Download presentation
Presentation is loading. Please wait.
Published byVilhelm Søgaard Modified over 6 years ago
1
Prevent Costly Data Leaks from Microsoft Office 365
9/20/2018 9:21 AM THR1035 Prevent Costly Data Leaks from Microsoft Office 365 Anuj Sawani Palo Alto Networks © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Office 365 Apps Storing Data in the Cloud
OneDrive SharePoint Exchange Yammer
3
How Do Data Leaks Happen?
MALICIOUS OUTSIDER ACCIDENTAL DATA EXPOSURE MALICIOUS INSIDER 59% 23% 14% SOURCE OF BREACH DATA – – breachlevelindex.com
4
Native Office 365 Security Controls
Identity Management Data Compliance Rights Management Malware Detection
5
Extend Native Security Controls
9/20/2018 9:21 AM Extend Native Security Controls When you need… Data protection for other cloud apps In-line visibility and granular app control Leverage advanced DLP capabilities Threat protection across network, cloud and endpoints Protection against zero-day malware © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
Abundant Use of SaaS Applications
Sanctioned Remote users Tolerated Unsanctioned On-prem users
7
The Overlay (and Insufficient) Approach
Sanctioned Remote users CLOUD PROXY Pac File Merge Or Addt’l VPN Agent Tolerated Pac File Merge CLOUD PROXY Unsanctioned Log Forwarder On-prem users Traffic Forwarder AD Connector
8
The Overlay Approach Does Not Scale
Sanctioned Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent CLOUD PROXY Tolerated CLOUD PROXY Unsanctioned Evasion tools
9
Palo Alto Networks’ Platform Approach
Monitor and control in-cloud activity with Aperture Sanctioned Remote users Complete visibility and control for remote users via GlobalProtect Tolerated Complete visibility and control for on premise activity with PAN-OS Next Generation Firewall Unsanctioned On-Prem users
10
344 KB slideshare-uploading PowerPoint slideshare prodmgmt HTTP
application function PowerPoint file type “Confidential and Proprietary” content slideshare application 344 KB prodmgmt group HTTP protocol file-sharing URL category mjacobsen user SSL protocol canada destination country source IP destination IP TCP/443 destination port
11
Discover Cloud Apps and Assess Risk
SaaS Usage Reporting Interactive SaaS Dashboard
12
Aperture Security Components
DLP Malware Prevention User Anomalies and Activity Monitoring Machine Learning Control third-party apps Cloud Asset and Risk Discovery
13
Comprehensive Cloud App Coverage
API-BASED INLINE 2500+ APPS (SAAS AND NON-SAAS)
14
Comprehensive Protection for Microsoft Environments
In the Cloud Securely enable Office 365 and Azure migrations Protect cloud environments from threats Prevent data loss in Office 365 On the Network Next-generation firewall; appliance or virtualized Securely enable Microsoft applications Prevent known and unknown threats On the Endpoint Enforce policy consistency for all users and devices Prevent known and unknown threats
15
Please evaluate this session
Tech Ready 15 9/20/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
16
http://go.paloaltonetworks.com/secureo365 9/20/2018 9:21 AM
© Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
17
9/20/2018 9:21 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
18
Backup
19
Aperture For Cloud-based Email
Security Threat Prevention and DLP 0-Day Malware detection tied to WildFire Detection of sensitive content and exposure Activity monitoring and anomalies Controls Monitoring Detection of auto-forwarding to untrusted domains Detection of Public Folders Detection of Retention Policy Violations APERTURE THREAT INTELLIGENCE CLOUD
20
Aperture For SharePoint & OneDrive
Protect against Data exfiltration Detection of sensitive content Activity monitoring and anomalies Monitor SharePoint Sites Users OneDrive Folders Remediate accidental exposure Stop Malware Propagation Detect Malware Quarantine APERTURE THREAT INTELLIGENCE CLOUD
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.