Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobility Workshop Microsoft Mobility + Security Vision

Similar presentations


Presentation on theme: "Mobility Workshop Microsoft Mobility + Security Vision"— Presentation transcript:

1 Mobility Workshop Microsoft Mobility + Security Vision

2 The security landscape has changed
Identity Devices Apps + Data Shadow IT Cloud apps SaaS Azure Employees Partners Customers Data breach Identity breach On-premises apps Transition to cloud & mobility New attack landscape Current defenses not sufficient

3 Is it possible to enable a mobile workforce?
Is it possible to manage and stay secure? Lost device Users Data leaks Data Business partners Apps Compromised identity The mobile-first, cloud-first world presents significant challenges for IT. They must ensure that that their data is save against data leaks (both malicious or accidental), lost or stolen devices, exploited or compromised identities, or stolen credentials just to name a few. While protecting against these threats IT has to enable usage across more than just mobile devices. IT has to ensure they have protection and management across users’ identity, devices (both mobile and PC), application and the data itself. Today most organizations use point solutions to manage only portions of the ecosystem. Moving forward organizations must enable holistic protection across all of these vectors with ever more unified tools and solutions. Customers Devices Employees Stolen credentials

4 Is it possible to keep up?
The Microsoft vision Users Secure and protect against new threats Data Best productivity experience Apps IT cannot afford to live in the past. Successful businesses of today (and tomorrow) realize the power of mobility to support employee productivity and collaboration. You need to prepare to mitigate the risks of providing freedom and space to your employees. You need to meet compliance and regulatory standards, maintain company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience, so that they’re motivated to follow protocol. You need an enterprise mobility partner that can help you achieve all of this, so that everyone is a winner, and your business stays out of the headlines. Microsoft’s vision includes management and protection across four key layers: users, device, app, and data – for both your employees, business partners, and customers. Our strategy is to ensure management across these layers while ensuring your employees, business partners, and customers by providing access to everything they need from everything; protecting corporate data across and collaboration apps all while integrating these new capabilities with what customers already have like Active Directory and System Center. Employees Business partners Customers Devices Comprehensive and integrated

5 Digital Transformation
Organisations need... Security against new threats User freedom To do more with less ENTERPRISE MOBILITY + SECURITY Protection for users and their identity Productivity without compromise Work with what you have today Mobility tools are often point solutions that address specific security needs, but even multiple point solutions are still disconnected from one another, leaving cracks. Microsoft believes you should have an integrated mobility solution that provides security across multiple layers. You should have a comprehensive set of tolls that use identity as a control plane, provide the visibility and insights required to quickly pinpoint and resolve issues or threats, and simplify mobile device and application management. Identity-driven security. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity- based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline. Managed mobile productivity. Encourage your workers to use secure applications for work — even on personal devices — by providing the Office tools they know and love. Management capabilities built into Office make it easier for IT to protect company information. Conditional access policies restrict actions such as copy, paste, edit, and save —ensuring that workers only access corporate files through approved, managed apps and not personal workarounds where information can be corrupted or leaked. Nobody manages Office better than Microsoft. Sharing is a mainstay of collaboration for the mobile workforce, but poses a serious challenge to security. Microsoft gives you another integrated approach to information protection with a layer of security at the file level. Encryption, rights management, and authorization policies can be applied to any file type and remain with the data, wherever it goes and even in motion. Only authorized users can access protected files, and only on the sender’s terms. Comprehensive Solution: Meet new business challenges with the flexibility of a cloud-first mobility solution. Microsoft cloud services are designed to work seamlessly with your on-premises infrastructure and existing investments. Stay ahead of your BYOD workers with rapid release cycles to support the latest devices and apps. Scale quickly to onboard new hires, devices, apps, and more. It’s fast, it’s cost-effective, and it’s always up-to-date. Manage across multiple OS types (iOS, Android, Windows) and thousands of cloud apps. Microsoft solution... Identity-driven security Comprehensive solution Managed mobile productivity

6 ENTERPRISE MOBILITY + SECURITY
Identity-driven security. Identity is the new control plane for security and management in the mobile-first, cloud-first world. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity-based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues. Identity-driven security Managed mobile productivity Comprehensive solution

7 Three steps to identity-driven security
1. Protect at the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Protect your data against user mistakes Gain deep visibility into user, device, and data activity on- premises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics. Safeguard your resources at the front door. Our solution calculates risk severity for every user and sign-in attempt, so risk-based conditional access rules can be applied to protect against suspicious logins. Protect your data against users mistakes: Gain deeper visibility into user, device, and data activity on-premises and in the cloud to create more effective, granular-level policies. Classify and label files at creation, track their usage, and change permissions when necessary. Detect attacks before they cause damage: Identify attackers in your organization using innovative behavioral analytics and anomaly detection technologies – all driven by vast amounts of Microsoft threat intelligence and security research data.

8 ENTERPRISE MOBILITY + SECURITY
Enterprise Mobility Suite (EMS) helps to provide employees with secure and seamless access to corporate and documents as well as familiar and productivity experiences with Office mobile apps such, as Outlook, Word, Excel, and PowerPoint. EMS helps protect corporate data on the device itself and beyond with four layers of protection—all without affecting the personal data on the device. IT can even manage these apps without requiring the device to be enrolled for management. Identity-driven security Managed mobile productivity Comprehensive solution

9 Mobile device, application, and information protection
MANAGED MOBILE PRODUCTIVITY Mobile device, application, and information protection Manage and secure devices Office mobile apps Data-level protection User self-service Protect your Office Mobile apps without compromising your Office experience: EMS is the only solution built with and for Microsoft Office. This means that and other Office files can be secured without compromising the Office experience – the gold standard of productivity. Enable easy access to resources: Sign in once for secure access to all corporate resources, on-premises and in the cloud, from any device. This includes pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps. Enable users to protect and control data: Employees can encrypt virtually any type of file, set granular permissions, and track usage. With Office files, encryption can be applied with just one click. The encryption stays with the file where it goes, enabling more secure file sharing, internally and externally. Empower users with self-service capabilities: Users can update passwords and join and manage groups via a single portal to help save your IT helpdesk time and money. This applies across all iOS, Android, and Windows devices in your mobile ecosystem.

10 ENTERPRISE MOBILITY + SECURITY
Identity-driven security Managed mobile productivity Comprehensive solution

11 Flexible architecture that just works
Microsoft Consumer Channels and Central Marketing Group 12/28/2018 COMPREHENSIVE SOLUTION Flexible architecture that just works Always up to date Real-time updates Keep up with new apps and devices Simple to set up and connect Easy, secure connections Simplified management Works with what you have Support multiple platforms Use existing investments © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 12/28/ :15 PM Microsoft one of the only vendors in ALL three Gartner Magic Quadrants: Client Management Tools1 Enterprise Mobility Management Suites2 Identity and Access Management as a Service3 1Gartner Magic Quadrant for Client Management Tools (June 2015) 2Gartner Magic Quadrant for Enterprise Mobility Management Suites (June 2016) 3Gartner Magic Quadrant for Identity and Access Management as a Service (June 2016) “EMS represents a comprehensive mobility security and management vision, and it positions Microsoft well for the future in this market.”2 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner Magic Quadrant for Enterprise Mobility Management Suites (June 2015) © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Windows 7 Security features
12/28/2018 Windows Update BitLocker Admin and Monitoring Trusted Platform Module Windows Firewall BitLocker SmartScreen BitLocker to Go Device protection Threat resistance Identity protection Information protection Breach detection investigation & response PRE-BREACH POST-BREACH © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

14 Windows 10 Security on Legacy or Modern Devices
(Upgraded from Windows 7 or 32-bit Windows 8) 12/28/2018 Windows Trusted Boot Windows Information Protection Windows Update Microsoft Edge Windows Hello Companion Devices BitLocker Admin and Monitoring Windows Defender Trusted Platform Module Windows Firewall Windows Hello BitLocker Windows Defender Advanced Threat Protection SmartScreen BitLocker to Go Device protection Threat resistance Identity protection Information protection Breach detection investigation & response PRE-BREACH POST-BREACH © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

15 Windows 10 Security on Modern Devices
(Fresh Install or upgraded from 64-bit Windows 8 ) 12/28/2018 Virtualisation Based Security UEFI Secure Boot Device Encryption Windows Trusted Boot Device Guard Credential Guard Windows Information Protection Security Management2 Windows Update Microsoft Edge Windows Hello Companion Devices BitLocker Admin and Monitoring Conditional Access Windows Defender Trusted Platform Module Windows Firewall Windows Hello BitLocker Windows Defender Advanced Threat Protection SmartScreen BitLocker to Go Device protection Threat resistance Identity protection Information protection Breach detection investigation & response PRE-BREACH POST-BREACH © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

16 Identity and Access Management Identity Driven Security
Information Protection Managed Mobile Productivity Azure Active Directory Premium Single sign-on to cloud and on-premises applications, advanced risk based identity protection with alerts, analysis, and remediation. Microsoft Advanced Threat Analytics Identify suspicious activities and advanced attacks on-premises. Azure Information Protection Identify suspicious activities & advanced attacks on premises. Encryption for all files and storage locations. Cloud based file tracking. Intelligent classification, encryption for files shared inside and outside your organisation. Microsoft Intune Mobile device and app management to protect corporate apps and data on any device. Enterprise Mobility + Security Microsoft Cloud App Security Bring enterprise-grade visibility, control, and protection to your cloud applications. Windows Hello for Business Enterprise grade biometric and companion device login. Windows Defender Advanced Threat Protection Behaviour-based, attack detection, built-in threat intelligence, forensic investigation and mitigation. Windows Information Protection Prevent accidental leaks by separating personal and business data. Device Guard Device locked down to only run fully trusted apps Windows 10 Credential Guard Protects user access tokens in a hardware-isolated container. BitLocker Prevent accidental leaks by separating personal and business data AppLocker Block unwanted and inappropriate apps from running

17


Download ppt "Mobility Workshop Microsoft Mobility + Security Vision"

Similar presentations


Ads by Google