Download presentation
Presentation is loading. Please wait.
1
Microsoft Data Insights Summit
6/30/ :31 AM Engineering for GDPR Rudra Mitra Director, Program Management | Office 365 Information Protection © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Microsoft’s commitment to customers
We will be GDPR-compliant across our cloud services when enforcement begins on May 25, 2018. We will share our experience in complying with complex regulations such as the GDPR. Together with our partners, we are prepared to help you meet your policy, people, process, and technology goals on your journey to GDPR.
3
Enterprise Mobility + Security
6/30/ :31 AM Microsoft 365 Enterprise Office 365 Enterprise Windows 10 Enterprise Enterprise Mobility + Security © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
Microsoft Data Insights Summit
6/30/ :31 AM What is the GDPR partner opportunity? As a partner, you have multiple opportunities to build a practice on GDPR Consulting and assessments Technology sales and deployment Data breach notification Evidence of risk management DPO as a service © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
5
Simplify GDPR compliance with Microsoft 365 Enterprise
6/30/ :31 AM Simplify GDPR compliance with Microsoft 365 Enterprise Assess and manage compliance risk Protect personal data Streamline processes © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
Assess and manage compliance risk
7
Compliance Manager Manage your compliance in one place
View your compliance posture against evolving regulations in real-time. Take recommended actions to improve your data protection capabilities. Conduct pre-audits to prepare for external audits. Compliance Manager is a dashboard that provides a summary of your data protection and compliance stature and recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate its effectiveness in your regulatory environment prior to implementation. Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance. 7
8
Protect personal data
9
Microsoft 365 Protecting personal data at the identity, document, and network levels Identity and Access Management Threat Protection Information Protection
10
Is the new control plane
Identity is the new control plane Identity Microsoft Azure Active Directory Is the new control plane On-premises / Private cloud 10
11
Protect resources through identity
EMS Overview 6/30/2019 Protect resources through identity Multifactor authentication Hardware protection for credentials Conditional access Privileged Identity Management © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 11
12
Information protection
6/30/ :31 AM Information protection Govern sensitive data across devices, apps, cloud services, and on-premises. Enable data governance practices and processes organization wide. Search for and identify sensitive and personal data. Automatically classify and label data with security policies. © Microsoft Corporation. All rights reserved.
13
Data is shared more often and more widely than ever.
Legal review Remote team Corporate Personal Project Lead Online backup Project Lead Private cloud Project Manager Data is shared more often and more widely than ever. Sales teams Graphic designer Vendors SaaS Ex- employees Offshore teams Public Agency teams © 2017 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
14
Microsoft’s approach to information protection
6/30/ :31 AM Microsoft’s approach to information protection Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization Detect Classify Protect Monitor Devices cloud On premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
15
Protect sensitive data throughout its lifecycle
6/30/ :31 AM Protect sensitive data throughout its lifecycle Send, share, move data Monitor data Create, import, or modify data Detect data Protect data based on policy Classify and label sensitive data Retain, expire, delete data © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
16
EMS Overview 6/30/2019 Information Protection Microsoft Comprehensive protection of data throughout the lifecycle—across devices, apps, cloud services, and on-premises Office 365 Apps & Services Windows Clients & Devices 3rd Party Apps & Services, On-premises Office 365 Information Protection Windows Information Protection Azure Information Protection Finished compliance and security solutions that are built right into Office 365 Finished security solutions that are built right into Windows devices Security platform services and products, that are integrated with 1st party apps and services, including on-premises. And extend Microsoft Information Protection to 3rd party apps and services. M365 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 16
17
Threat protection Recognize known attacks and suspicious behavior.
6/30/ :31 AM Threat protection Recognize known attacks and suspicious behavior. Detect breaches and attackers moving laterally. Recover quickly when attacked by configuring automated responses. © Microsoft Corporation. All rights reserved.
18
MICROSOFT THREAT PROTECTION
EMS Overview 6/30/2019 MICROSOFT THREAT PROTECTION IDENTITY APPS & DATA DEVICES INFRASTRUCTURE MICROSOFT ADVANCED THREAT ANALYTICS EXCHANGE ONLINE PROTECTION WINDOWS DEFENDER ADVANCED THREAT PROTECTION AZURE SECURITY CENTER AZURE SECURITY CENTER OFFICE 365 ADVANCED THREAT PROTECTION AZURE ACTIVE DIRECTORY OFFICE 365 THREAT INTELLIGENCE CREDENTIAL GUARD DEVICE GUARD WINDOWS HELLO FOR BUSINESS MICROSOFT CLOUD APP SECURITY © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Surface and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
19
PROTECT DETECT RESPOND
Office 365 ATP Protect from dangerous links & malicious attachments PROTECT DETECT RESPOND message Knowledge of new malicious files shared Microsoft Intelligent Security Graph attachment Office 365 TI & Windows Security Center Investigate and respond to attacks by seeing activity, correlating signals and taking remediation actions Windows Defender AntiVirus Protect against malicious files on disk and in memory Knowledge of new malicious files shared Knowledge of new malicious files shared Windows Defender ATP Behavioral based detection of advanced attacks on the endpoint Security team portals Endpoint behaviors
20
Streamline processes
21
Manage data subject requests
Find data associated with an individual with Office 365 Content Search Search across Exchange Online, SharePoint Online, OneDrive for business (including Teams and Groups) and public folders Search for 80+ supported sensitive data types or create custom types Download results for further review prior to providing reports to requestors 21
22
Simplify GDPR compliance with Microsoft 365 Enterprise
6/30/ :31 AM Simplify GDPR compliance with Microsoft 365 Enterprise Assess and manage compliance risk Protect personal data Streamline processes © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
23
Thank you! Please rate the sessions at AKA.MS/gdprpartnersummit
Microsoft Data Insights Summit 6/30/ :31 AM Thank you! Please rate the sessions at AKA.MS/gdprpartnersummit © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.