Download presentation
Presentation is loading. Please wait.
Published byDarcy Garrett Modified over 6 years ago
1
Microsoft Confidential – for internal only use by partners.
Name Date Security and Compliance Microsoft Confidential – for internal only use by partners. Partner Opportunity Microsoft Confidential – for internal only use by partners.
2
Microsoft Confidential – for internal only use by partners.
4.2 billion Customer records compromised1 Add insufficient staff expertise and increased compliance obligations through regulations like GDPR… Who will fill the gap? Partners. 99 days From breach to detection2 $17 million Average cost of a security breach3 As companies embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest challenges in digital transformation is ensuring security, privacy & compliance. Beyond the statistics you see here, the situation is complicated for most customers. Many are: Lacking the security talent to get ahead of security and compliance risks Unable to identify, assess, and mitigate security risks Unfamiliar with security best practices and the overall threat landscape Confused with many offerings and features Unable to correctly respond to compliance obligations in a timely fashion Customers need help from partners. ¹Source: ²Source: March 2017 ³Source: Cyber crime--a risk you can manage: Information management and governance to protect business innovation business white paper Date: November 2016 Microsoft Document: Office 365 Security and Compliance Infographic, CDOC EBC Presentation Microsoft Confidential – for internal only use by partners.
3
Security spending is split between products and services2
Microsoft Inspire 9/23/2018 2:53 AM The partner opportunity with Microsoft 365 IT security budgets1 are steadily increasing for organizations with over 1,000 employees Security spending is split between products and services2 28% Products 23% 22% The IT spend on security is increasing Security budget has been increasing year over year IDC just published a 2017 report stating that the WW IT spend will reach $80B Services 2014 2015 2016 1Forrester’s Security Budgets 2017: Increases Help But Remain Reactionary, Jeff Pollard, Nov 23, Forrester’s The State of Security Services 2016, Jeff Pollard, August 4, 2016 Microsoft Confidential – for internal only use by partners. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
Microsoft 365 Microsoft 365 Microsoft 365
An integrated solution includes Office 365, Enterprise Mobility + Security, and Windows 10 Enterprise that empowers everyone to be creative and work together, securely. Formerly SECURE PRODUCTIVE ENTERPRISE, a complete, intelligent solution designed for Enterprise customers with more complex IT environments and compliance needs. Microsoft 365 Enterprise Combines Office 365 with device management and security solutions. Best for small and medium businesses without formal IT and infrastructure. (coming soon.) Microsoft 365 Business Microsoft 365 is a new solution that combines software, management, and security options into a single subscription. Partners can choose from two solutions, Microsoft 365 Enterprise and Microsoft 365 Business. Both options provide productivity and security capabilities and a cohesive experience across applications and devices, while simplifying delivery and management for IT. Microsoft 365 Enterprise Includes Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security. It’s available in two plans, as Microsoft 365 E3 and Microsoft 365 E5. Microsoft 365 Business Includes Office 365 Business Premium, security and management features for Office apps and Windows 10 devices, upgrade rights to Windows 10, and a centralized IT console. It’s designed for small and medium-sized businesses. Build your practice Managed Services: Accelerate cloud migration by using Microsoft security solutions such as EM+S, Office 365, and Windows 10 Enterprise. Seize compelling events such as GDPR and solve emerging cybersecurity threats. Differentiate your offering: Help customers interpret and respond to risks surfaced from threat detection dashboards, and empower your customers with data-driven insights with tailored solutions build on analytical platforms Increase deal size: Microsoft 365 expands the Total Addressable Market for partners by providing advanced security and compliance capabilities that provides an end-to-end solution. Microsoft Confidential – for internal only use by partners.
5
Unique customer value-creating opportunities
Microsoft Inspire 9/23/2018 2:53 AM Unique customer value-creating opportunities Build your business with a Microsoft 365 Security and Compliance Practice: Collaboration Microsoft 365 powered device Security and Compliance Cloud Voice We’re making investments in several different areas to accelerate your success. We’ll support each of the four partner practice areas with training and more. We’re aligning partner & customer strategies, bolstering partner co-selling with a simpler field engagement model. We’ll provide helpful business insights, for example: the Forrester Total Economic Impact study, a Gartner Industry study, and the Security Partner Playbook. You’ll also have access to a new set of tools, including the GDPR Assessment, and an Office 365 Adoption content pack. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
How are we helping you Ways to build your business What we’re doing
Grow with Managed Services: Modernize your customer’s environment, leading with security Differentiate your offering: Offer advanced enterprise services to help customers respond to risks Increase deal size: Elevate the customer conversation by leveraging the broad value of Microsoft 365 New assessment tools for pre-sales conversation starters and to offer as a service More investments in security partner digital training & people to help your build your business around security New assets specifically tailored for today’s hot topic: GDPR Industry research to inform your strategy and decision making Accelerate customer success through partner-led deployment with FastTrack led support Build your practice Managed Services: Accelerate cloud migration by using Microsoft security solutions such as EM+S, Office 365, and Windows 10 Enterprise. Seize compelling events such as GDPR and solve emerging cybersecurity threats. Differentiate your offering: Help customers interpret and respond to risks surfaced from threat detection dashboards, and empower your customers with data-driven insights with tailored solutions build on analytical platforms Increase deal size: Microsoft 365 expands the Total Addressable Market for partners by providing advanced security and compliance capabilities that provides an end-to-end solution. Microsoft Confidential – for internal only use by partners. “… All of our customers are starting to use our security managed services.” - A Microsoft partner
7
Microsoft: the security and compliance vendor your customers need
“…makes delivery easier than in the past when we had to talk about many different security vendors and integrate them all together. Customers are surprised to hear how many security solutions Microsoft has.” - A Microsoft partner Microsoft: the security and compliance vendor your customers need While a customer’s complete security environment will include a mix of solutions from different vendors, you can feel confident with Microsoft at the heart of your offering. We’re on your side, with: Solutions built secure from the bottom up Over 3,500 people dedicated to security – more than most governments, let alone companies Internal spending of ~$1B/year on security internally Applied intelligence based on trillions of signals across all Microsoft services And of course: Microsoft 365—an integrated, end-to-end security and compliance solution Microsoft Confidential – for internal only use by partners.
8
Top Microsoft 365 security and compliance scenarios for partners
Ensuring security and compliance is key to customers’ digital transformation. As an end-to-end solution, Microsoft 365 offers a comprehensive set of features and unique intelligence across critical end-points in today’s mobile-first, cloud-first world. Enterprise-Level Identity Protection Implement and manage cloud identity and access. Audit and mitigate use of cloud apps. Control and Protect Information Proactive Attack Detection and Prevention Regulatory compliance Help customers with increased demands of regulators and legal authorities in every country in which they operate. Assess and classify customer data. Implement and manage information policies and procedures. Perform security assessment analysis, migrate and deploy security solutions and provide managed security services.
9
Enterprise-level Identity Protection
10
Enterprise-level identity protection
Help enterprises enable users while protecting organization data from unauthorized access and identity threats. Safeguard and manage identity: With Microsoft 365, partners can help customers protect identities and proactively prevent compromised identities from being abused. Detect and respond to identity-based threats: Partners can use tools in Microsoft 365 to help their enterprise customers manage cloud activities more securely. Protect against password attacks: Microsoft partners can help customers replace passwords with strong two-factor authentication, and better protect credentials against persistent threats. SAFEGUARD AND MANAGE IDENTITYMost security breaches occur when attackers steal a user’s identity. Once an attacker hacks even low privileged user accounts, it‘s relatively easy for them to gain access to important company resources through lateral movement. With Microsoft 365, partners can help customers protect identities and proactively prevent compromised identities from being abused. DETECT AND RESPOND TO IDENTITY-BASED THREATS Partners can use tools in Microsoft 365 to help their enterprise customers manage cloud activities more securely. Customers can define policies and alerts, learn about cloud usage in their organizations, manage apps, and get information you needed to learn, analyze, and identify suspicious user or device behavior. PROTECT AGAINST PASSWORD ATTACKS Password-based protection exposes businesses to risky user behavior, including recycled and easily hacked passwords. Today’s modern workplace calls for modern credential verification tools. Microsoft partners can help customers replace passwords with strong two-factor authentication, and better protect credentials against persistent threats. Windows 10 Office 365 Enterprise Mobility + Security Protect user identities to help prevent theft and misuse Enhance visibility to help identify abnormal usage Identity and access management from the cloud Microsoft 365
11
Enterprise-level identity protection
With Microsoft 365, you can equip your customers to better manage their identity and access controls, and stop breaches before they escalate in severity. Determine if your customer needs help securing the front door: Do they know who is accessing their data? Can they grant access based on risk in real time? Can they quickly identify and react to a breach? Are users empowered to work securely anywhere at any time? of phishing attacks that led to a breach were followed by some form of software installation1 95% of individuals use only 3 or 4 passwords across all of their accounts2 75% of all hacking-related breaches use compromised credentials1 81% of phishing attack victims fall victim a second time1 15% 1 Verizon 2017 Data Breach Investigations Report (ref. P11 of Security Playbook) 2 Security Week Survey (ref. P35 of Security Playbook)
12
Enterprise-level identity protection
Microsoft 365 products and services can help you develop solutions for a security practice focused on enterprise-level identity protection. Azure Active Directory — Manage and control access to corporate resources In a mobile-first, cloud-first world, IT professionals need to protect corporate assets while empowering user productivity at any location at any time. Windows Hello — Authenticate identities without passwords Password authentication is not sufficient to keep users safe. Users reuse and forget passwords. Passwords are vulnerable and difficult for users to employ. Credential Guard — Protect derived domain credentials Systems are vulnerable to “pass the hash” attacks that exploit user credentials after users have logged in. Conditional Access — Control access to apps based on specific conditions Enterprises need control to allow the right people to access resources under certain conditions while blocking access under other circumstances. Cloud App Security — Enterprise-grade security for your cloud apps Bring security capabilities to SaaS cloud applications to gain better visibility and enhanced protection against cloud security issues. Manage a single identity for each user and provide single sign-on access across your entire enterprise. Employ Privileged Identity Management to provide on-demand administrator rights. Enforce rules-based Multi-Factor Authentication for both on-premises and cloud applications. Improve user productivity with self-service password reset. - Use biometrics (face recognition or fingerprint) to login quickly and securely. Use companion devices that have already certified your identity to unlock your PC. Isolate credentials so that only privileged system software can access them. Implement a policy-based approach based on your access requirements. Conditional access policies define what should happen when condition statements have been satisfied. Discover all the cloud apps in your network, gain visibility into shadow IT, and assess risk — no agents required Shape your cloud environment with granular controls and policy setting for access, data sharing, and DLP Identify high-risk usage and security incidents, detect abnormal user behavior, and prevent threats
13
Enterprise-level identity protection
Microsoft 365 Enterprise tools The Microsoft Partner Network offers tools to help you build threat detection and prevention into your security practice with Microsoft 365. Enterprise Mobility Assessment Identify customers’ strengths and uncover hidden gaps and potential vulnerabilities within the mobility landscape. Security Assessment Tool (coming soon) Online resource designed for partners to help scope customer’s security maturity and/or gaps. Office 365 Security Assessment Identify customer’s security objectives and requirements and help them create a prioritized and actionable security roadmap for Office 365. The assessment uses Office 365 Secure Score as the primary tool and includes readiness content which can be customized on a per engagement basis.
14
Enterprise-level Identity Protection
Microsoft 365 Enterprise-level Identity Protection Build your Identity and Access Management practice with the resources listed here: Understanding the business opportunity Develop your skills and business plan Launch your practice Grow your practice Business opportunities Download the Windows 10 Security infographic here Introduction to Enterprise Mobility + Security blog post here Watch the Identity in Office 365 for business video here Explore multi-factor authentication for Office 365 here Watch an overview video of Cloud App Security here Get the complete Security Practice Development Playbook here See more partner readiness materials on the Microsoft partner portal here Learn about Microsoft 365 identity protection tools Microsoft Trust Center identity and access management overview here Deep dive into Credential Guard video Conditional access in Azure Active Directory here Azure Active Directory Identity Protection here Implementing strong user authentication with Windows Hello here Build your skills Explore Security and Compliance with EMS here Customer-ready information Forrester’s Risk-Driven Identity and Access Management Process Framework here Identity-driven security webinar available here Tools for you Enterprise Mobility Assessment here Security Assessment Tool (coming soon) Office 365 Security Assessment here Engage with customers Campaign assets will be provided in September 2017 Tools to use with your customers Share the Infographic: Is your company data secure, available here Share the Cloud App Security infographic available here Learn more at:
15
Control and Protect Information
16
Control and protect information
Help enterprise customers protect business data while enabling user productivity and collaboration across devices and locations. Manage cloud application usage: Today’s organizations require the security of on-premises systems for cloud applications. Protect against data leakage: Enterprises need control over the access to information, no matter where it’s stored or who it’s shared with. Protect against malware and phishing attacks: New malware threats arise every day, creating a need to help protect your customers’ mailboxes against new, sophisticated attacks. Respond to security incidents: With the tools available in Microsoft 365, partners can help them streamline and speed up document reviews and improve adherence to data retention policies. Manage cloud application usage Today’s organizations require the security of on-premises systems for cloud applications—both approved and unapproved—for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. Protect against data leakage Enterprises need control over the access to information, no matter where it’s stored or who it’s shared with. They need the ability to maintain control of enterprise data without degrading the user experience, and they need to prevent the disclosure of sensitive information. Protect against malware and phishing attacks New malware threats arise every day, creating a need to help protect your customers’ mailboxes against new, sophisticated attacks in real time. Respond to security incidents Organizations need tools in place to help them respond quickly when a breach occurs. With the tools available in Microsoft 365, partners can help them streamline and speed up document reviews and improve adherence to data retention policies. Windows 10 Office 365 Enterprise Mobility + Security Fundamental protection of business data across devices and locations Advanced detection, protection, and monitoring of sensitive information Advanced classification and security for sensitive information — virtually anytime, anywhere Microsoft 365
17
Average cost of data breach for surveyed companies2
Control and protect information With Microsoft 365, you can help your customers employ tools that will better protect business data, guard against accidental sharing of sensitive information, protect data in cloud applications, and improve compliance. Determine if your customer needs help securing their information: Is their data secured regardless of where it’s stored or shared? Does a data compliance policy control access to sensitive information? How easily can they respond to eDiscovery requests? Can users meet all compliance obligations without interrupting their workflow? Do they have the ability to classify and encrypt sensitive data? of survey responders say their outdated information security controls or architecture are a high area of vulnerability.1 48% $158 $158 of organizations surveyed feel they are losing control over their data.1 88% $4M cost incurred for each lost or stolen record containing sensitive and confidential information.2 Average cost of data breach for surveyed companies2 EY Global Information Security Survey Ponemon Institute Cost of a Data Breach Study
18
Control and protect information
Microsoft 365 products and services can help you develop solutions for a security practice focused on controlling and protecting information. Office Advanced Security Management — Enhanced visibility and control Azure information protection — Better secure sensitive information — anytime, anywhere Gain insight into suspicious activity in Office 365 so you can investigate potential problems and take action to address security issues. Enterprises need control over the access to information, no matter where it’s stored or who it’s shared with. Cloud app security — Enterprise-grade security for your cloud apps Advanced Compliance — Meet compliance obligations, establish policies, and simplify access Bring security capabilities to SaaS cloud applications to gain better visibility and enhanced protection against cloud security issues. As digital content multiplies, organizations need tools to help meet compliance obligations, manage complex corporate data, and respond to security incidents. Office 365 Advanced Security Management — Enhanced visibility and control Gain insight into suspicious activity in Office 365 so you can investigate potential problems and take action to address security issues. See how your organization's data in Office 365 is accessed and used. Control access to Office 365 data on mobile devices/apps. Define policies that trigger alerts for atypical or suspicious activities, require users to log back in to Office 365 apps after an alert has been triggered, and suspend user accounts exhibiting suspicious activity. Advanced Compliance — Meet compliance obligations, establish policies and simplify access As digital content multiplies, organizations need tools to help meet compliance obligations, manage complex corporate data, and respond to security incidents. Demonstrate procedures for explicit access authorization to customer content to meet compliance obligations. Use predictive technology to retrieve documents more efficiently. Leverage intelligence to automate data retention. Develop policy recommendations based on behavioral analysis and machine learning. Data Loss Prevention — Create policies to Identify, monitor, and protect sensitive data To comply with business standards and industry regulations, organizations need to protect and prevent the disclosure of sensitive information such as financial data, credit card numbers, social security numbers, or health records. Identify sensitive information across many locations. Prevent the accidental sharing of sensitive information. Monitor and protect sensitive information in the fully installed versions of Excel 2016, PowerPoint 2016, and Word 2016. Help users learn how to stay compliant without interrupting their workflow. View DLP reports showing content that matches your organization’s DLP policies to assess how your policies are working. Azure Information Protection — Better secure sensitive information -- anytime, anywhere Enterprises need control over the access to information, no matter where it’s stored or who it’s shared with. Classify data based on sensitivity, encrypt sensitive data, and define usage rights. Apply protection without interrupting your employees’ normal course of work. Detailed tracking and reporting shows what’s happening with your shared data. Cloud App Security — Enterprise-grade security for your cloud apps Bring security capabilities to SaaS cloud applications to gain better visibility and enhanced protection against cloud security issues. Discover all the cloud apps in your network, gain visibility into shadow IT, and assess risk — no agents required Shape your cloud environment with granular controls and policy setting for access, data sharing, and DLP Identify high-risk usage and security incidents, detect abnormal user behavior, and prevent threats Microsoft Intune — Meet your data protection needs while delivering the best user experience Flexible mobile device and app management controls let employees work with the devices and apps they choose while protecting company information. Help users stay productive and secure on whatever device they choose. Set granular app policies to control data access and use. Secure your data with flexibility and control, even when navigating complex device landscapes. Windows Information Protection — Integrated protection against accidental data leaks Maintain control of enterprise data without degrading the user experience Maintain separation between personal and corporate data, without requiring users to switch environments or apps. Wipe corporate data from devices while leaving personal data intact. Integrate with your existing management system Azure Information Protection and Office 365 can be used to add advanced information protection capabilities Microsoft Intune — Meet your data protection needs while delivering the best user experience Data loss prevention — Create policies to Identify, monitor, and protect sensitive data Flexible mobile device and app management controls let employees work with the devices and apps they choose while protecting company information. To comply with business standards and industry regulations, organizations need to protect and prevent the disclosure of sensitive information such as financial data, credit card numbers, social security numbers, or health records. Windows information protection — Integrated protection against accidental data leaks Maintain control of enterprise data without degrading the user experience.
19
Control and protect information
Microsoft 365 Enterprise tools The Microsoft Partner Network offers tools to help you build threat detection and prevention into your security practice with Microsoft 365. Shadow IT workshop (coming soon) Three day workshop designed for partners to helps customers discover all cloud use in their organization, including Shadow IT reporting and control and risk assessment using the Cloud App Security tool. Security Assessment Tool (coming soon) Online resource designed for partners to help scope customer’s security maturity and/or gaps. Office 365 Security Assessment Identify customer’s security objectives and requirements and help them create a prioritized and actionable security roadmap for Office 365. The assessment uses Office 365 Secure Score as the primary tool and includes readiness content which can be customized on a per engagement basis.
20
Control and Protect Information
Microsoft 365 Control and Protect Information Build your Identity and Access Management practice with the resources listed here: Understand the business opportunity Develop your skills and business plan Launch your practice Grow your practice Business opportunities Download the Windows 10 Security infographic here Review the Office 365 overview of data loss prevention policies here Get the complete Security Practice Development Playbook here Explore the Microsoft Intelligent Security Graph here See more partner readiness materials on the Microsoft partner portal here Learn about Microsoft 365 data protection tools Get an overview of protecting data with Microsoft cloud services in the Microsoft Trust Center here Explore Azure Information Protection here Introducing Windows Information Protection blog post here Using Office 365 Customer Lockbox here Build your skills Review M365 learning path on security on Partner University coming soon. Customer-ready information Campaign assets will be provided in September 2017 Tools for you Shadow IT workshop (coming soon) Security Assessment Tool (coming soon) Office 365 Security Assessment here Engage with customers Tools to use with your customers Enterprise Mobility + Security infographic available here Learn more at:
21
Proactive attack detection and prevention
22
Proactive attack detection and prevention
Help your customers remain constantly aware of the current threat landscape to help identify attacks and attackers before they cause damage or disruption. Risk assessment: Perform a security assessment analysis to help understand security risks, formulate policies and plan for improvement. Manage mobile productivity: Secure access to the cloud helping to protect data on unmanaged devices. Safeguard messaging: Deliver zero-day protection to help guard against unknown malware and viruses. Detect and respond to suspicious activity: Use artificial intelligence and machine learning to help identify high-risk activity and quickly respond to contain attacks before damage occurs. Protect, detect and respond to advanced threats: Uses artificial intelligence, machine learning, and other means to help prevent successful attacks, identify high-risk activity and quickly respond to contain attacks before damage occurs. Windows 10 Office 365 Enterprise Mobility + Security Secure devices with a comprehensive set of defenses and management capabilities that can help protect, detect and respond to advanced attacks Reduce the threat of malicious content and help identify abnormal usage, security incidents, and threats Protect user identities, help identify high-risk usage and guard against advanced attacks in the cloud and on-premises Microsoft 365
23
Proactive attack detection and prevention
With Microsoft 365, you can build a practice that helps your customers proactively guard against threats, use advanced analytics to identify breaches and threats, and automate responses to threats enterprise wide. Determine if your customer needs help with threat protection: Do they have tools that allow them to automatically detect high-risk usage? Are they leveraging machine learning to uncover suspicious activities? Are they able to easily access reporting to find patterns that reveal threats? Can they automatically guard users against phishing attacks and dangerous links? How quickly can they react after a breach has been detected? Ransomware attacks per day in 20162 4,000 Losses from ransomware in 20161 $1B Of cyberattacks start with a phishing 3 91% $1T $1T Cumulative global spending on cybersecurity products and services over the next five years,4 ` 4
24
Proactive attack detection and prevention
Microsoft 365 products and services can help you develop solutions for a security practice focused on threat protection. Office 365 Advanced Threat Protection Azure Security Center - Increased visibility and control over the security of your Azure resources As hackers launch increasingly sophisticated attacks, organizations seek tools that provide stronger protection against specific types of advanced threats. Today’s threats call for an integrated, analytics-driven solution that helps enterprises stay ahead of current and emerging cloud threats to secure their data and users, and to remediate issues and recover quickly. Office 365 Threat Intelligence — Proactive help to find and eliminate threats Windows Defender Advanced Threat Protection — Detect, investigate and respond to advanced attacks. Leverage a vast repository of threat intelligence data to help enterprises spot patterns that correspond to attack behaviors and suspicious activity. As cyberattacks become more sophisticated and targeted, even the best endpoint defenses will be breached, eventually. Enterprise customers need tools that help them detect, investigate, and respond to advanced attacks and data breaches on their networks. Office 365 Advanced Threat Protection As hackers launch increasingly sophisticated attacks, organizations seek tools that provide stronger protection against specific types of advanced threats. Zero-day protection against unknown malware and viruses to safeguard messaging Real-time, time-of-click protection against malicious hyperlinks in a message. Rich reporting and URL trace capabilities help admins gain critical insights into who is getting targeted and the category of attacks they’re facing Office 365 Threat Intelligence — Proactive help to find and eliminate threats Leverage a vast repository of threat intelligence data to help enterprises spot patterns that correspond to attack behaviors and suspicious activity. Use the Threat dashboard to see threats that have already been handled, and to report what Threat Intelligence has done to secure the business. Use the Threat explorer to analyze the volume of attacks, and explore this data by threat families, attacker infrastructure, and more. Mark suspicious s for further investigation. Office 365 Security and Compliance Center — Protect data in Office 365 Enterprise customers need help managing compliance features across Office 365. Use a one-stop portal to help address data protection or compliance needs, or to audit user activity. Manage compliance for use of organization data across Office 365. Manage eDiscovery searches and holds, access for mobiles devices, and more. Microsoft Advanced Threat Analytics — Detect suspicious activity quickly Given the rapidly changing threat landscape, enterprises need tools that provide a succinct, real-time view of attacks, and identify suspicious user or device behavior. Detect threats fast with behavioral analytics and keep pace with attackers with continually updated learning that adapts to the changing nature of your users and business. Focus on only important events and review attack timelines for a clear view of suspicious activity or persistent threats. Get alerts only after suspicious activities are contextually aggregated and verified to reduce false-positive fatigue. Prioritize and plan for next steps with recommendations for investigation and remediation of each suspicious activity. Azure Security Center — Increased visibility and control over the security of your Azure resources Today’s threats call for an integrated, analytics-driven solution that helps enterprises stay ahead of current and emerging cloud threats to secure their data and users, and to remediate issues and recover quickly. At a glance, verify that the appropriate security controls are in place and configured correctly, and quickly identify any resources that require attention. Prevent, detect, and respond to cloud security threats with policy-driven monitoring of security configurations. Easily deploy integrated security solutions. Find threats with behavioral analysis based on global intelligence and expertise. Respond to incidents quickly with insights into attacks and suggestions for remediation. Windows Defender Advanced Threat Protection — Detect, investigate and respond to advanced attacks. As cyberattacks become more sophisticated and targeted, even the best endpoint defenses will be breached, eventually. Enterprise customers need tools that help them detect, investigate, and respond to advanced attacks and data breaches on their networks. Use advanced behavioral analytics and machine learning to detect zero-day attacks. Visually investigate forensic evidence across your endpoints to easily uncover scope of breach. Instantaneously search and explore historical data across endpoints. Quickly respond to contain the attack and prevent reoccurrence. Windows Defender Security Center Businesses need easier ways to view and control security protections. Now businesses have visibility into the device endpoint security. "Windows Defender Security Center gives complete visibility into the device endpoint security" - visibility into the organization’s security posture, insights into the overall organizational security score -provides guided recommendations to improve the security - Quickly assess the scope of incidents and root causes - Rich toolset for investigation and remediation actions - Recommendations driven by your device endpoints for enhanced security - Every alert comes with recommendation for remediation for threats and future risks - Assess organizational security score including trends over time Cloud App Security Discover cloud apps in a network, gain visibility into Shadow IT and assess risks – no agents required. Shape cloud environments with granular controls and policies for data sharing, data loss prevention. Identify high-risk usage and cloud security issues, detect abnormal user behavior, prevent threats. Office 365 Security and Compliance Center — Protect data in Office 365 Enterprise customers need help managing compliance features across Office 365. Windows Defender Security Center Businesses need easier ways to view and control security protections. Now businesses have visibility into the device endpoint security. Advanced threat analytics — Detect suspicious activity right away Cloud App Security Given the rapidly changing threat landscape, enterprises need tools that provide a succinct, real-time view of attacks, and identify suspicious user or device behavior. Gain visibility into Shadow IT and assess risks, help to detect abnormal user behavior and prevent threats.
25
Proactive attack detection and prevention
Microsoft 365 Enterprise tools The Microsoft Partner Network offers tools to help you build threat detection and prevention into your security practice with Microsoft 365. Office 365 Secure Score Analyze the security position of customers with a Microsoft 365 commercial plan, assign a score, and make recommendations. Office 365 Secure Score Assessment IP Kit Collect Secure Score data, will full integration into the Microsoft Graph Coming soon! Ransomware Assessment Protection against ransomware on the Microsoft enterprise platform workshop. Focus: understanding customer gaps, creating a roadmap. Covers Exchange Online ATP, CAS, Windows Defender ATP, and Applocker. Security Assessment Tool Online resource designed for partners to help scope customer’s security maturity and/or gaps. Windows Defender ATP Partner Modeling Tool Understand the profitability drivers of adding a threat monitoring business based on Windows Defender ATP.
26
Proactive attack detection and prevention
Microsoft 365 Proactive attack detection and prevention Build your Threat Detection and Prevention practice with the resources listed here: Understand the business opportunity Develop your skills and business plan Launch your practice Grow your practice Business opportunities Explore Office 365 Advanced Security Management here Get an overview video and datasheet for Advanced Threat Analytics here Get top 10 insights from the Microsoft Security Intelligence Report here Get the complete Security Practice Development Playbook here Explore the Microsoft Intelligent Security Graph here See more partner readiness materials on the Microsoft partner portal here Learn about Microsoft 365 identity protection tools Review the Microsoft Trust Center overview of threat management here Explore Advanced Threat Analytics here Review Office 365 Advanced Threat Protection here Review an overview of the Office 365 Security & Compliance Center here Explore Windows Defender Advanced Threat Protection here Review the Office 365 Threat Intelligence overview here How to pitch the value of Advanced Threat Protection here Enterprise Mobility and Security Blog here Build your skills Explore the Azure Security Center here Learn how to enhance management of your EMS environment here Customer-ready information Customer success stories will be provided in September 2017 Tools for you Use Office 365 Secure Score here (admin only) and conduct a customer risk assessment to identify potential threats and compliance risks. Windows Defender ATP Partner Modelling Tool can be used to understand the profitability drivers of adding a threat monitoring business based on Windows Defender Advanced Threat Protection (WDATP) Ransomware Assessment (coming soon) Office 365 Security Assessment here Engage with customers Campaign assets will be provided in September 2017 Tools to use with your customers Protect Your Data: 7 Ways to Improve Your Security Posture ebook here Kuppinger Cole Analyst Report: Microsoft Advanced Threat Analytics—Executive View here Learn more at:
27
Regulatory Compliance
Continue to look for alt photo
28
Regulatory Compliance
Customers need help with the burden of compliance and the increased demands of regulators and legal authorities in every country in which they operate. Laws and regulations can be outpaced by new technology as governmental bodies are faced with the difficult task of regulating new technologies. We all have to ensure our organizations can take advantage of innovative technologies for growth and success, while managing risks. “We need to enable our customers to deploy our cloud services with the highest confidence that they are safe and compliant around topics like data security; personal information privacy; compliance with the EU-U.S. Privacy Shield and the EU General Data Protection Regulation; compliance with regulations governing the financial services, health care, government, and education sectors; and how we will stand with our customers on the issues of government access and encryption.” To start, we will be focusing on how we enable partners and customers to be ready for GDPR, with more tools and information to come. For the latest information and assets, visit the Microsoft 365 Security and Compliance Partner Portal. At Microsoft we know that we won’t succeed in empowering every person and organization on the planet to achieve more through technology, if we don’t earn the trust of the legal and compliance community. We are therefore redoubling our efforts to provide the tools legal and compliance professionals need to achieve and maintain compliance. …the overriding sentiment I heard from senior legal and compliance professionals was: help us address the heavy burden of compliance as we grapple with the demands of regulators and legal authorities in every country in which we operate. …technology has to a large extent outpaced the laws that govern so many aspects that are essential to global commerce and innovation. As governments around the world face the difficult task of regulating new technologies and striking the right balance for example between public safety and the right to privacy, legal and compliance professionals have found themselves at the centre of this debate. Laws and regulations that govern many aspects of global commerce and innovation can be outpaced by new technology. Often, legal and compliance professionals have found themselves at the center of debate and ambiguity as governmental bodies are faced with the difficult task of regulating new technologies. Technology change is not a new issue for lawyers. The early years of virtually every transformative technology– railroads, telegraph, telephone, radio and television, the personal computer – have always been characterized by a time of uncertainty over regulatory issues and questions about technology’s impact on society. Regulatory equilibrium is eventually restored. But in the transition, we all have to ensure our organizations can take advantage of innovative technologies for growth and success, while managing risks. At Microsoft we understand that it is our responsibility to provide tools and information that will enable our customers to deploy our cloud services with the highest confidence that they are safe and compliant. This is why we arecommitted to providing the tools legal and compliance professionals need to achieve and maintain compliance. Indeed, events like the ones this week are designed to discuss the urgent compliance issues around such areas as data security; personal information privacy; compliance with the EU-U.S. Privacy Shield and the EU General Data Protection Regulation; compliance with regulations governing the financial services, health care, government, and education sectors; and how we will stand with our customers on the issues of government access and encryption November 10, Dervish Tayyip - Assistant General Counsel, Microsoft With Office 365, we offer a range of compliance features, including data loss prevention (DLP), eDiscovery, and auditing and reporting functionality. Across these capabilities, the user experience is preserved and productivity is not affected, leading to greater user acceptance. Operating a global cloud infrastructure creates a need to meet compliance obligations and to pass third-party audits. Auditable requirements come from government and industry mandates, internal policies, and industry best practices. Continuous compliance refers to our commitment to evolve the Office 365 controls and stay up to date with IT standards and regulations. As a result, Office 365 has obtained independent verification, including ISO 27001, ISO 27018, and SSAE 16 audits; is able to transfer data outside of the European Union through the EU Model Clauses; is willing to sign a HIPAA Business Associate Agreement (BAA) with all customers; has received authority to operate from a U.S. federal agency under FISMA; and has disclosed security measures through the Cloud Security Alliance’s public registry. Office 365 extends the controls implemented to meet these standards to customers who are not necessarily subject to the respective laws or controls. Security in office 365 Whitepaper Document Location: Document Feedback: November 10, Dervish Tayyip - Assistant General Counsel, Microsoft
29
“Security sells, so we’re transitioning from managed services to managed services and security, and we’re taking our customers with us.” Bruce WArd, Vice President of Business Strategy Peters & Associates
30
Partner with us on security
Microsoft Inspire 9/23/2018 2:53 AM Partner with us on security Build a practice learn more at: Sell it right. Leverage Business Value Tools with your customer: Drive customer success and learn how to leverage FastTrack IPs: Microsoft 365 Microsoft 365 Security and Compliance Partner Portal Business Value Tools FastTrack Partner Opportunity Become an official partner at the MPN Community: MPN Community Checkout free training on the Learning Portal: Microsoft Partner Network Learning Portal Join the conversation on the Partner Yammer group: Readiness and skill Microsoft 365 Security and Compliance Partner Yammer Group © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.