Download presentation
Presentation is loading. Please wait.
Published byJosephine Black Modified over 9 years ago
2
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern Data protection may get in the way of productivity Compliance rules are complex and always evolving
3
IT EmployeesCustomersBusiness partners DevicesApps UsersData
4
Other employee s Customers Business partners SaaS Azure Office 365 Simplify and protect access Cloud Storage Prevent leaks and allow collaboration Stop external threats Stay compliant Cloud Storage How do you empower users and enable collaboration while still protecting corporate assets? Empower your users Enable collaboration
5
80%+ of employees admit to using unapproved software-as-a- service (SaaS) applications in their jobs 75%+ of all network intrusions are due to compromised user credentials 59% of organizations are projected to start some kind of BYOD initiative this year
6
Simplify app access with integrated identities and single sign-on Additional layer of security with Azure Multi-Factor Authentication Protect app access with device compliance and conditional access
7
Self-service Single sign-on Username Identity and access management Simple connection Cloud SaaS Azure Office 365 Public cloud Other Directories Windows Server Active Directory On premises Microsoft Azure Active Directory
8
Windows Provable PC Health (PPCH) SharePoint Online Exchange Online User Policy verification Microsoft Intune SharePoint Online Exchange Online User Microsoft Intune Policy compliance verification Device management Device compliance Measured boot integrity status (Windows PPCH) Advanced device compliance (antivirus, firewall, patch state, etc.) IT Microsoft Intune User Device enrolled IT
9
MFA is A trusted additional method of authentication that offers more security with a phone call, app, or SMS MFA prevents Unauthorized access to on-premises and cloud apps with additional authentication required MFA offers Very flexible enforcement with user, device, or per app to reduce compliance risks Azure Multi-Factor Authentication
11
61% of workers mix personal and work tasks 58% of workers have accidently sent sensitive information to the wrong person 600M Records breached (known) from April 2005 to Dec 2012 90% of data leakages can be traced back to user behavior
12
Separation of data at app and device level Detect, monitor, and protect sensitive data Allow secure sharing of information
13
User Corporate network Microsoft Intune & Office Mobile Apps Apply policies Save Share files and enforce policies File share Personal storage * Some roaming scenarios use Azure Right Management Configure and manage EDP policies with Intune and Azure Rights Management Control app access to corporate data and prevent copy and paste- related data leaks Protect data at rest and in motion* Separate at the app level Corporate versus personal data identifiable wherever it rests on the device MAM and data protection capabilities built into the platform Protect data at rest and in motion* Separate at the platform level Enterprise Data Protection
14
IT Maximize mobile productivity and protect corporate resources with Office mobile apps—including multi-identity support Extend these capabilities to your existing line-of-business apps using the Intune App Wrapping Tool Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal apps Managed apps User Corporate data Personal data Multi-identity policy
15
Greatly enhanced security capabilities while retaining rich Office productivity experience Identify, monitor, and protect sensitive information as they move in the organization Educate and empower your users while they work on sensitive content
16
Admin DLP system walkthrough Centralized policy store Information workers
17
Configure data protection policies Use policy templates for protecting emails Alert Encrypt Append Override Review Redirect Block Classify
18
Document tracking Access control Data encryption Share internallyShare externally z On any device Authentication and collaboration
19
Demo
20
Data loss prevention Azure RMS Intune MAM
21
The frequency and sophistication of cybersecurity attacks are increasing 200+ The median number of days that attackers reside within a victim’s network before detection $500B The total potential cost of cybercrime for the global economy $3.5M The average cost of a data breach for a company
22
Stop malicious codes Protect against identity theft Detect and block threats
24
Block spam Block known malware Block Unknown Malware Time-of-click protection URL tracking and reporting Block malicious links on browser Strong Perimeter Exchange Online Protection Exchange Online Advanced Threat Protection SmartScreen Enables a Windows desktop to be locked down to only run trusted apps, just like many mobile OS’s (e.g. Windows Phone) Resistant to tampering by an administrator or malware Device guard
25
Detect attacks Digital crime units monitoring the dark web Azure Active Directory telemetry Event logs and SIEM
27
ATA Devices and servers Behavior al Analytics Forensics for known attacks and issues Advanced Threat Analytics Profile normal entity behavior (normal vs. abnormal) Search for known security attacks & issues Detect suspicious user activities, known attacks, and issues SIEM Active Directory
28
Demo
29
Advanced Threat Protection Azure Active Directory Security Reports Advanced Threat Analytics
31
Analytics for eDiscovery Legal hold Archiving and retention
32
Productivity first Educate and empower end users to be compliant without affecting productivity Built-in features Deliver rich, low-cost compliance via built-in features Operate across suites Easily apply consistent compliance controls, reports, and UX across Office 365 Bring your own device Get compliant fast Educate and empower people Discover and act on risk
33
Integrated tools to help you import, store, preserve, and expire data IN-PLACE No need to maintain a separate, duplicate store UNIFIED Unified policy across Exchange, SharePoint, and Skype for Business EXTENSIBLE Migrated data from third-party stores and with more formats Broad and deep service insights and forensics about customer data CENTRALIZED Tenant-based Office 365 wide experiences, no silos CONSISTENT Logging across SharePoint, Exchange, OneDrive for Business, and Azure COMPLETE One API to extract audit data out of Office 365 IN-PLACE HOLD Retain content in place, in real time SEARCH, ANALYTICS AND EXPORT Find up-to-date and relevant content quickly and export for review UNIFIED SharePoint, Skype for Business, and OneDrive for Business and Exchange Applies machine learning to enable users to explore large, unstructured sets of data in order to quickly find what is relevant THEMATIC ANALYSIS Clustering technology to identify data relationships; reducing data sent for review PREDICTIVE CODING Trains the system to identify relevant documents EMAIL THREADING Reconstruct email threads from unstructured data
34
Engagement Security Operations Compliance Report/dashboards
35
Simplify and protect access Simplify app access with integrated identities and SSO Additional layer of security with MFA Allow secure sharing of information Allow collaboration while preventing data loss Separation of data at app and device level Detect, monitor, and protect sensitive data Allow secure sharing of information Stop external threats Stop malicious codes Prevent identity theft Detect and block threats Stay compliant Analytics for eDiscovery Legal hold Archiving and retention
36
SaaS Azure Office 365 Simplify and protect access Cloud Storage Prevent leaks and allow collaboration Stop external threats Stay compliant Cloud Storage Enterprise Mobility Suite Other employee s Customers Business partners Empower your users Enable collaboration
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.