Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Similar documents
Crash course in Azure Active Directory

Go mobile. Stay in control.

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

Enterprise Mobility Management

HOW TO UNLOCK EMS. 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Managing Microsoft 365 Identity and Access

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

DIGITAL TRUST Making digital work by making digital secure

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Why is Office 365 the right choice?

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

10 Cloud Myths Demystified

Cisco Start. IT solutions designed to propel your business

Securing Digital Transformation

Six Ways to Protect your Business in a Mobile World

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

Streamline IT with Secure Remote Connection and Password Management

CISO View: Top 4 Major Imperatives for Enterprise Defense

The security challenge in a mobile world

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Securing Your Most Sensitive Data

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cloud Security: Constant Innovation

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Digital Workspace SHOWDOWN

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Fujitsu World Tour 2016

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

THE MOBILE HELIX DATA SECURITY PLATFORM

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Microsoft Teams Chat-based workspace in Office 365

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

2016 BITGLASS, INC. mobile. solution brief

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Security Solutions for Mobile Users in the Workplace

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

6 Ways Office 365 Keeps Your and Business Secure

COMPUTACENTER AND CITRIX TOGETHER

The Modern Workplace Watchdog. How Office 365 helps keep your data safe and your team productive.

HIPAA Regulatory Compliance

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Secure & Unified Identity

Cybersecurity. Securely enabling transformation and change

Challenges and. Opportunities. MSPs are Facing in Security

Enterprise Mobility Management Buyers Guide

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Cisco ONE for Access Wireless

M365 Powered Device Proof of Concept Overview

Secure Access & SWIFT Customer Security Controls Framework

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

IBM Future of Work Forum

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Transformation Through Innovation

INDUSTRY PERSPECTIVE

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Thrive in today's digital economy

How to Build a Culture of Security

Thrive in today's digital economy

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

INDIA The Changing Face of the Workplace: Going Light and Mobile

The Oracle Trust Fabric Securing the Cloud Journey

with Advanced Protection

THE ACCENTURE CYBER DEFENSE SOLUTION

for the Dental Industry

The Problem with Privileged Users

The Dropbox Problem: It s Worse than You Think

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Cyber Security Updates and Trends Affecting the Real Estate Industry

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Five Tips to Mastering Enterprise Mobility

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies

MD-101: Modern Desktop Administrator Part 2

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

IT Implications of BYOD in the Cloud Era

Cisco Firepower NGFW. Anticipate, block, and respond to threats

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Security Diagnostics for IAM

Enterprise Mobility Management: completing the EMM story

DeliverySlip for Dental Practices

Building a Resilient Security Posture for Effective Breach Prevention

SECURITY PRACTICES OVERVIEW

Data-centric security What is new? from perimeter/infrastructure to data-centric security

IT Services. We re the IT in OrganIsaTion.

Preparing your network for the next wave of innovation

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Make security part of your client systems refresh

Transcription:

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

The reality for your business today, and the importance of proactive security Cyberthreats are becoming more of a reality each day. 43% of cyber attacks target small business 1. This disrupts how we live and work, how we acquire information and communicate, and what it takes to secure company data. Providing peace of mind that your information and company data are safe is becoming a more important part of how we can work together. 43% 43% of cyber-attacks target small business 1 1 Small Business Trends, CYBER SECURITY STATISTICS Numbers Small Businesses Need to Know, Jan. 3, 2017

Cyberthreats by the numbers across 3 key attack zones Email User Device Within 4 minutes 286 days 80 days It takes hackers 4 min. to get into networks through email attacks and 286 days for detection, followed by an additional 80 days for damage control 63% 58% 80% 90% 53 seconds 55,000 200,000 $1 Billion

Can you answer Yes to these 5 questions?

Security as a Service Today s mobile and entrepreneurial workforce extends the business beyond the office and customary work hours. Security as a Service, powered by Microsoft 365, helps your business stay agile and competitive, keeping data, tools and resources accessible, yet more secure, anywhere, anytime. Microsoft 365 provides a modular solution that addresses your IT and Bring-Your-Own-Device (BYOD) challenges while providing a secure end-to-end managed cloud environment that encompasses identity, apps, content and devices.

Introducing Microsoft 365 We are living in a time of inflection. Digital transformation is the biggest change any of us has seen in our lifetime. Companies invest in technology to optimize operations, transform products, engage customers, and empower employees. The challenge is finding the way to empower people to do their best work. This starts with fostering a culture of work that is inspiring for everyone, and embraces the trends in the workplace that make work inspiring. To deliver on the tremendous opportunity for business growth and innovation, we are simplifying the customer experience by bringing together Office 365, Windows 10, and Enterprise Mobility + Security with the introduction of Microsoft 365. It s a complete, intelligent solution that empowers everyone to be creative and work together, securely. Four core principles of Microsoft 365 Unlocks creativity Built for teamwork Integrated for simplicity Intelligent security

Four key areas of Intelligent Security Secure the front door Protection from identity driven breaches, email attacks and attacks targeting OS Secure content Protect content: At the time of creation, in transit, and during consumption Secure devices Workplace issued or BYOD devices Great employee experience Productivity without compromise

Secure the Front Door Identity-Driven Security Go beyond passwords and protect against identity compromise, while automatically identifying potential breaches before they cause damage. Risk-based Conditional Access and Multi-Factor Authentication Advanced security reporting Identify threats on-premises Identify high-risk usage of cloud apps, user behavior, detect abnormal downloads, prevent threats

Secure Content Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding protection, ranging from access privileges to data encryption. Shadow IT Detection: Discovering Apps and Risk Scoring Intelligent Classification and Tagging of content Document encryption, tracking, revocation Monitoring shared files and responding to potential leaks Data segregation at a device/app level

Secure Devices Workplace Issued or BYOD Devices Manage company and BYOD devices to encrypt data and ensure compliance, automatically detect suspicious activities, and quickly block, quarantine, or wipe compromised devices. Conditional Access Device and App access level controls: PIN Device and App encryption at rest Save-As, Copy, Paste restrictions Device and App level data wipe

Great employee experience Productivity without compromise Implement tools and policies that empower your employees to be productive and secure on personal and company devices while maintaining control of data. Single Sign-On Self Service Advanced Multi-Factor Authentication App Proxy without the need of VPN

Which Microsoft 365 plan is right for you? Choose the right Microsoft 365 plan for your organization s needs. Security add-ons can be used to tailor a solution that meets specific security and compliance requirements. To find the right starting point, review each of these scenarios: DO YOU NEED Microsoft 365 Enterprise + ATP Office 365 E3 + EMS E3 + ATP More than 100 seats? Extensive ediscovery, data governance, and compliance tools? To protect highly sensitive data such as financial information, health records, or extensive IP? Real-time threat protection? Enterprise-level protection for cloud applications? On-premises domain controller? A solution that can be managed with little to no in-house IT staff? Support for around 150 PCs? Does not need OS upgrade Needs Mobile Device Management and Mobile Application Management Low Risk Profile Needs Proactive Attack Prevention on OS Microsoft 365 Business + ATP