WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Similar documents
Office 365: Modern Workplace

Go mobile. Stay in control.

CAN MICROSOFT HELP MEET THE GDPR

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

MD-101: Modern Desktop Administrator Part 2

Use EMS to protect your mobile data and mobile app

Update on new Microsoft Cloud Technology

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools

Active Directory Services with Windows Server

Phil Schwan Technical

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools

Hybrid Identity de paraplu in de cloud

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

Active Directory Services with Windows Server

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting

At Course Completion After completing this course, students will be able to:

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Mobility Windows 10 Bootcamp

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

CONDITIONAL ACCESS FROM A TO Z

COURSE OUTLINE: OD10969B Active Directory Services with Windows Server

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER

Managing Microsoft 365 Identity and Access

Securing Office 365 with MobileIron

A tale of Modern Management Part 1

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

This module provides an overview of multiple Access and Information Protection (AIP) technologies

Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools

Securing Office 365 with Conditional Access #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools

COURSE OUTLINE MOC 10969: ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER MODULE 1: OVERVIEW OF ACCESS AND INFORMATION PROTECTION

Active Directory Services with Windows Server

Secure & Unified Identity

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

M20696 Administering System Center Configuration Manager and Intune

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

Microsoft Active Directory Services with Windows Server

Six steps to control the uncontrollable

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir.

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

News and Updates June 1, 2017

Crash course in Azure Active Directory

Course 10969: Active Directory services with Windows Server

Identity & Access Management

Digital Workspace SHOWDOWN

2016 BITGLASS, INC. mobile. solution brief

EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

10969B: Active Directory Services with Windows Server

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Cloud Customer Architecture for Securing Workloads on Cloud Services

PLATFORM CONVERGENCE JOURNEY

10969: Active Directory Services with Windows Server

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Microsoft SharePoint Online for Administrators

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

Deploying and Managing Windows 10 Using Enterprise Services

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Administering System Center Configuration Manager and Intune

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

Exam /Course C or B Configuring Windows Devices

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

: 20696C: Administering System Center Configuration Manager and Intune

Secure access to your enterprise. Enforce risk-based conditional access in real time

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Course Outline. Deploying and Managing Windows 10 Using Enterprise Services Course B: 5 days Instructor Led

Education and Support for SharePoint, Office 365 and Azure

COURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES

Secure Access for Microsoft Office 365 & SaaS Applications

Administering System Center Configuration Manager

Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Cloud Print Migration Step-by-Step Deployment Guide

ForeScout Extended Module for VMware AirWatch MDM

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Microsoft 365 Business FAQs

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Administering System Center Configuration Manager

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

COURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview

ForeScout Extended Module for MaaS360

What s new in System Center Configuration Manager Current Branch? Ievgen Liashov

NE Administering System Center Configuration Manager and Intune

CounterACT Afaria MDM Plugin

C: Deploying and Managing Windows 10 Using Enterprise Services. Duration: 5 days; Instructor-led

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Conditional Access Policies

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

Augmenting security and management of. Office 365 with Citrix XenMobile

Course A: Administering System Center Configuration Manager

Deploying and Managing Windows 10 Using Enterprise Services

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

Transcription:

Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong

Session objectives & takeaways Session objectives: Overview of information protection solutions How to apply these solutions effectively Key takeaways: Solid understanding of information protection solutions Use case of information protection How to adopt in your organization F

Ronny de Jong Lead Consultant InSpark Microsoft MVP @ronnydejong F

Frans Oudendorp Lead Consultant InSpark Microsoft P-TSP @oudendorp R

The challenge(s)

New way of work is driving change 41 % of employees say mobile business apps change how they work 85 % 88 % 58 % of enterprise organizations keep sensitive information in the cloud of organizations no longer have confidence to detect and prevent loss of sensitive data Have accidentally sent sensitive information to the wrong person

In the past, the firewall was the security perimeter users devices apps data On-premises / Private cloud

Now there s fewer boundaries, more data, more complexity On-premises

A few use cases

Proactive Protection Protection on access (CA) Protection on creation (AIP) Protection on use (WIP/MAM) Protection via sharing (Office 365) F

Reactive Protection Protection via sharing (Office 365 DLP) Protection via sharing (MCAS) F

The solution(s)... R

Indepth data protection Information Protection Intelligent App Security Managed Mobile Productivity Identity & Access Management 04 Comprehensive, intelligent protection against today's advanced attacks. 03 Intelligently safeguard your corporate data and enable secured collaboration. 02 Securely manage apps and data on ios, Android, and Windows from one place. 01 Centrally manage single sign-on across devices, your datacenter, and the cloud. R

Solution outline Azure Active Directory Conditional access for any app with set of conditions Microsoft Intune Adds device restrictions, device compliance & app protection Office 365 DLP Application level implementation to identify & block data access from sharing Information Protection Application level implementation to identify & block data access from sharing Cloud App Security Adds deep visibility, granular controls and enhanced threat protection for your cloud apps R

Protection on access Conditional Access R

Conditional Access "When this happens" = Conditions 10TB Controls = "Then do this" Devices Users Machin e learnin g Session Risk 3 Allow access Require MFA Real time Evaluation Engine Limit access Location Deny access Apps Policies Effective policy ****** Force password reset

Protection on creation Azure Information Protection F

Approach to information protection Comprehensive protection of sensitive data throughout the lifecycle across devices, apps, cloud services and on-premises Detect Classify Protect Monitor D E V I C E S C L O U D O N P R E M I S E S

Protection on use BitLocker Windows Information Protection R

Unified endpoint management with Intune Intune gives you the flexibility and control to secure your data on any device even those you don t manage. Shared Primary Companion Public Kiosk Information worker Contractor Company-Managed Employee-Managed 3rd-Party-Managed Secure your data on virtually any device with Intune Mobile Device Management (MDM) Mobile Application Management (MAM) Enroll devices for Provision settings, Report & measure Remove company Publish mobile management certs, profiles device compliance data from devices apps to users Conditional Access: Restrict access to managed & compliant devices Configure and Report app Secure & remove company update apps inventory & usage data within mobile apps Conditional Access: Restrict which apps can be used to access email or files

YOUR INFORMATION PR OTECTION NEEDS DEVICE PROTECTION DATA SEPARATION LEAK PROTECTION SHARING PROTECTION BitLocker enhancements in Windows 8.1 InstantGo 3 rd party BitLocker adoption Windows Information Protection Office 365 Azure Information Protection

Protection on sharing Office 365 & Office 365 DLP F

Office 365 Information Protection Exchange Message Encryption Exchange Message Rules Office 365 DLP rules

Advanced Protection on sharing Microsoft cloud App Security

How Cloud App Security works Discovery Use traffic logs to discover and analyze which cloud apps are in use. Manually or automatically upload your firewall and proxy log files for analysis. App connectors Leverage APIs provided by various cloud app providers to extend protection to Cloud App Security. App connectors Cloud discovery Proxy Access + Session Proxy apps Azure AD redirects risky sessions to the reverse proxy to apply app restrictions Your organization from any location

Recap / Common practices R

INFORMATION PROTECTION SOLUTIONS Comprehensive protection of sensitive data across devices, cloud services and onpremises environments D E V I C E S O F F I C E 3 6 5 C L O U D S E R V I C E S, S A A S A P P S & O N - P R E M I S E S PCs, tablets, mobile Exchange Online, SharePoint Online & OneDrive for Business Highly regulated Azure 3 rd -Party SaaS Datacenters, file shares Windows Information Protection & BitLocker for Windows 10 Office 365 DLP Office 365 Advanced Data Governance Intune MDM & MAM for ios & Android Azure Information Protection Microsoft Cloud App Security

Protection WORKPLACE High Roadmap to keep your sensitive out of the public domain Finish with Cloud App Security Implement Office 365 DLP Deploy Azure Information Protection Embrace Conditional Access Adopt Mobile Application Management Enable Multi-Factor Authentication Low Today Simple Complexity High Tomorrow ;-)

FUTURE READY WORKPLACE SKILLS Do you want to gain more knowledge about Microsoft technology? The Future Ready Skills program offers online courseware, online labs, live Q&A s and expert sessions, so you can acquire your official Microsoft Certificate in the most efficient way. For more information: aka.ms/frsblog

Please Complete your session evaluations http://feedback.expertslive.nl @oudendorp @RonnydeJong @Experts_Live #ExpertsLive

Next session: 13:30 14:30 Windows 10 Modern Management; the Good, the Bad and the Ugly. Pim van de Vis