Download presentation
Presentation is loading. Please wait.
Published byถวิล หงสกุล Modified over 5 years ago
1
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Information Protection with Azure Information Protection
4/9/ :42 PM BRK2085 Information Protection with Azure Information Protection © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
3
What do we mean by “Information Protection”?
4/9/ :42 PM What do we mean by “Information Protection”? © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
Microsoft’s information protection solutions
help you protect sensitive data throughout its lifecycle – inside and outside the organization Microsoft’s information protection solutions
5
In the past, the firewall was the security perimeter
4/9/ :42 PM In the past, the firewall was the security perimeter users devices apps data On-premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
Now there’s fewer boundaries, more data, more complexity
4/9/ :42 PM Now there’s fewer boundaries, more data, more complexity OPPORTUNITY On-premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
7
What we hear … “Our organization is moving to Office 365; We have to identify & protect data before it leaves to the cloud” “We need to prepare for EU-GDPR (or other) compliance, and need to identify, monitor and protect PII” “We have to educate our information workers to understand and adhere to the business information protection policy” “We share information with external parties. We have to control the way shared data is used”
8
Azure Information Protection
Microsoft’s approach to information protection Identity & access management Threat protection Information protection Security management Protect users’ identities and control access to valuable resources based on user risk level Protect against advanced threats and recover quickly when attacked Ensure documents and s are seen only by authorized people Gain visibility and control over security tools Azure Information Protection Office 365 Data Loss Prevention Windows Information Protection Microsoft Cloud App Security Office 365 Advanced Security Mgmt. Microsoft Intune Advanced Threat Analytics Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection Office 365 Threat Intelligence Azure Active Directory Conditional Access Windows Hello Windows Credential Guard Azure Security Center Office 365 Security Center Windows Defender Security Center
9
How do I protect sensitive information?
4/9/ :42 PM How do I protect sensitive information? INFORMATION PROTECTION LIFECYCLE Detect Classify Protect Monitor Scan & detect sensitive data based on policy Classify data and apply labels based on sensitivity Apply protection actions, including encryption, access restrictions Reporting, alerts, remediation © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
10
Get started today! Two great resources to help you get started:
Customer Experience Team (CXP) aka.ms/aipyammer FastTrack fasttrack.microsoft.com Also … Fantastic Docs Quick Start Guides EMS Trials Maximum Results Faster Deployment Higher Adoption
11
Microsoft’s information protection solutions
4/9/ :42 PM Microsoft’s information protection solutions Comprehensive protection of sensitive data across devices, cloud services and on-premises environments NATIVE UNIFIED ANYWHERE © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
12
Better user experience and integration into Office native clients
4/9/ :42 PM Better user experience and integration into Office native clients Now: Delightful labeling experience – for everyone! Simplified interface for information labeling More robust content matching engine Medium and long term: Integration into native Office clients: Starting with Word, Excel and PowerPoint for Mac Full Office for Mac Office web apps Office for iOS & Android Office for Windows NATIVE DEMO © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
13
Unified with Office Information Protection and Azure ad policies
4/9/ :42 PM Unified with Office Information Protection and Azure ad policies Now: Unified information types for Office DLP & AIP (80+ types) Enforcing Conditional Access for protected data Short term: SharePoint sync client support for encrypted files (in preview now) Medium and long term: Unified Information Protection policy for Office DLP & AIP Unify label management Unified labeling experience in Office clients & SPO/OD4B Unified classification policy UNIFIED © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
14
Conditional Access Conditions Controls DEMO 10TB 3 Allow access Users
Machine learning Session Risk 3 Require MFA Devices Real time Evaluation Engine Limit access Policies Location Deny access Effective policy ****** Apps Force password reset DEMO
15
Classify, label and protect files anywhere
4/9/ :42 PM Classify, label and protect files anywhere Short term: Classify, label and protect data at rest Label and protect data across cloud applications Medium and long term: Multi platform SDK for labeling and protection – anywhere Central logs, analytics and reports ANYWHERE © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
16
Conditional Access Conditions Controls 10TB 3 Allow access Users
Machine learning Session Risk 3 Require MFA Devices Real time Evaluation Engine Limit access Policies Location Deny access Effective policy ****** Apps Force password reset
17
Monitor and control access through integration with Azure AD
CLOUD APPS THEN CLOUD APP SECURITY Allow access Proxy Require MFA Azure AD Conditional Access Policy Limit access Deny access ****** Force password reset
18
Information Protection
Policy Setting Policy Enforcement Data Loss Prevention Activity Anomaly detection App discovery Discovery anomaly File Scan for advanced alerts Protect file Quarantine Make private Remove a collaborator Integration with Azure Information Protection Scan and classify files in the cloud, and apply Azure Information Protection labels for protection—including encryption.
19
I want to block download of confidential files in cloud apps
Cloud App Security Proxy USER DEVICE APP SESSION RISK Role: Vendor Group: Marketing Client: Mobile Config: Open Location: Red Bank, NJ Last Sign-in: 3 hrs ago Platform: Windows Health: Fully patched Config: Unmanaged Last seen: Red Bank, NJ Block on download Device is unmanaged DEMO
20
Looking ahead H1 CY18 H2 CY17 Office 365 message encryption (GA)
TechReady 23 4/9/ :42 PM Looking ahead While representing intended plans, capabilities and target dates are subject to change Office 365 message encryption (GA) Azure Information Protection convergence to 80+ sensitive information types used in Office 365 Azure Information Protection scanner for on-premises file shares (preview) Microsoft Cloud App Security label and protect Office files in cloud apps (preview) Native labeling experience in Word, PowerPoint and Excel on Mac, iOS, Android and web apps Native labeling in Outlook on Mac, iOS, Android and web apps DLP triggers based on labels H1 CY18 H2 CY17 © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.