Identity as the core of enterprise mobility
|
|
- Oswin Norton
- 6 years ago
- Views:
Transcription
1
2 The current reality
3 Identity as the core of enterprise mobility Azure Active Directory as the control plane Windows Server Active Directory Customers Partners Other directories Self-service Single sign-on Azure SaaS Simple connection Public cloud On-premises Microsoft Azure Active Directory Cloud
4 1000s OF APPS, 1 IDENTITY More options than ever! Identity Synchronization + Password Hash Synchronization+ Seamless SSO Identity Synchronization + ADFS Identity Synchronization + Pass-through Authentication + Seamless SSO Microsoft Azure Active Directory User Seamless SSO ADFS Seamless SSO Identity synchronization Identity + Password Hash synchronization Identity synchronization Pass-through Authentication
5 1000s OF APPS, 1 IDENTITY How it works User Microsoft Azure Active Directory Security Token 61 Service Token User Name returned to the user and password further proofs 25 (MFA) are initiated Connector notified returns of result request Contoso Corpnet 34 Connector DC returns validates result the credentials against AD Connector
6 1000s OF APPS, 1 IDENTITY How seamless SSO works with Pass-through authentication and Password hash synchronisation Microsoft Azure Active Directory Security Token Service Contoso Corpnet User Token 401 response sends enters returned ticket their to to get username to the Azure a Kerberos AD or further STS ticket proofs (MFA) are initiated User 34 User AD returns requests Kerberos a Kerberos ticket ticket
7 Azure AD Connect B2B collaboration Provisioning- Deprovisioning Conditional Access SSO to SaaS Self-Service capabilities Connect Health Multi-Factor Authentication Addition of custom cloud apps! O365 Group Expiration Dynamic Groups Identity Protection Azure Active Directory Remote Access to on-premises apps Azure AD B2C Group-Based Licensing Privileged Identity Management Microsoft Authenticator - Password-less Access Azure AD Join MDM-auto enrollment / Enterprise State Roaming Security Reporting Azure AD DS Access Panel/MyApps HR App Integration Governance
8 CLOUD-POWERED PROTECTION Because Who are you? is not enough Conditions Actions User User, App sensitivity Device state Location Risk Allow access or Enforce MFA per user/per app Block access MFA
9 Azure AD Reporting Infected devices Brute force attacks Configuration vulnerabilities Leaked credentials Activity Suspicious signin activities Sign-in activities Security Risky sign-ins Audit logs Users flagged for risk Notifications Reporting Solutions Data Extracts/Downloads Reporting APIs Apply Microsoft learnings to your existing security tools Microsoft machine - learning engine
10 Azure AD Machine learning + secret sauce Azure AD Premium provides more reports and more data available to perform investigations
11 Azure AD Assigning licenses, the easy way Licenses can be assigned using any security group, cloud or synced from AD All Microsoft Online Services that require user-level licensing are supported Individual SKUs can be disabled, i.e.: Office 365 except Skype Dynamic Groups can be used, for example: DG-O365-GBL: CustomAttribute10 contains O365 -> O365E3 License DG-EMS-GBL: CustomAttribute10 contains EMS -> EMSE3 License User1: CustomAttribute10 = EMS;O365
12 The process
13 Azure AD Spring cleaning time! O365 Groups have been really popular, however with no control numbers can grow quickly. AADP now allows to configure an O365 Group expiration policy
14 MANAGE ACCESS AT SCALE Monitor and gain insights into the identity infrastructure used to extend on-premises identities to Azure Active Directory and Office 365. Monitor: The Azure AD Connect sync engine health ADFS infrastructure health On-premises AD Domain Services health
15
16
17 Azure Active Directory Connect Health Portal
18
News and Updates June 1, 2017
Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk
More informationHybrid Identity de paraplu in de cloud
EXPERTS LIVE SUMMER NIGHT Hybrid Identity de paraplu in de cloud Robbert van der Zwan TSP EM+S Netherlands EXPERTS LIVE SUMMER NIGHT Robbert van der Zwan Robbert works as an Enterprise Mobility and Security
More informationEXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings
EXPERTS LIVE SUMMER NIGHT Close your datacenter and give your users-wings Stefan van der Wiele Robbert van der Zwan TSP EMS Blackbelt TSP EMS Netherlands EXPERTS LIVE SUMMER NIGHT Stefan van der Wiele
More informationJay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir.
Jay Ferron CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM jferron@interactivesecuritytraining.com blog.mir.net A comprehensive identity and access management cloud solution
More informationUse EMS to protect your mobile data and mobile app
Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal. pds@ctglobalservices.com PETER DAALMANS Enterprise Mobility MVP @ CTGlobal Blog: https://peterdaalmans.com
More informationUse Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting
Use Microsoft EMS to Protect your Mobile Data and Mobile Apps Chris Nackers http://chrisnackers.com chris@nackersconsulting.com Nackers Consulting Peter Daalmans http://configmgrblog.com, peter@daalmans.com
More informationCourse 10993A: Integrating On-Premises Identity Infrastructure with Microsoft Azure
Course 10993A: Integrating On-Premises Identity Infrastructure with Microsoft Azure - Course details Course Outline Module 1: Introducing Azure AD This module describes the differences between Azure AD
More informationOffice 365: Modern Workplace
Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters
More informationWho am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB
@markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Active Directory Domain Services On-premises App Server Validate credentials
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationTech Dive: Microsoft Azure Identity Management and Office 365
Tech Dive: Microsoft Azure Identity Management and Office 365 Tech Dive: Microsoft Azure Identity Management and Office 365 Microsoft Partner Confidential 2 Tech Dive: Microsoft Azure Identity Management
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationIdentity & Access Management
Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY
More informationTracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory
Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Presenters: Sander Berkouwer Senior Consultant at SCCT 10-fold Microsoft MVP Active Directory aficionado
More informationWho am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB
@markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Under the hood: Multiple backend services and hybrid components Hybrid Components
More informationCrash course in Azure Active Directory
Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.
More information[ Sean TrimarcSecurity.com ]
Securing the Microsoft Cloud (Office 365 & Azure AD) Sean Metcalf Founder, Trimarc Presenter bio Sean Metcalf Founder & CTO, Trimarc One of ~100 people globally who holds the Microsoft Certified Master
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationIntegrating On-Premises Identity Infrastructure with Microsoft Azure
Integrating On-Premises Identity Infrastructure with Microsoft Azure OD10993; On-Demand, Video-based Course Description This course teaches IT professionals how to integrate their on-premises AD DS environment
More informationAzure Active Directory from Zero to Hero
Azure Active Directory from Zero to Hero Azure &.NET Meetup Freiburg, 2018 Esmaeil Sarabadani What we cover today Overview on Azure AD Differences between on-prem AD and Azure AD Azure AD usage scenarios
More informationAccess Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions
Access Governance in a Cloudy Environment Nabeel Nizar VP Worldwide Solutions Engineering @nabeelnizar Nabeel.Nizar@saviynt.com How do I manage multiple cloud instances from a single place? Is my sensitive
More informationDATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz
Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationIdentity as the Entrée to the Microsoft Cloud
Identity as the Entrée to the Microsoft Cloud The Office 365 Ecosystem Project Pro Visio Pro Sway Delve Groups Teams Planner Bookings Enterprise Voice OneDrive Yammer PowerBI Customer Manger Intune Azure
More informationSecuring the New Perimeter:
Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size
More informationAzure Multi-Factor Authentication. Technical Note
Azure Multi-Factor Authentication Technical Note UPDATED: 28 March 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo
More informationIntegrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement
Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement The Challenge: Smarter Attackers and Dissolving Perimeters Modern enterprises are simultaneously
More informationSecuring Your Identities with Azure AD
Securing Your Identities with Azure AD Microsoft Azure Active Directory Deployment Guide for Retail Industry Customers Abstract As a follow-on to configuring identities at scale, and enabling productivity,
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationIT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,
IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationOFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting
OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital
More informationMD-101: Modern Desktop Administrator Part 2
Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has
More informationPLANNING AZURE INFRASTRUCTURE SECURITY - AZURE ADMIN ACCOUNTS PROTECTION & AZURE NETWORK SECURITY
PAGE 2 IN CEE PLANNING AZURE INFRASTRUCTURE SECURITY - AZURE ADMIN ACCOUNTS PROTECTION & AZURE NETWORK SECURITY MAR 2017 IGOR SHASTITKO About Consalta Every business deserves an opportunity to grow! We
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools OD20398B; On-Demand, Video-based Course Description This course teaches IT professionals how to
More informationA tale of Modern Management Part 1
A tale of Modern Management Part 1 Speaker introduction @JankeSkanke @okieselb jan.ketil.skanke@cloudway.no oliver.kieselbach@glueckkanja.com Principal Cloud Architect - CloudWay Lead Cloud Architect Glück
More informationEnabling and Managing Office 365
Course 20347A: Enabling and Managing Office 365 Course details Course Outline Module 1: Planning and provisioning Microsoft Office 365 This module reviews the features of Office 365 and identifies recent
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools
Enterprise Management Suite (EMS) & On-Premises Tools Page 1 of 7 Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Course 20398A: 4 days; Instructor-Led
More informationHOW TO UNLOCK EMS. 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite
HOW TO UNLOCK EMS 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite 1. KEY COMPONENTS There are four primary components to the Enterprise Mobility Suite (EMS). EMS Key Components EMS
More informationENABLING AND MANAGING OFFICE 365
20347 - ENABLING AND MANAGING OFFICE 365 CONTEÚDO PROGRAMÁTICO Module 1: Planning and provisioning Office 365 This module reviews the features of Office 365 and identifies recent improvements to the service.
More informationSimplify Application Access with Azure Active Directory
Simplify Application Access with Azure Active Directory Single Identity People use many apps and devices to get work done, which can mean multiple logins and complex technology such as VPN. Thankfully,
More informationSecure access to your enterprise. Enforce risk-based conditional access in real time
Secure access to your enterprise Enforce risk-based conditional access in real time FOREWORD The intelligent cloud has created an opportunity to do security better Traditional security perimeters no longer
More informationSecuring Office 365 with Conditional Access #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM
Securing Office 365 with Conditional Access Nathan O Bryan MVP: Office Apps and Services MCSM: Messaging @MCSMLab https://www.mcsmlab.com Security in the Cloud Era Shared responsibility model Microsoft
More informationPasswords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist
Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack
More informationWhat is Azure Active Directory (and Why Should I care)?
What is Azure Active Directory (and Why Should I care)? Eric Kool-Brown (kool@uw.edu) Software Engineer UW-IT Identity and Access Management Presented to the Internet2 2018 Technology Exchange Subtitle:
More informationOverview What is Azure Multi-Factor Authentication? How it Works Get started Choose where to deploy MFA in the cloud MFA on-premises MFA for O365
Table of Contents Overview What is Azure Multi-Factor Authentication? How it Works Get started Choose where to deploy MFA in the cloud MFA on-premises MFA for O365 users Security best practices How to
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationManageEngine ADSelfService Plus
Comparison Document ManageEngine ADSelfService Plus Vs Azure AD Self-Service Password Reset (SSPR) ManageEngine ADSelfService Plus vs. Azure AD Self-Service Password Reset (SSPR) Password reset tickets
More informationConditional Access Policies
Conditional Access Policies Microsoft Intune conditional access policies are configured against particular services, helping to ensure that only managed and compliant devices can access the service. They
More information20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationAt Course Completion After completing this course, students will be able to:
Course Details Course Code: Duration: Notes: 20398B 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and technical
More informationMulti Factor Authentication & Self Password Reset
Multi Factor Authentication & Self Password Reset Prepared by: Mohammad Asmayal Jawad https://ca.linkedin.com/in/asmayal August 14, 2017 Table of Contents Selectable Verification Methods... 2 Set up multi-factor
More informationMicrosoft Official Curriculum Enabling and Managing Office 365 (5 Days - English) Programme détaillé
Module 1: Planning and provisioning Microsoft Office 365 This module reviews the features of Office 365 and identifies recent improvements to the service. Also it describes how to configure an Office 365
More informationWindows 10 Azure AD / EMS
Windows 10 Azure AD / EMS Jörgen Nilsson @ccmexec Jorgen.nilsson@onevinn.se Blog: http://ccmexec.com #win10tour The traditional IT environment is no more Our users have More than one device A large number
More informationSecuring Office 365 with Okta
Securing Office 365 with Okta Index Background Terms & Definitions Introduction Office 365 Authentication Methods Securing Federated Office 365 Using Okta Known Email Clients that Support Modern Authentication
More informationWhy Choose MS Azure?
Why Choose MS Azure? Bio Dave Williams Cloud Architect AWS and Azure Expertise Agenda How to choose a public cloud service provider Microsoft Azure Strengths: Identity & Azure Active Directory Infrastructure
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationCisco Webex Control Hub
Data Sheet Cisco Webex Control Hub (Management and Analytics) 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Management and analytics overview
More informationQuick Heal Mobile Device Management. Available on
Available on Infinite Devices. One Unified Solution. Quick Heal A simple yet powerful solution, Quick Heal is a unified platform for managing and monitoring multiple mobile devices within your enterprise
More informationMCSA Office 365 Bootcamp
MCSA Office 365 Bootcamp Length: 6 days Format: Bootcamp Time: Day About This Course Demonstrate your skills in transitioning to and administering cloud-hosted business applications with Microsoft Office
More informationWindows Azure Question-Answer Part V- Azure Active Directory
Windows Azure Question-Answer Part V- Azure Active Directory KRUNAL TRIVEDI MCT, MCT INDIA REGIONAL LEAD TRAINER, WRITER, SPEAKER www.techtrainingpoint.com WINDOWS AZURE QUESTION-ANSWER Windows Azure Active
More informationSOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK
RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility
More informationMicrosoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811
Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware
More informationManaging Identity Lifecycles at Scale
Microsoft Azure Active Directory Deployment Guide for Retail Industry Customers Abstract This guide helps you deploy a unified identity and access management solution with Microsoft Azure Active Directory.
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationOffice : Enabling and Managing Office 365. Upcoming Dates. Course Description. Course Outline
Office 365 20347: Enabling and Managing Office 365 Learn how to evaluate, plan, deploy and operate Microsoft Office 365 Cloud-Based Services in this 5-day class. Your instructor will focus on real world
More informationCONDITIONAL ACCESS FROM A TO Z
CONDITIONAL ACCESS FROM A TO Z Peter Daalmans PeterDaalmans.com, pds@ctglobalservices.com, Senior Consultant CTGlobal Jörgen Nilsson Ccmexec.com, jorgen.nilsson@onevinn.se, Principal Consultant Onevinn
More informationAzure Active Directory B2C. Daniel Dickinson Enterprise Mobility Specialist
Azure Active Directory B2C Daniel Dickinson Enterprise Mobility Specialist Are you ready? Is your identity system ready and secure? A consumer identity and access management system needs to be: Consumer-centric
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationArchitecting Microsoft Azure Solutions (proposed exam 535)
Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and
More informationMaximize your move to Microsoft in the cloud
Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3
More informationSECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS
WHITE PAPER SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS The Challenges Of Securing AWS Access and How To Address Them In The Modern Enterprise Executive Summary When operating in Amazon Web Services
More informationWELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System
WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System Collect Learn Today Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationCourse Outline. Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led
Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led About this course This is a 5-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in
More informationAuthlogics for Azure and Office 365
Authlogics for Azure and Office 365 Single Sign-On and Flexible MFA for the Microsoft Cloud Whitepaper Authlogics, 12 th Floor, Ocean House, The Ring, Bracknell, Berkshire, RG12 1AX, United Kingdom UK
More informationIdentity Management as a Service
Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by
More informationObject of this document
Publish applications using Azure AD Application Proxy It s imperative that I clear what application means in this context. A lot of people are confused application with mobile applications and other applications
More informationMicrosoft Enabling and Managing Office 365
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20347 - Enabling and Managing Office 365 Length 5 days Price $4290.00 (inc GST) Version A Overview This is a 5-day instructor-led training (ILT) course that
More informationLifespan Guide for using your Lifespan Network Account
Lifespan Guide for using your Lifespan Network Account Summary Instructions for setting up a new Lifespan network and Microsoft cloud account... 2 Set password... 2 Register for Self-Service Password Reset...
More informationUnified Secure Access Beyond VPN
Unified Secure Access Beyond VPN Luboš Klokner F5 Systems Engineer lubos@f5.com +421 908 755152 @lklokner Humans v. Technology F5 Networks, Inc Agenda Introduction General APM Use-Cases APM Use-Cases from
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationSobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.
Sobering statistics The frequency and sophistication of cybersecurity attacks are getting worse. 146 >63% $500B $3.8M The median # of days that attackers reside within a victim s network before detection
More informationWHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD
WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD Imagine that you re a CISO in charge of identity and access management for a major global technology and manufacturing company. You
More information[MS20347]: Enabling and Managing Office 365
[MS20347]: Enabling and Managing Office 365 Length : 5 Days Audience(s) : IT Professionals Level : 200 Technology : Microsoft Office Delivery Method : Instructor-led (Classroom) Course Overview This is
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationCloud Print Migration Step-by-Step Deployment Guide
Getting Started Cloud Print Migration Step-by-Step Deployment Guide On-premise print server Print via shared print queues Print drivers distributed from server Manual maintenance and updates Single point
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationEnterprise Mobility + Security
Enterprise Mobility + Security Assume Breach Identity Data Flexible Workforce 250 million Millions Billions 700 million 40 billion 18+ billion 420 million Millions 35 billion messages/month United Kingdom
More information20347: Enabling and Managing Office hours
20347: Enabling and Managing Office 365 35 hours About this course This is a 5-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning,
More informationActive Directory based password synchronization
Active Directory based password synchronization www.adselfserviceplus.com Real-time password synchronization for cloud applications More and more enterprises are making the move to the cloud, which puts
More informationEnabling and Managing Office 365 (NI152) 40 Hours MOC 20347A
Enabling and Managing Office 365 (NI152) 40 Hours MOC 20347A Outline This is a 5-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning,
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationAzure Multi-Factor Authentication: Who do you think you are?
Azure Multi-Factor Authentication: Who do you think you are? Sander Berkouwer CTO at SCCT scct.nl Sander Berkouwer CTO at SCCT scct.nl Microsoft MVP Veeam Vanguard A little history Server Microsoft acquired
More informationCloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation
Cloud Security, Mobility and Current Threats Tristan Watkins, Head of Research and Innovation Threat Landscape Verizon Data Breach Investigations Report Verizon DBIR: Threat actors and actions Verizon
More information