how to reduce your office 365 security threats
TRANSCRIPT
1 Confidential and Proprietary © Metalogix1 Confidential and Proprietary © Metalogix Move, Manage, Protect
Alistair Pugin &
Vlad Catrinescu13 December 2017
How to Reduce
Your Office 365
Security Threats
Welcome to Webinar Wednesdays
Start Time: 11:00 AM ET
2 Confidential and Proprietary © Metalogix2 Confidential and Proprietary © Metalogix
No worries, I got you covered.
Reference the Global Call in numbers
and call in with your phone.
Call-in toll-free number (US/Canada)
1-877-668-4490
Call-in toll number (US/Canada)
1-408-792-6300
Access Code: 664 501 416 A
UD
IO
IS
SU
ES
3 Confidential and Proprietary © Metalogix3 Confidential and Proprietary © Metalogix
MISSED SOMETHING?
• This session will be recorded, so you will have the opportunity
to watch it again or share with your colleagues.
• You will also receive an email tomorrow with the link to the
recoding and the PowerPoint slide.
• The recording can also be found on the Metalogix webinar
page.
4 Confidential and Proprietary © Metalogix4 Confidential and Proprietary © Metalogix
Regulations are a fact of
life. With the rapid
emergence of Content
Service and cloud
collaboration apps,
content in constant
motion is putting
organizations (and users)
at risk. In fact, 59 records
are stolen every second
around the world.
In other words, sensitive
content in the cloud
collaboration age will
continue to open up the
risk of data breaches,
security threats, and
more.
And with industry
regulations like GDPR
coming into force in
2018, organizations
need to identify
whether or not they
are in compliance.
(There’s no one-size-
fits-all solution either!)
WEBINAR SUMMARY
- Identifying sensitive content - How to classify content - How to securely limit internal and third-party access to sensitive content
WE COVER:
5 Confidential and Proprietary © Metalogix5 Confidential and Proprietary © Metalogix
Alistair PuginOffice Servers MVP
Dimension Data
Vlad CatrinescuOffice Servers MVP
Valo
6 Confidential and Proprietary © Metalogix6 Confidential and Proprietary © Metalogix
What are Threats
What about your content
Scenario’s
What’s available
Next steps
7 Confidential and Proprietary © Metalogix7 Confidential and Proprietary © Metalogix
What are Threats?
8 Confidential and Proprietary © Metalogix8 Confidential and Proprietary © Metalogix
Spam, Rootkits
Spyware, Adware
Virus, Worm, Trojan
Denial of Service DDOS
9 Confidential and Proprietary © Metalogix9 Confidential and Proprietary © Metalogix
Negligent or careless
employees who do not follow
security policies78%
There are more personal
devices connected to the
network (BYOD)68%
Employee’s use of commercial
cloud applications in the
workplace66%
Ponemon Institute Risk Report
Ponemon Institute: 2015 State of the Endpoint Report: User-Centric Risk
10 Confidential and Proprietary © Metalogix10 Confidential and Proprietary © Metalogix10 Confidential and Proprietary © Metalogix10 Confidential and Proprietary © Metalogix
Scenario
11 Confidential and Proprietary © Metalogix11 Confidential and Proprietary © Metalogix
Disgruntled Employee
12 Confidential and Proprietary © Metalogix12 Confidential and Proprietary © Metalogix12 Confidential and Proprietary © Metalogix
Scenario
13 Confidential and Proprietary © Metalogix13 Confidential and Proprietary © Metalogix
Unsecured WiFi
14 Confidential and Proprietary © Metalogix14 Confidential and Proprietary © Metalogix
Scenario
15 Confidential and Proprietary © Metalogix15 Confidential and Proprietary © Metalogix
Wrong Place to store content
16 Confidential and Proprietary © Metalogix16 Confidential and Proprietary © Metalogix16 Confidential and Proprietary © Metalogix16 Confidential and Proprietary © Metalogix
Scenario
17 Confidential and Proprietary © Metalogix17 Confidential and Proprietary © Metalogix
Training
18 Confidential and Proprietary © Metalogix18 Confidential and Proprietary © Metalogix
What are your options??
19 Confidential and Proprietary © Metalogix19 Confidential and Proprietary © Metalogix
20 Confidential and Proprietary © Metalogix20 Confidential and Proprietary © Metalogix
Data Loss Prevention
21 Confidential and Proprietary © Metalogix21 Confidential and Proprietary © Metalogix
Data Governance
22 Confidential and Proprietary © Metalogix22 Confidential and Proprietary © Metalogix
Advanced Threat Protection
23 Confidential and Proprietary © Metalogix23 Confidential and Proprietary © Metalogix
Search and Investigation
24 Confidential and Proprietary © Metalogix24 Confidential and Proprietary © Metalogix
25 Confidential and Proprietary © Metalogix25 Confidential and Proprietary © MetalogixIntune
26 Confidential and Proprietary © Metalogix26 Confidential and Proprietary © Metalogix
Azure Information Protection
27 Confidential and Proprietary © Metalogix27 Confidential and Proprietary © Metalogix
Classifications A.K.A. Labels
28 Confidential and Proprietary © Metalogix28 Confidential and Proprietary © MetalogixCompliance Manager
29 Confidential and Proprietary © Metalogix29 Confidential and Proprietary © Metalogix
3rd Party Bolt-ons
30 Confidential and Proprietary © Metalogix30 Confidential and Proprietary © Metalogix
31 Confidential and Proprietary © Metalogix31 Confidential and Proprietary © Metalogix
Final Thoughts
32 Confidential and Proprietary © Metalogix32 Confidential and Proprietary © Metalogix
Know your users
Be Careful to not lock down too much
Monitor, Review, Adapt, Update, Check
Microsoft is still building out the stack
The future is Hybrid
33 Confidential and Proprietary © Metalogix33 Confidential and Proprietary © Metalogix
THANK YOU FOR JOINING US
• You can find the webinar recording on Metalogix.com/webinars
• Our next webinar will cover key SharePoint Migration Tips, seats
are going fast so register today on www.metalogix/webinars.
I hope you all enjoy the rest of your week!
34 Confidential and Proprietary © Metalogix34 Confidential and Proprietary © Metalogix
Move, Manage, Protect
metalogix.com | 202.609.9100