Go mobile. Stay in control.

Similar documents
How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Managing Microsoft 365 Identity and Access

Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir.

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Protecting and empowering your connected organization

Crash course in Azure Active Directory

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Office 365: Modern Workplace

Use EMS to protect your mobile data and mobile app

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Hybrid Identity de paraplu in de cloud

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

CAN MICROSOFT HELP MEET THE GDPR

Identity as the Entrée to the Microsoft Cloud

Secure Access for Microsoft Office 365 & SaaS Applications

IBM Future of Work Forum

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

White Paper Securing and protecting enterprise data on mobile devices

News and Updates June 1, 2017

Best Practices in Securing a Multicloud World

Simplify Application Access with Azure Active Directory

Tech Dive: Microsoft Azure Identity Management and Office 365

Identity as the core of enterprise mobility

Enterprise Mobility + Security

The security challenge in a mobile world

Identity & Access Management

THE IDENTITY DEFINED SECURITY ALLIANCE

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Microsoft 365 Business FAQs

MD-101: Modern Desktop Administrator Part 2

Professional Development

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

A tale of Modern Management Part 1

Six steps to control the uncontrollable

Your Guide to EMS. Applied Tech: Your Guide to EMS. Contents

Google Identity Services for work

Securing Digital Transformation

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

align security instill confidence

CONDITIONAL ACCESS FROM A TO Z

Microsoft Security Management

Cloud Customer Architecture for Securing Workloads on Cloud Services

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

CloudSOC and Security.cloud for Microsoft Office 365

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Addressing Today s Endpoint Security Challenges

Next-Gen CASB. Patrick Koh Bitglass

How to Secure Your Cloud with...a Cloud?

Augmenting security and management of. Office 365 with Citrix XenMobile

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

Cloud Security: Constant Innovation

MaaS360 Secure Productivity Suite

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Secure access to your enterprise. Enforce risk-based conditional access in real time

THALES DATA THREAT REPORT

Windows Server The operating system

Six Ways to Protect your Business in a Mobile World

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

Technical Evaluation Best Practices Guide

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

2016 BITGLASS, INC. mobile. solution brief

Securing Your Identities with Azure AD

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

Maximize your investment in Microsoft Office 365 with Citrix Workspace

HIPAA Regulatory Compliance

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Securing Your Most Sensitive Data

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Government IT Modernization and the Adoption of Hybrid Cloud

Windows 10 IoT Overview. Microsoft Corporation

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Phil Schwan Technical

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

2018 Edition. Security and Compliance for Office 365

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Understand & Prepare for EU GDPR Requirements

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Windows 10 for enterprise. Pramiti Bhatnagar

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Secure & Unified Identity

Transcription:

Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36

Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget growth 63% of confirmed data breaches involve weak, default, or stolen passwords. More than 80 percent of employees admit to using non-approved software as a service (SaaS) applications in their jobs. Gartner predicts global IT spend will grow only 0.6% in 2016.

Is it possible to keep up? Is it possible to stay secure? Lost device Data leaks Users Business partners Data Compromised identity Customers Apps Employees Stolen credentials Devices

Is it possible to keep up? The Microsoft vision Secure and protect against new threats Users Data Maximum productivity experience Employees Business partners Customers Apps Comprehensive and integrated Devices

Customers need Secure against new threats User freedom Do more with less Identity driven security Identity-driven security ENTERPRISE MOBILITY + SECURITY Productivity without compromise Microsoft solution Managed mobile productivity Comprehensive solutions Comprehensive solution

ENTERPRISE MOBILITY + SECURITY Identity-driven security Managed mobile productivity Comprehensive solution

Identity-driven Security Data Breaches 63%

IDENTITY DRIVEN SECURITY Identity is the foundation for enterprise mobility Windows Server Active Directory Simple connection Other directories Self-service Single sign-on Azure SaaS Public cloud On-premises Microsoft Azure Active Directory Cloud

IDENTITY DRIVEN SECURITY Identity at the core of your business 1000s of apps, 1 identity Enable business without borders Manage access at scale Provide one persona to the workforce for SSO to 1000s of cloud and on-premises apps with multifactor authentication. Stay productive with universal access to every app and collaboration capability and self service capabilities to save money Manage identities and access at scale in the cloud and on-premises

IDENTITY DRIVEN SECURITY Identity Devices Apps & Data Employees Partners Customers Shadow IT Cloud apps Azure SaaS Data breach Identity breach On-premises apps Transition to cloud & mobility New attack landscape Current defenses not sufficient

IDENTITY DRIVEN SECURITY Holistic Identity-driven Innovative Intelligent Addresses security challenges across users (identities), devices, data, apps, and platforms on-premises and in the cloud Offers one protected common identity for secure access to all corporate resources, onpremises and in the cloud, with risk-based conditional access Protects your data from new and changing cybersecurity attacks Enhances threat and anomaly detection with the Microsoft Intelligent Security Graph driven by a vast amount of datasets and machine learning in the cloud.

IDENTITY DRIVEN SECURITY 1. Protect at the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Protect your data against user mistakes Gain deep visibility into user, device, and data activity onpremises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics.

IDENTITY DRIVEN SECURITY User Conditions Location Device state User/Application Risk Actions Allow access Or Enforce MFA per user/per app Block access MFA

IDENTITY DRIVEN SECURITY How do I gain visibility and control of my cloud apps? How do I prevent data leakage from my mobile apps? How do I control data on-premises and in the cloud Cloud App Security Shadow IT Discovery Microsoft Intune DLP for Office 365 mobile apps Azure Information Protection Classify & Label Risk scoring Optional device management Protect Policies for data control LOB app protection Monitor and Respond

IDENTITY DRIVEN SECURITY On-premises detection Detection in the cloud Microsoft Advanced Threat Analytics (ATA) Cloud App Security + Azure Active Directory Premium Behavioral Analytics Behavioral analytics Detection of known malicious attacks Anomaly detection Detection of known security issues Security reporting and monitoring

IDENTITY - DRIVEN SECURITY Enterprise Mobility +Security Extend enterprise-grade security to your cloud and SaaS apps Microsoft Cloud App Security Microsoft Intune Azure Active Directory Premium Manage identity with hybrid integration to protect application access from identity attacks Protect your data, everywhere Azure Information Protection Protect your users, devices, and apps Detect threats early with visibility and threat analytics Microsoft Advanced Threat Analytics

Identity-driven security Protect against advanced threats

ENTERPRISE MOBILITY + SECURITY Identity-driven security Managed mobile productivity Comprehensive solution

Managed mobile productivity Unsecured apps 80%

MANAGED MOBILE PRODUCTIVITY Manage and secure devices Office mobile apps Data-level protection User self-service

MANAGED MOBILE PRODUCTIVITY Access management Built-in security Gold standard Conditional access Device settings & Compliance enforcement Multi-identity support Mobile app management (w & w/o a device enrollment) File level classification, labeling, and encryption Office mobile apps Familiar and trusted

MANAGED MOBILE PRODUCTIVITY Managed apps Managed apps Corporate data Multi-identity policy Managed Email apps attachment Personal data Copy Paste Save Paste to personal app Save to personal storage Personal apps apps Personal apps

MANAGED MOBILE PRODUCTIVITY Protect your data at all times Enable safe sharing internally and externally Empower users to make right decisions Maintain visibility and control

MANAGED MOBILE PRODUCTIVITY IT admin sets policies, templates, and rules STRICTLY CONFIDENTIAL CONFIDENTIAL INTERNAL NOT RESTRICTED FINANCE CONFIDENTIAL Classify data according to policies automatically or by user Add persistent labels defining sensitivity to files

MANAGED MOBILE PRODUCTIVITY Company branded, personalized application Access Panel: http://myapps.microsoft.com + ios and Android Mobile Apps Integrated Office 365 app launching Manage your account, apps and groups Self-service password reset Application access requests

Managed mobile productivity Secure access to company data with maximum productivity

ENTERPRISE MOBILITY + SECURITY Identity-driven security Managed mobile productivity Comprehensive solution

Comprehensive solution Global IT Budget growth 2016 0.6%

COMPREHENSIVE SOLUTION Integrates with what you have Simple to set up Easy to maintain Saves you money

COMPREHENSIVE SOLUTION Secure and protect against new threats Users Apps Data Devices Maximum productivity experience Employees Business partners Customers Comprehensive and integrated

COMPREHENSIVE SOLUTION Always up to date Real-time updates Keep up with new apps and devices Works with what you have Support multiple platforms Use existing investments Simple to set up and connect Easy, secure connections Simplified management

COMPREHENSIVE SOLUTION Simple set up with FastTrack Envision Onboard Drive Value FastTrack is included with EMS to accelerate your deployments Azure Active Directory Premium Microsoft Intune Azure Rights Management FastTrack will: Get organizational identities to the cloud Set up single sign-on for test apps (including Azure Active Directory Application Proxy apps) Configure self-service options like password reset and Azure Multi-Factor Authentication in the MyApps site FastTrack will: Setup and deploy mobile app management policies to help prevent Office 365 data leakage Setup and deploy device security policies like pin or device encryption Integrate on-premises System Center Configuration Manager with Intune Enable conditional access and compliance policies to control access to data FastTrack will: Retain control of sensitive documents locally and over email Automatically protect mail containing privileged information Ensure files stored in SharePoint are rights protected

COMPREHENSIVE SOLUTION For the cost of Identity & Access Management and MDM/ MAM from other vendors, EMS provides advanced security capabilities to protect users, devices, apps and data. Included with Microsoft EMS E5 Available separately from other vendors Information protection $15 User and Entity Behavioral Analysis Cloud Access Security Broker Identity and access management Mobile device and application management Total cost (per user/month) $$ 1 $8 2 $10 2 $18+ 1. Individual pricing not currently available. 2. Okta Enterprise Edition as of 3/1/2015. 3. AirWatch Orange Management Suite Cloud as of 3/1/2015.

COMPREHENSIVE SOLUTION Comprehensive solution Stay secure and maximize your budget

Identity-driven security Managed mobile productivity Comprehensive solution ENTERPRISE MOBILITY + SECURITY Holistic, intelligent, innovative security to keep up with new threats. Encourage secure work habits by providing the best apps with built-in security. Secure your enterprise fast while keeping what you have and saving money.

Identity and access management Managed mobile productivity Information protection Identity-driven security Azure Active Directory Premium P2 Azure Information Protection Premium P2 Microsoft Cloud App Security EMS E5 Identity and access management with advanced protection for users and privileged identities Intelligent classification and encryption for files shared inside and outside your organization Enterprise-grade visibility, control, and protection for your cloud applications (includes all capabilities in P1) (includes all capabilities in P1) EMS E3 Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Information Protection Premium P1 Encryption for all files and storage locations Cloud-based file tracking Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics

Empower your employees by creating a secure productive enterprise Trust Collaboration Intelligence Mobility

Delivered through enterprise cloud services Office 365 Enterprise Mobility + Security Windows 10 Enterprise