Use EMS to protect your mobile data and mobile app

Size: px
Start display at page:

Download "Use EMS to protect your mobile data and mobile app"

Transcription

1 Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal.

2 PETER DAALMANS Enterprise Mobility CTGlobal Blog: pds@ctglobalservices.com More info:

3 AGENDA Protection layers Identity Conditional Access Protecting App data Protecting Data Identifying and protecting Data Leakage

4 APP LAYER PROTECTION

5 Mobile Devices DEVICE, APPLICATION, INFORMATION MDM MAM MIM Private Company Private Company Private Private Company Company Private Company Private Company Private

6 IDENTITY

7 IDENTITY: CLOUD, SYNC OR FEDERATED? Cloud Identity Synchronized Identity Federated Identity Independent cloud identity Single identity, enabling a same sign-on experience with password hash sync Single federated identity, enabling single sign-on in some scenarios and additional flexibility

8 IDENTITY Azure AD Premium

9 CONDITIONAL ACCESS Azure AD and Intune

10 PROTECTING ACCESS TO THE DATA Device Conditional Access App Conditional Access Before accessing Require device is managed with Intune MDM & compliant with management policies Before accessing Require the app is approved for Exchange Online and SharePoint (Outlook Mobile)

11 User attributes Group membership DEVICE CONDITIONAL ACCESS Devices Domain Joined compliant Platform type (Windows, ios, Android) Application Per app policy Type of client (Web, Rich, mobile) Location IP Range ALLOW ENFORCE MFA BLOCK Cloud and On-premises applications Risk Session risk User risk

12 INTUNE DEVICE COMPLIANCE / CONDITIONAL ACCESS Intune Azure AD Microsoft EMS 5. Allow access from compliant devices 1. Device is managed by Intune 2. Intune evaluates compliance 3. Generates compliance report 4. Azure AD enforces Conditional Access 6. Block access from noncompliant devices 7. User-friendly remediation experience provided by Intune

13 INTUNE APP BASED CONDITIONAL ACCESS 5. Allow access from compliant devices and approved apps 1. User is accessing services with approved app 1. Device is optionally managed by Intune Intune Azure AD Microsoft EMS 2. Intune evaluates compliance and checks if app is approved 3. Generates compliance report 4. Azure AD enforces Conditional Access 6. Block access from noncompliant devices and not approved apps 7. User-friendly remediation experience provided by Intune

14 Azure Active Directory INTEGRATE ON-PREM APPS WITH AZURE AD End-user portal Access Panel Azure AD authentication capabilities: Username and password synced from on-prem AD Federated login to on-prem or other federation servers Multi-factor authentication Customized login screen Authorization based on user or groups SSO to Office365, thousands of SaaS apps and all applications integrated with AAD Azure AD Conditional Access Reports, auditing and security monitoring based on big data and machine learning. Authorization Authentication + MFA Resource Reporting & Auditing Application Proxy Connector Resource Connector Security Monitoring Access Panel Portal Resource DMZ Corporat e Network

15 DIFFERENT LEVELS OF CONDITIONAL ACCESS FIT TOGETHER 1 Claim Rules via Active Directory Federation Services Device + User based 2 Conditional Access by Intune / Azure AD for Office 365 (Exchange, SharePoint, Skype for Business, CRM, and more) Device based 3 App Based CA App based

16 CONDITIONAL ACCESS Setting up CA Compliance

17 MOBILE APPLICATION MANAGEMENT Microsoft Intune

18 EXPANDING APP ECOSYSTEM

19 MOBILE APPLICATION MANAGEMENT Works for both enrolled as not enrolled devices Control via App Protection Policies Control via App based CA

20 What can we do? MOBILE APPLICATION MANAGEMENT Force compliance before access to the app and data Secure the data within the app Prohibit copy/paste Prohibit screenshots Prohibit save as Force encryption Disable Outlook Sync (MDM-less MAM Only) Automatic wipe after XX number of days Secure app by PIN or corporate credentials Secure LOB apps via App Wrapper See for an up to date list of apps:

21 Use cases MAM-WE: MAM WITHOUT ENROLLMENT Apps running on devices that are not enrolled in any MDM solution. Apps running on devices that are enrolled in a third party MDM solution

22 What is WIP? WINDOWS INFORMATION PROTECTION Protects data at rest, and wherever it rests or may roam to Seamless integration into the platform, no mode switching and use any app Corporate versus personal data identifiable wherever it rests on the device Helps preventing unauthorized apps from accessing business data IT has fully control of keys and data and can remote wipe data on demand Common experience across all Windows devices with cross platform support Available since Windows 10 Redstone (and getting better)

23 APPLICATION MANAGEMENT MAM WIP

24 AZURE INFORMATION PROTECTION

25 THE EVOLUTION OF INFORMATION PROTECTION CLASSIFICATION LABELING ENCRYPTION ACCESS CONTROL POLICY ENFORCEMENT DOCUMENT TRACKING DOCUMENT REVOCATION Classification & labeling Protect Monitor & respond

26 THE EVOLUTION OF INFORMATION PROTECTION Azure Information Protection CLASSIFICATION LABELING ENCRYPTION ACCESS CONTROL Full Full Data Data Lifecycle POLICY ENFORCEMENT DOCUMENT TRACKING DOCUMENT REVOCATION Classification & labeling Protect Monitor & respond

27 AZURE INFORMATION PROTECTION

28 IDENTIFYING DATA LEAKAGE Cloud App Security

29 CLOUD APP SECURITY

30 CLOUD APP SECURITY

31 SO, WHAT FITS WHERE?

32 WHAT FITS WHERE? Identify and authorize user Active Directory Premium User Apply device policies Apply application policies IT Apply content policies Information Protection Enterprise Mobility + Security

33 HELP TO SHAPE INTUNE & SCCM Share your voice & ideas!

34 QUESTIONS

35 More

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers  Nackers Consulting Use Microsoft EMS to Protect your Mobile Data and Mobile Apps Chris Nackers http://chrisnackers.com chris@nackersconsulting.com Nackers Consulting Peter Daalmans http://configmgrblog.com, peter@daalmans.com

More information

CONDITIONAL ACCESS FROM A TO Z

CONDITIONAL ACCESS FROM A TO Z CONDITIONAL ACCESS FROM A TO Z Peter Daalmans PeterDaalmans.com, pds@ctglobalservices.com, Senior Consultant CTGlobal Jörgen Nilsson Ccmexec.com, jorgen.nilsson@onevinn.se, Principal Consultant Onevinn

More information

Conditional Access Policies

Conditional Access Policies Conditional Access Policies Microsoft Intune conditional access policies are configured against particular services, helping to ensure that only managed and compliant devices can access the service. They

More information

Hybrid Identity de paraplu in de cloud

Hybrid Identity de paraplu in de cloud EXPERTS LIVE SUMMER NIGHT Hybrid Identity de paraplu in de cloud Robbert van der Zwan TSP EM+S Netherlands EXPERTS LIVE SUMMER NIGHT Robbert van der Zwan Robbert works as an Enterprise Mobility and Security

More information

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals

More information

Identity as the core of enterprise mobility

Identity as the core of enterprise mobility The current reality Identity as the core of enterprise mobility Azure Active Directory as the control plane Windows Server Active Directory Customers Partners Other directories Self-service Single sign-on

More information

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools OD20398B; On-Demand, Video-based Course Description This course teaches IT professionals how to

More information

Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools

Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Enterprise Management Suite (EMS) & On-Premises Tools Page 1 of 7 Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Course 20398A: 4 days; Instructor-Led

More information

Office 365: Modern Workplace

Office 365: Modern Workplace Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings EXPERTS LIVE SUMMER NIGHT Close your datacenter and give your users-wings Stefan van der Wiele Robbert van der Zwan TSP EMS Blackbelt TSP EMS Netherlands EXPERTS LIVE SUMMER NIGHT Stefan van der Wiele

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

At Course Completion After completing this course, students will be able to:

At Course Completion After completing this course, students will be able to: Course Details Course Code: Duration: Notes: 20398B 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and technical

More information

News and Updates June 1, 2017

News and Updates June 1, 2017 Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk

More information

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure

More information

A tale of Modern Management Part 1

A tale of Modern Management Part 1 A tale of Modern Management Part 1 Speaker introduction @JankeSkanke @okieselb jan.ketil.skanke@cloudway.no oliver.kieselbach@glueckkanja.com Principal Cloud Architect - CloudWay Lead Cloud Architect Glück

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

Identity as the Entrée to the Microsoft Cloud

Identity as the Entrée to the Microsoft Cloud Identity as the Entrée to the Microsoft Cloud The Office 365 Ecosystem Project Pro Visio Pro Sway Delve Groups Teams Planner Bookings Enterprise Voice OneDrive Yammer PowerBI Customer Manger Intune Azure

More information

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong Session objectives & takeaways Session objectives: Overview of information protection solutions How to

More information

Securing Office 365 with Conditional Access #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM

Securing Office 365 with Conditional Access #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Securing Office 365 with Conditional Access Nathan O Bryan MVP: Office Apps and Services MCSM: Messaging @MCSMLab https://www.mcsmlab.com Security in the Cloud Era Shared responsibility model Microsoft

More information

Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir.

Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir. Jay Ferron CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM jferron@interactivesecuritytraining.com blog.mir.net A comprehensive identity and access management cloud solution

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant Windows 10 October 25, 2018 Helping you grow your business with Bruce Ward, VP of Business Strategy scalable IT services & solutions Dan Sharp, Senior Consultant for today s challenges & tomorrow s vision.

More information

Company Portal. Peter Daalmans, IT Concern Greg Ramsey, Dell, INC

Company Portal. Peter Daalmans, IT Concern  Greg Ramsey, Dell, INC Company Portal Peter Daalmans, IT Concern http://configmgrblog.com/ Greg Ramsey, Dell, INC http://ramseyg.com @pdaalmans @ramseyg Who we are Greg Ramsey, Infrastructure Tools Strategist at Dell, Inc. Titles

More information

MD-101: Modern Desktop Administrator Part 2

MD-101: Modern Desktop Administrator Part 2 Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has

More information

Universal Windows Applications

Universal Windows Applications 1 Universal Windows Applications From an IT Admin view Partner: 2 Roger Zander itnetx AG, Workplace Solutions Microsoft MVP: Enterprise Client Management Author: Client Center, Collection Commander, RuckZuck.

More information

Object of this document

Object of this document Publish applications using Azure AD Application Proxy It s imperative that I clear what application means in this context. A lot of people are confused application with mobile applications and other applications

More information

Tech Dive: Microsoft Azure Identity Management and Office 365

Tech Dive: Microsoft Azure Identity Management and Office 365 Tech Dive: Microsoft Azure Identity Management and Office 365 Tech Dive: Microsoft Azure Identity Management and Office 365 Microsoft Partner Confidential 2 Tech Dive: Microsoft Azure Identity Management

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

[ Sean TrimarcSecurity.com ]

[ Sean TrimarcSecurity.com ] Securing the Microsoft Cloud (Office 365 & Azure AD) Sean Metcalf Founder, Trimarc Presenter bio Sean Metcalf Founder & CTO, Trimarc One of ~100 people globally who holds the Microsoft Certified Master

More information

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Simplify Application Access with Azure Active Directory

Simplify Application Access with Azure Active Directory Simplify Application Access with Azure Active Directory Single Identity People use many apps and devices to get work done, which can mean multiple logins and complex technology such as VPN. Thankfully,

More information

ShareFile Technical Presentation

ShareFile Technical Presentation ShareFile Technical Presentation Joerg Vosse Senior Systems Engineer - Citrix ShareFile CEE joerg.vosse@citrix.com ShareFile Enterprise Architecture Overview ShareFile Document Cloud ShareFile.com ShareFile.eu

More information

Windows Azure Question-Answer Part V- Azure Active Directory

Windows Azure Question-Answer Part V- Azure Active Directory Windows Azure Question-Answer Part V- Azure Active Directory KRUNAL TRIVEDI MCT, MCT INDIA REGIONAL LEAD TRAINER, WRITER, SPEAKER www.techtrainingpoint.com WINDOWS AZURE QUESTION-ANSWER Windows Azure Active

More information

Virtru Microsoft Protection

Virtru Microsoft  Protection Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Azure Active Directory from Zero to Hero

Azure Active Directory from Zero to Hero Azure Active Directory from Zero to Hero Azure &.NET Meetup Freiburg, 2018 Esmaeil Sarabadani What we cover today Overview on Azure AD Differences between on-prem AD and Azure AD Azure AD usage scenarios

More information

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Windows 10 Management Technologies: What s New Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Business needs are evolving. Windows 10 offers to meet those needs. MANAGEMENT CHOICES

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

33% 18% 66% President Convergent Computing

33% 18% 66% President Convergent Computing Start Justin President Convergent Computing http://www.cco.com randm@cco.com 66% 33% 18% 66% of employees use personal devices for work purposes. 33% of employees typically work on their employer s premises

More information

Windows 10 Azure AD / EMS

Windows 10 Azure AD / EMS Windows 10 Azure AD / EMS Jörgen Nilsson @ccmexec Jorgen.nilsson@onevinn.se Blog: http://ccmexec.com #win10tour The traditional IT environment is no more Our users have More than one device A large number

More information

RHM Presentation. Maas 360 Mobile device management

RHM Presentation. Maas 360 Mobile device management RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership

More information

Update on new Microsoft Cloud Technology

Update on new Microsoft Cloud Technology Update on new Microsoft Cloud Technology Azure Rights Management Services Thomas Collier Technical Pre-Sales D E V I C E S O F F I C E 3 6 5 C L O U D S E R V I C E S, S A A S A P P S & O N - P R E M I

More information

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Presenters: Sander Berkouwer Senior Consultant at SCCT 10-fold Microsoft MVP Active Directory aficionado

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

White Paper Securing and protecting enterprise data on mobile devices

White Paper Securing and protecting enterprise data on mobile devices Securing and protecting enterprise data on mobile devices Use cases in mobile Securing and protecting enterprise data, especially in a mobile world, is a complex problem that can be easily solved. Organizations

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAAM2291BE Securing Access and Protecting Information in Office 365 with Workspace ONE Camilo Lotero Senior Technical Marketing Manager Adarsh Kesari Senior Systems Engineer #VMworld #SAAM2291BE Disclaimer

More information

Welcome! Securely Sync, Store & Share with Citrix ShareFile

Welcome! Securely Sync, Store & Share with Citrix ShareFile Welcome! Securely Sync, Store & Share with Citrix ShareFile Chris Riley System Source criley@syssrc.com Dennis Kloster System Source dkloster@syssrc.com Charlie Brinson Citrix charlie.brinson@citrix.com

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Extranets in SharePoint 2010 and 2013

Extranets in SharePoint 2010 and 2013 Extranets in SharePoint 2010 and 2013 Presented by Peter Carson President, Envision IT April 11, 2013 Rob Karimi Account Manager, Envision IT e: rkarimi@envisionit.com m: (416) 473 4726 LinkedIn: http://ca.linkedin.com/in/robkarimi

More information

Why Choose MS Azure?

Why Choose MS Azure? Why Choose MS Azure? Bio Dave Williams Cloud Architect AWS and Azure Expertise Agenda How to choose a public cloud service provider Microsoft Azure Strengths: Identity & Azure Active Directory Infrastructure

More information

Extranet Identity Management and Authentication for SharePoint On Premise, Office 365 and Beyond

Extranet Identity Management and Authentication for SharePoint On Premise, Office 365 and Beyond Extranet Identity Management and Authentication for SharePoint On Premise, Office 365 and Beyond Presented by Peter Carson President, Envision IT October 22, 2014 Peter Carson President, Envision IT SharePoint

More information

Intune Deployment at UHN Frequently Asked Questions Updated: December Overview

Intune Deployment at UHN Frequently Asked Questions Updated: December Overview Intune Deployment at UHN Frequently Asked Questions Updated: December 2017 Overview This document has been prepared to answer frequently asked questions regarding the Microsoft application, Intune, and

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Your Guide to EMS. Applied Tech: Your Guide to EMS. Contents

Your Guide to EMS. Applied Tech: Your Guide to EMS. Contents Your Guide to EMS Contents Section 1: The Changing Digital Landscape and EMS E3 Section 2: Migration and Azure AD Premium Section 3: Mobile Devices and Intune Section 4: Protecting Your Data Section 5:

More information

HOW TO UNLOCK EMS. 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite

HOW TO UNLOCK EMS. 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite HOW TO UNLOCK EMS 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite 1. KEY COMPONENTS There are four primary components to the Enterprise Mobility Suite (EMS). EMS Key Components EMS

More information

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation Cloud Security, Mobility and Current Threats Tristan Watkins, Head of Research and Innovation Threat Landscape Verizon Data Breach Investigations Report Verizon DBIR: Threat actors and actions Verizon

More information

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Maximize your investment in Microsoft Office 365 with Citrix Workspace White Paper Maximize your investment in Microsoft Office 365 with Citrix Workspace Maximize your investment in Microsoft Office 365 with Citrix Workspace Accelerate migration, simplify maintenance, and

More information

Extranets in SharePoint and Office 365 May 17, 2017

Extranets in SharePoint and Office 365 May 17, 2017 Extranets in SharePoint and Office 365 May 17, 2017 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca www.envisionit.com

More information

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2, IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against

More information

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

User Directories. Overview, Pros and Cons

User Directories. Overview, Pros and Cons User Directories Overview, Pros and Cons Overview Secure ISMS can operate with one or more of the following user directories. Secure ISMS Users (ISMS) Internal users local to the Secure ISMS application

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

President Interlink Cloud Advisors. Mike Wilson Vice President Interlink Cloud Advisors. Kirk Terrell Consultant Interlink Cloud Advisors

President Interlink Cloud Advisors. Mike Wilson Vice President Interlink Cloud Advisors. Kirk Terrell Consultant Interlink Cloud Advisors President Interlink Cloud Advisors Mike Wilson Vice President Interlink Cloud Advisors Kirk Terrell Consultant Interlink Cloud Advisors Agenda Modern Device Management Office 365 Updates & New Features

More information

Our broad and deep array of solutions enables you to use the cloud in your own way, at your own pace.

Our broad and deep array of solutions enables you to use the cloud in your own way, at your own pace. Agenda Agenda The New Office overview Rethink productivity possibilities Demo Why Microsoft for productivity Break The New Office architecture Identity management Authentication options Hybrid scenarios

More information

Mobility Windows 10 Bootcamp

Mobility Windows 10 Bootcamp Mobility Windows 10 Bootcamp Length: 8 days Format: Bootcamp Time: Day About This Course This boot camp is designed to provide students with the knowledge and skills required to install and configure Windows

More information

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional Exchange 2007 End of Service: Modernize with Office 365 Todd Sweetser Technical Solutions Professional Today s Presenter Todd has been in the IT industry for over two decades. He started out working with

More information

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack

More information

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital

More information

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018 REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural

More information

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security.   m/ Product: Demo File Page No 1 https://www.dumpsplanet.com m/ Microsoft MS-101 EXAM Microsoft 365 Mobility and Security Product: Demo File For More Information: MS-101-dumps Question: 1 Your company uses Windows Defender Advanced

More information

VMware AirWatch and Office 365 Application Data Loss Prevention Policies

VMware AirWatch and Office 365 Application Data Loss Prevention Policies VMware AirWatch and Office 365 Application Data Loss Prevention Policies Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Copyright

Copyright This video looks at Claim Based/Identity Based systems using Active Directory Federation Services as an example. An example of a claim based system is where the user logs into a system like a web page

More information

What s new in System Center Configuration Manager Current Branch? Ievgen Liashov

What s new in System Center Configuration Manager Current Branch? Ievgen Liashov What s new in System Center Configuration Manager Current Branch? Ievgen Liashov http://liashov.com http://en.liashov.com admin@sccm.com.ua Introduction IT engineer at METSYS, Paris 14 years experience

More information

Securing Your Identities with Azure AD

Securing Your Identities with Azure AD Securing Your Identities with Azure AD Microsoft Azure Active Directory Deployment Guide for Retail Industry Customers Abstract As a follow-on to configuring identities at scale, and enabling productivity,

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

TIS/App Delivery Mobility Job Aid: Install and Configure Microsoft Outlook on Your Android Phone. Overview. Job Aid: Outlook for Mobile - Android

TIS/App Delivery Mobility Job Aid: Install and Configure Microsoft Outlook on Your Android Phone. Overview. Job Aid: Outlook for Mobile - Android TIS/App Delivery Mobility Job Aid: Install and Configure Microsoft Outlook on Your Android Phone Job Aid: Outlook for Mobile - Android Overview The job aid is for Colleagues that want to access Outlook

More information

Windows 10 for enterprise. Pramiti Bhatnagar

Windows 10 for enterprise. Pramiti Bhatnagar Windows 10 for enterprise Pramiti Bhatnagar The intelligent platform designed for today Windows 10 Intelligent security Simplified updates Flexible management Enhanced productivity Intelligent security

More information

Microsoft Azure Storage Abstractions Highly durable and scalable Multiple copies of your data Financially backed SLAs Microsoft Azure Storage Automatic Storage Redundancy Windows Azure Storage Defend against

More information

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System Collect Learn Today Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters

More information

Enterprise Mobility + Security

Enterprise Mobility + Security Enterprise Mobility + Security Assume Breach Identity Data Flexible Workforce 250 million Millions Billions 700 million 40 billion 18+ billion 420 million Millions 35 billion messages/month United Kingdom

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business

More information

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB @markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Active Directory Domain Services On-premises App Server Validate credentials

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

Cloud Print Migration Step-by-Step Deployment Guide

Cloud Print Migration Step-by-Step Deployment Guide Getting Started Cloud Print Migration Step-by-Step Deployment Guide On-premise print server Print via shared print queues Print drivers distributed from server Manual maintenance and updates Single point

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information