% of these are compliant with SOC 2, HIPAA and PCI DSS. Only 31% of these claim they are preserving user's right on his own data. Only 18% of these commit on deleting user’s data after account deletion/termination. © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 We would like to use a single slide and use this format
We would like to use a single slide and use this format. Please update the icons. (You can use the icons from slide #13) How do I gain visibility into cloud apps used in my organization and get a risk assessment? How can I control and limit access to data in cloud apps? How can I prevent data loss in cloud apps and stay compliant with regulations? How do I protect cloud apps and the data in them from security attacks?

9 Microsoft Cloud App Security
6/5/2018 8:08 AM Microsoft Cloud App Security A comprehensive, intelligent security solution that extends the visibility, real-time control, and security you have in your on-premises network to your cloud applications Discover Control Protect © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 Microsoft Cloud App Security
Discover and assess risks Control access in real time Protect your information Detect threats Identify cloud apps on your network, gain visibility into shadow IT, and get risk assessments and ongoing analytics. Manage and limit cloud app access based on conditions and session context, including user identity, device, and location. Get granular control over data and use built-in or custom policies for data sharing and data loss prevention. Identify high-risk usage and detect unusual behavior using Microsoft threat intelligence and research. Extend Microsoft security To your cloud apps Threat detection: Microsoft Intelligent Security Graph, Office ATP Information Protection: Office 365 & Azure Information Protection Identity: Azure AD and Conditional Access + more Discover and assess risks Discover all cloud usage in your organization Information protection Monitor and control your data in the cloud Conditional access Control and limit user access based on session context Threat detection Detect usage anomalies and security incidents

11 Cloud App Security Demo
Microsoft Ignite 2016 6/5/2018 8:08 AM Cloud App Security Demo © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Cloud discovery Shadow IT discovery
Microsoft Ignite 2016 6/5/2018 8:08 AM Cloud discovery Shadow IT discovery Risk assessment and migration to business- ready apps On-going protection and analytics Discover cloud apps in use across your networks Investigate users and source IP cloud usage Create custom views and reports for business units, networks and groups Optional PII anonymized reports Risk assessment for 15,000+ cloud apps based on 60 security and compliance risk factors Un-sanction, sanction and protect apps Customize labels, notes, weight in risk scoring and override per app risk assessment to support internal workflows Anomalous usage alerts New apps and trending apps alerts Identify and close policy enforcement gaps Programmatically generate blocking scripts to supported network appliances Integrates with Your network appliances, SIEM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Out-of-the-box integration with ZScaler
Identify high risk usage and cloud app security violations See CSP’s categories, risk levels, and compliance certifications

14 Microsoft’s approach to information protection
6/5/2018 8:08 AM Microsoft’s approach to information protection Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization Detect Classify Protect Monitor Scan & detect sensitive data based on policy Classify data and apply labels based on sensitivity Apply protection actions, including encryption, access restrictions Reporting, alerts, remediation Devices cloud On premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 Information protection for cloud apps
Microsoft Ignite 2016 6/5/2018 8:08 AM Information protection for cloud apps Gain visibility into data and sharing Classify, label and protect Monitor & investigate Visibility to sharing level and classification labels Quantify over-sharing exposure and compliance risks Detect and manage 3rd apps access Govern data in the cloud with granular DLP policies Leverage Microsoft’s Information Protection capabilities for classification Automatically protect your data using Azure Information Protection Identify policy violations Investigate incidents and related activities Quarantine and permissions removal Integrates with Azure Information Protection, Office 365, External DLP solutions © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 Conditional Access: Proxy
Microsoft Ignite 2016 6/5/2018 8:08 AM Conditional Access: Proxy Investigate & enforce app and data restrictions Unique integration with Azure AD Context-aware session policies Control access to cloud apps based on user, location, device and app Identify managed devices via VPN (location based), Domain joined devices, Intune compliant devices or client certificates Supports any SAML-based app, any OS Enforce browser-based “view only” mode for low-trust sessions Limit access to sensitive data Classify, label and protect on download Visibility into for unmanaged device activity Integral component of Azure AD Conditional Access Simple deployment directly from your Azure AD portal Leverages existing device management mechanisms, no additional deployment required Integrates with Azure Active Directory Public Preview in October © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Threat detection & investigation
Microsoft Ignite 2016 6/5/2018 8:08 AM Threat detection & investigation Behavioral analytics & ransomware detection Advanced investigation & remediation Threat Intelligence Leverages Microsoft Intelligent Security Graph: Unique insights, informed by trillions of signals across Microsoft’s customer base Native integration with Office Threat Intelligence Identify anomalies in your cloud environment via advanced behavioral analytics Built-in detections for leading threat scenarios: Ransomware, admin take-over, shared accounts Pivot on users, IP addresses, resources, activities and locations Customize detections based on your findings Automate remediation with Azure AD Integrates with Microsoft Intelligent Security Graph, 3rd party SIEM solutions © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 Cloud App Security: Ignite Announcements
Cloud App Security: proxy Control and limit access to cloud apps: Using proxy with Azure Active Directory Conditional Access. Public Preview in October Scan, classify sensitive data and apply AIP labels automatically Automatic labeling and protection will be in public preview in October Cloud App Security will classify file leveraging Microsoft’s Information Protection solution and capabilities starting Q Support for Azure West Europe region Cloud App Security is also be available in Azure West Europe region to better serve our customers in Europe and support their compliance requirements New Cloud App Discovery experience in Azure AD Cloud App Discovery in Azure AD’s now enhanced to provide deeper visibility into cloud app usage, no agents required, with ongoing analysis and alerts, powered by Cloud App Security. Available to Azure AD customers.

19 Customer story

20 LDS Church Over 15 million members and 30,000 local congregations
6/5/2018 8:08 AM LDS Church Over 15 million members and 30,000 local congregations 422 missions in 168 countries 70,000+ full-time proselyting missionaries 30,000+ humanitarian/welfare service missionaries © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

21 Our Microsoft Cloud App Security Dashboard
6/5/2018 8:08 AM Our Microsoft Cloud App Security Dashboard © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

22 Our Active User Map 6/5/2018 8:08 AM
© Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

23 6/5/2018 8:08 AM Our Office 365 Story © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

24 Process for proving moving to secured productivity with Office 365
6/5/2018 8:08 AM Process for proving moving to secured productivity with Office 365 Cataloged the available controls Clarified which threats we were trying to defend against Assessed the effectiveness of individual controls Selected a package of controls Hired an auditing firm to review the package of controls Implemented the controls Graphed the risk impact and probability – before and after © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Risk Register Worksheet Demo
Microsoft Ignite 2016 6/5/2018 8:08 AM Risk Register Worksheet Demo © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

26 6/5/2018 8:08 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 6/5/2018 8:08 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 From threats & risks to measurable business problems
Microsoft Ignite 2016 6/5/2018 8:08 AM From threats & risks to measurable business problems Our skeptics should have been satisfied We underestimated the degree to which our customers and peers feared moving their data to the cloud © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

29 Microsoft Ignite 2016 6/5/2018 8:08 AM How did we get traction? The methodology was an important tool for documenting how Office 365 reduced overall risk Facts not sufficient to address the underlying fear In hindsight, it can be hard to combat fear with facts Got traction when our detective controls began to yield real stories & we were able to definitively remediate the problems © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

30 6/5/2018 8:08 AM Microsoft Cloud App Security is the means whereby we implemented our detective controls © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 Research tools and centralized remediation
6/5/2018 8:08 AM Research tools and centralized remediation © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 Automated Remediation Tools
Microsoft Ignite 2016 6/5/2018 8:08 AM Automated Remediation Tools © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

33 Microsoft Ignite 2016 6/5/2018 8:08 AM Cloud App Security put teeth into our program to protect unstructured data with Office 365 © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

34 6/5/2018 8:08 AM When our customers saw that the program had teeth, our customers finally understood why their data was more secure in Office 365 © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

35 Enterprise Mobility + Security Customers

36 Third-party Multi-Factor Authentication
Enterprise Mobility + Security Partners MDM and MAM Identity and Access Management Third-party Multi-Factor Authentication Threat Management Information Protection Mobile Threat Defense

37 Try Cloud App Security today
Microsoft Ignite 2016 6/5/2018 8:08 AM Try Cloud App Security today aka.ms/mcastrial © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

38 Check out other great EMS sessions
Deployment for EMS & Microsoft 365 Microsoft Cloud App Security Azure Information Protection Azure Active Directory Microsoft Advanced Threat Analytics Microsoft Intune Download the Ignite app Windows iOS Android

39 Keep going… Try Enterprise Mobility + Security for free, today:
See Microsoft Cloud App Security in action Evaluate and try Microsoft Advanced Threat Analytics now Explore Identity + Access Management Learn more about Azure Information Protection Discover new MDM and MAM solutions with Microsoft Intune Check out new Desktop virtualization capabilities

40 6/5/2018 8:08 AM © 2016 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

41 Appendix

42 Standalone subscription
Microsoft Ignite 2016 6/5/2018 8:08 AM Cloud App Security Standalone subscription $2.50 per user per month *until December 31, 2017 © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

43 80% 73% SaaS adoption challenge
Microsoft Ignite 2016 6/5/2018 8:08 AM SaaS adoption challenge 80% 73% of enterprises indicated security as a top challenge holding back SaaS adoption* >80% of employees admit to using non-approved SaaS apps in their jobs** Cloud Security Alliance (CSA) survey, Cloud Adoption, Practices and Priorities Survey Report 2015 ** © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

44 Introducing Microsoft Cloud App Security
Enterprise-grade security for your cloud apps Visibility Gain complete visibility and context for cloud usage and shadow IT Control Shape your cloud environment with granular controls and policy setting for access, data sharing, and DLP Threat detection Identify high-risk usage and security incidents, detect abnormal user behavior, and prevent threats

45 Information Protection
Microsoft Ignite 2016 6/5/2018 8:08 AM Microsoft Cloud App Security: gain visibility and control of data in cloud apps Cloud Discovery Discover 14K+ cloud apps in your environment, gain visibility into shadow IT and assess risk Information Protection Shape your cloud environment with granular controls and use out-of-the-box or custom policies for data sharing, and data loss prevention Threat Protection Identify high-risk usage and cloud security issues, detect abnormal user behavior, and prevent threats Discovery Risk Assessment Ongoing analytics ! ! Behavioral Analytics Identify anomalies in your cloud environment that may be indicative of a breach Collect logs from firewalls and proxies - no agents required on user devices Policy Setting DLP & Data Sharing Policy Enforcement Policies Policy Enforcement Activity Scan for advanced alerts Enhanced by Microsoft Intelligent Security Graph Protect file Anomaly Detection App Discovery Quarantine Leverage Microsoft’s threat intelligence to detect anomalies, prevent threats, and stop risky behavior right away. Discovery Anomaly Make private File Remove a collaborator Integrated with Azure Information Protection Create policies for files classified by Azure Information Protection and govern sensitive data in the cloud Investigate and gather unique insights Gain a deeper understanding of what's happening in your cloud environment by pivoting on users, files, accounts, apps and activities. Use log anonymization to protect employee privacy while uncovering Shadow IT © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

46 Microsoft Enterprise Mobility + Security
Technology Benefit E3 E5 Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises app MFA, conditional access, and advanced security reporting Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Information Protection P1 Encryption for all files and storage locations Cloud-based file tracking Azure Information Protection P2 Intelligent classification and encryption for files shared inside and outside your organization Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics Identity and access management Managed mobile productivity Information protection Threat protection

47 FastTrack for Microsoft 365
6/5/2018 8:08 AM FastTrack.microsoft.com FastTrack for Microsoft 365 Move to the cloud with confidence Faster Deployment Migrate , content, and light up Microsoft 365 services Deploy and securely manage devices Enable your business and gain end-user adoption Delivered by Microsoft engineers as part of your subscription Tight integration with qualified partners for additional services Maximized ROI Higher Adoption © Microsoft Corporation. All rights reserved.

48 Our FastTrack Momentum
6/5/2018 8:08 AM Our FastTrack Momentum “We saw what Microsoft was putting into Intune and saw that it could do everything that we wanted ... and that it would grow with our future needs… … the other thing, and this is a huge part not to be diminished, was the magnitude of positive experience and support from the FastTrack Center.” Willem Bagchus Messaging and Collaboration Specialist, United Bank 40k+ 6.3 PB+ 6.8 M+ 189.5 Customers enabled Data migrated Seats migrated Customer satisfaction (NSAT) 800+ 51k+ 53% FastTrack Engineers worldwide Success plans Faster Time to Value © Microsoft Corporation. All rights reserved.

49 Solution comes in two different flavors:
Office 365 Cloud App Security Microsoft Cloud App Security Enhanced visibility and control for Office 365 Advanced security alerts Productivity app discovery App permissions and control Available in Office E5 Integrated security suite across identity, device, apps and data Discovery of Shadow IT Unified Information protection Automated detection and remediation Available standalone and as a part of EMS E5

50 Office 365 Cloud App Security vs. Microsoft Cloud App Security
Office 365 Advanced Security Management Cloud Discovery Discovered apps 15,000 + cloud apps 750+ cloud apps with similar functionality to Office 365 Deployment for discovery analysis Manual and automatic log upload Manual log upload Log anonymization for user privacy Yes Access to full Cloud App Catalog Cloud app risk assessment Cloud usage analytics per app, user, IP address Ongoing analytics & reporting Anomaly detection for discovered apps Information Protection Data Loss Prevention (DLP) support Cross-SaaS DLP and data sharing control Uses existing Office DLP (available in Office E3 and above) App permissions and ability to revoke access Policy setting and enforcement Integration with Azure Information Protection Integration with third party DLP solutions Threat Detection Anomaly detection and behavioral analytics For Cross-SaaS apps including Office 365 For Office 365 apps Manual and automatic alert remediation SIEM connector Yes. Alerts and activity logs for cross-SaaS apps. Yes. Office 365 alerts only. Integration to Microsoft Intelligent Security Graph Activity policies

51 Microsoft Ignite 2016 6/5/2018 8:08 AM From SaaS providers “At Box, we believe in a modern content management and collaboration experience where information can move easily and securely between individuals and organizations and across devices and applications. By working closely with Microsoft Cloud App Security, we're providing businesses with stronger controls and deeper visibility around their cloud apps, and protecting unwanted access to critical business content."  ROGER MURFF Vice President of Technology Partnerships at Box BOX © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

52 Complete framework to secure your cloud apps
Microsoft Ignite 2016 6/5/2018 8:08 AM Complete framework to secure your cloud apps Cloud discovery Information protection Threat detection Conditional Access Discover all cloud usage in your organization Monitor and control your data in the cloud Detect usage anomalies and security incidents Control and limit user access based on session context Extend Microsoft security To your cloud apps Threat detection: Microsoft Intelligent Security Graph, Office ATP Information Protection: Office 365 & Azure Information Protection Identity: Azure AD and Conditional Access + more © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

53 Cloud App Security: Ignite Announcements
Cloud App Security: proxy-enforced session restrictions Control and limit access to cloud apps: Using proxy-enforced app restrictions with Azure Active Directory Conditional Access. Public Preview in October Scan, classify sensitive data and apply AIP labels automatically Automatic labeling and protection will be in public preview in October Cloud App Security will classify file leveraging Microsoft’s Information Protection solution and capabilities starting Q Support for Azure West Europe region Cloud App Security is also be available in Azure West Europe region to better serve our customers in Europe and support their compliance requirements New Cloud App Discovery experience in Azure AD Cloud App Discovery in Azure AD’s now enhanced to provide deeper visibility into cloud app usage, no agents required, with ongoing analysis and alerts, powered by Cloud App Security. Available to Azure AD customers.

54 Please evaluate this session
Tech Ready 15 6/5/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

55


Download ppt "Microsoft Cloud App Security"

Similar presentations


Ads by Google