Presentation is loading. Please wait.

Presentation is loading. Please wait.

Prevent Costly Data Leaks from Microsoft Office 365

Similar presentations


Presentation on theme: "Prevent Costly Data Leaks from Microsoft Office 365"— Presentation transcript:

1 Prevent Costly Data Leaks from Microsoft Office 365
9/20/2018 9:21 AM THR1035 Prevent Costly Data Leaks from Microsoft Office 365 Anuj Sawani Palo Alto Networks © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Office 365 Apps Storing Data in the Cloud
OneDrive SharePoint Exchange Yammer

3 How Do Data Leaks Happen?
MALICIOUS OUTSIDER ACCIDENTAL DATA EXPOSURE MALICIOUS INSIDER 59% 23% 14% SOURCE OF BREACH DATA – – breachlevelindex.com

4 Native Office 365 Security Controls
Identity Management Data Compliance Rights Management Malware Detection

5 Extend Native Security Controls
9/20/2018 9:21 AM Extend Native Security Controls When you need… Data protection for other cloud apps In-line visibility and granular app control Leverage advanced DLP capabilities Threat protection across network, cloud and endpoints Protection against zero-day malware © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 Abundant Use of SaaS Applications
Sanctioned Remote users Tolerated Unsanctioned On-prem users

7 The Overlay (and Insufficient) Approach
Sanctioned Remote users CLOUD PROXY Pac File Merge Or Addt’l VPN Agent Tolerated Pac File Merge CLOUD PROXY Unsanctioned Log Forwarder On-prem users Traffic Forwarder AD Connector

8 The Overlay Approach Does Not Scale
Sanctioned Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent CLOUD PROXY Tolerated CLOUD PROXY Unsanctioned Evasion tools

9 Palo Alto Networks’ Platform Approach
Monitor and control in-cloud activity with Aperture Sanctioned Remote users Complete visibility and control for remote users via GlobalProtect Tolerated Complete visibility and control for on premise activity with PAN-OS Next Generation Firewall Unsanctioned On-Prem users

10 344 KB slideshare-uploading PowerPoint slideshare prodmgmt HTTP
application function PowerPoint file type “Confidential and Proprietary” content slideshare application 344 KB prodmgmt group HTTP protocol file-sharing URL category mjacobsen user SSL protocol canada destination country source IP destination IP TCP/443 destination port

11 Discover Cloud Apps and Assess Risk
SaaS Usage Reporting Interactive SaaS Dashboard

12 Aperture Security Components
DLP Malware Prevention User Anomalies and Activity Monitoring Machine Learning Control third-party apps Cloud Asset and Risk Discovery

13 Comprehensive Cloud App Coverage
API-BASED INLINE 2500+ APPS (SAAS AND NON-SAAS)

14 Comprehensive Protection for Microsoft Environments
In the Cloud Securely enable Office 365 and Azure migrations Protect cloud environments from threats Prevent data loss in Office 365 On the Network Next-generation firewall; appliance or virtualized Securely enable Microsoft applications Prevent known and unknown threats On the Endpoint Enforce policy consistency for all users and devices Prevent known and unknown threats

15 Please evaluate this session
Tech Ready 15 9/20/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 http://go.paloaltonetworks.com/secureo365 9/20/2018 9:21 AM
© Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 9/20/2018 9:21 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 Backup

19 Aperture For Cloud-based Email
Security Threat Prevention and DLP 0-Day Malware detection tied to WildFire Detection of sensitive content and exposure Activity monitoring and anomalies Controls Monitoring Detection of auto-forwarding to untrusted domains Detection of Public Folders Detection of Retention Policy Violations APERTURE THREAT INTELLIGENCE CLOUD

20 Aperture For SharePoint & OneDrive
Protect against Data exfiltration Detection of sensitive content Activity monitoring and anomalies Monitor SharePoint Sites Users OneDrive Folders Remediate accidental exposure Stop Malware Propagation Detect Malware Quarantine APERTURE THREAT INTELLIGENCE CLOUD


Download ppt "Prevent Costly Data Leaks from Microsoft Office 365"

Similar presentations


Ads by Google