microsoft 365 - security in a cloud-enabled world 

39
Microsoft 365 – Security in a Cloud-Enabled World Notes: If you experience audio issues during the webinar, you can dial in through telephone details provided to you in your registration confirmation email. Please feel free to post questions in the questions dialog & we will try to answer as many as we can at the end. Recording of this session will be shared in next 24-48 hours. You can also write to us at [email protected] for any clarifications or information.

Upload: winwire-technologies-inc

Post on 23-Jan-2018

109 views

Category:

Software


3 download

TRANSCRIPT

Page 1: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft 365 – Security in a

Cloud-Enabled WorldNotes:

If you experience audio issues during the webinar, you can dial in through telephone details provided to you in

your registration confirmation email.

Please feel free to post questions in the questions dialog & we will try to answer as many as we can at the end.

Recording of this session will be shared in next 24-48 hours.

You can also write to us at [email protected] for any clarifications or information.

Page 2: Microsoft 365 - Security in a Cloud-Enabled World 

Session Speaker

Jeff Gellman

VP - Technology Solutions

WinWire Technologies

Page 3: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 4: Microsoft 365 - Security in a Cloud-Enabled World 

A complete, intelligent, secure solution to empower employees

Intelligent security

Unlocks creativity

Built for teamwork

Integratedfor simplicity

Microsoft 365 Enterprise

Page 5: Microsoft 365 - Security in a Cloud-Enabled World 

Unlocks Creativity

Work naturally with ink, voice and touch

Visualize information in new ways

Create compelling content with intelligent apps

Build on the work and expertise of others

Page 6: Microsoft 365 - Security in a Cloud-Enabled World 

Built for Teamwork

Enterprise-class email, voice and video

Connect everyone with company-wide

communities

Share and collaborate on documents in real

time

Includes Microsoft Teams, the new chat-based

workspace

Page 7: Microsoft 365 - Security in a Cloud-Enabled World 

Integrated for Simplicity

Always up-to-date

Self-service deployment

Cloud-based management

Rich telemetry from your environment

Reduce TCO with consolidated solutions

Page 8: Microsoft 365 - Security in a Cloud-Enabled World 

Intelligent Security

Protect identity, apps, data & devices

Thwart advanced threats

Manage data archiving, governance & discovery

Powered by Microsoft Intelligent Security Graph

Accelerate GDPR compliance

Page 9: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 10: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft 365 Enterprise

Office 365

Enterprise

Enterprise Mobility

+ Security

Windows 10

Enterprise

• Chat- centric workspace

• Email & Calendar

• Voice, Video & Meetings

• Office applications/ co-authoring

• Sites & Content Management

• Analytics

• Advanced Security & Compliance

• Identity & Access Management

• Managed Mobile Productivity

• Information Protection

• Identity Driven Security

• Advanced Endpoint Security

• Designed For Modern IT

• More Productive

• Powerful, Modern devices

Page 11: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft 365 E3 Microsoft 365 E5

Microsoft 365 Enterprise

Page 12: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft 365 Enterprise E3

Chat- centric workspace Teams

Email & Calendar Outlook

Voice, Video & Meetings Skype for Business

Co-creating content Office ProPlus

Sites & Content managementSharePoint and OneDrive

AnalyticsDelve

Security & ComplianceData Loss Prevention

M I C R O S O F T 3 6 5 E 3

Office 365 Enterprise E3 Enterprise Mobility

+ Security E3Windows 10 Enterprise E3

Identity & Access ManagementAzure Active Directory Premium P1

Managed Mobile Productivity Microsoft Intune

Information ProtectionAzure Information Protection Premium P1

Identity Driven SecurityMicrosoft Advanced Threat Analytics

Advanced Endpoint Security Credential Guard, Device Guard

Designed For Modern ITAzure AD Join, Dynamic Management

More ProductiveWindows Ink, Cortana at Work

Powerful, Modern devicesInnovative designs,, new in class devices

Page 13: Microsoft 365 - Security in a Cloud-Enabled World 

VoicePSTN Conferencing, Cloud PBX

Analytics Power BI Pro, Delve Analytics

Security & ComplianceATP, TI, ASM, Advanced eDiscovery & more

M I C R O S O F T 3 6 5 E 5

Office 365 Enterprise E5 Enterprise Mobility

+ Security E5 Windows 10 Enterprise E5

Identity & Access ManagementAzure Active Directory Premium P2

Information ProtectionAzure Information Protection Premium P2

Identity Driven SecurityMicrosoft Cloud App Security

Advanced Endpoint SecurityWindows Defender Advanced Threat Protection

Microsoft 365 Enterprise E5

Page 14: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 15: Microsoft 365 - Security in a Cloud-Enabled World 
Page 16: Microsoft 365 - Security in a Cloud-Enabled World 
Page 17: Microsoft 365 - Security in a Cloud-Enabled World 

YOURSECURITY POSTURE

!

DETECTusing targeted signals, behavioral monitoring, and machine learning

RESPONDclosing the gap between discovery and action

PROTECTacross all endpoints, from sensors to the datacenter

Microsoft Security Approach

Page 18: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 19: Microsoft 365 - Security in a Cloud-Enabled World 

Reinventing Productivity for the Digital Transformation

Collaboration IntelligenceMobility Trust

Page 20: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft’s Transparency Vision

Know where your data is stored

Understand who has access your data and under

what circumstances.

Monitor the state of your service, get historic view of

uptime

Integrate security events’ feeds into your company

security dashboard

Gain insight with access to service dashboards &

operational reporting

Page 21: Microsoft 365 - Security in a Cloud-Enabled World 

Microsoft’s customers are the owner of their data.

Microsoft does not mine its customer data for advertising purposes.

Privacy controls enable you to configure your company privacy policies.

Microsoft advocates for data privacy on behalf of it’s customers.

Microsoft safeguards customer data with strong contractual commitments.

Microsoft’s Privacy Vision

Page 22: Microsoft 365 - Security in a Cloud-Enabled World 

Built-in operational security

Safeguards to prevent unauthorized access and data loss

Detect and protect against external threats

Microsoft’s Security Vision

Page 23: Microsoft 365 - Security in a Cloud-Enabled World 

Physical security with 24-hour monitoring and multi-

factor authentication

Admin background checks

Zero-standing access to data

Data encryption at-rest and in-transit

Red team / Blue team penetration testing and incident response practice

Product development using Security Development Lifecycle

Bug bounty program to identify vulnerabilities

Microsoft’s Operational Security Vision

Page 24: Microsoft 365 - Security in a Cloud-Enabled World 

Meet compliance obligations for data access with

Customer Lockbox

Monitor and investigate events related to your data with full audit tracking

Reduced cost and risk with in-place intelligent Advanced eDiscovery.

Efficiently perform risk assessment with Service Assurance.

Manage data retention with Advanced Data Governance.

Microsoft’s Compliance Vision

Page 25: Microsoft 365 - Security in a Cloud-Enabled World 

Personal apps

Managed apps

Identify, label, classify, set policies to help protect

information

Encrypt your data and restrict access using Azure Information Protection

Safeguard information with Data Loss Prevention

Get visibility into and improve your security position with Secure Score

Restrict unauthorized data sharing across apps with MAM

Prevent data leaks with support for Windows Information Protection

Manage data on devices through built-in MDM

Safeguarding Your Data

Page 26: Microsoft 365 - Security in a Cloud-Enabled World 

Detect and Protect Against External Threats

Block 100% of known malware and 99% of spam

with Exchange Online Protection.

Provide zero-day protection against unknown malware in attachments and links with Advanced Threat Protection.

Providing actionable insights to global attack trends with Threat Intelligence.

Get alerts of suspicious behavior using Advanced Security Management.

Secure user accounts with Conditional Access and multi-factor authentication.

Page 27: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 28: Microsoft 365 - Security in a Cloud-Enabled World 

IdentityDetect and respond to identity-based threats:Microsoft Azure Active DirectoryAdvanced Security Management

Protect against password attacks:Multi-Factor Authentication for Office 365

Apps, Data and ComplianceProtect against data leakage:Office 365 Data Loss Prevention

Protect against malware and phishing attacks:Office 365 Advanced Threat Protection

Respond to security incidents and comply:Advanced Compliance with Customer Lockbox, Advanced eDiscovery & Advanced Data Governance

Leverage data to understand threats and respond:Threat Intelligence

DevicesManage mobile devices and applications:Mobile Device Management for Office 365

Platform Security in Office 365

Page 29: Microsoft 365 - Security in a Cloud-Enabled World 

Agenda

Introducing

Microsoft 365

Enterprise

Microsoft 365

Enterprise Plans

Microsoft’s Security

Approach

Microsoft’s Security

Vision

Platform Security in

Microsoft 365

Enterprise

Security Tools in

Microsoft 365

Enterprise

Page 30: Microsoft 365 - Security in a Cloud-Enabled World 

Security Tools in Microsoft 365 Enterprise

• Advanced Threat Protection

• Advanced Security Management

• Advanced Data Governance

• Customer Lockbox

• Advanced eDiscovery

• Threat Intelligence

• Advanced Threat Analytics

• Cloud App Security

• Intune

• Azure Active Directory Premium

• Azure Information Protection

• Advanced Threat Protection

• Information Protection

• Credential Guard

• Device Guard

Office 365Enterprise Mobility

+ Security

Windows 10

Page 31: Microsoft 365 - Security in a Cloud-Enabled World 

Advanced Threat Protection

Time-of-click protection against malicious URLs

Zero-day protection against malicious attachments

Critical insights into external threats

Integrated across apps & services

Intelligence sharing with devices

Page 32: Microsoft 365 - Security in a Cloud-Enabled World 

Advanced Security Management

Threat detection

Enhanced control

Discovery and insights

Page 33: Microsoft 365 - Security in a Cloud-Enabled World 

Advanced Data Governance

Leverage intelligence to automate data retention

Classify data based on age, type, user, or sensitivity

Policy recommendations based on machine learning

Apply actions to preserve high value data

Purge redundant, obsolete, and trivial data

Page 34: Microsoft 365 - Security in a Cloud-Enabled World 

Customer Lockbox

Meet Compliance Needs

Extended access Control

Visibility into actions

Page 35: Microsoft 365 - Security in a Cloud-Enabled World 

Advanced eDiscovery

Identify relevant documents

Identify data relationships

Organize and reduce the data prior to review

Page 36: Microsoft 365 - Security in a Cloud-Enabled World 

Threat Intelligence

Broad visibility into attack trends

Billions of data points from Office, Windows, and

Azure

Integrated data from external cyber threat hunters

Proactive security policy management

Intuitive dashboards with drill-down capabilities

Page 37: Microsoft 365 - Security in a Cloud-Enabled World 

Secure Score

Insights into your security position

Guidance to increase your security level

Page 38: Microsoft 365 - Security in a Cloud-Enabled World 

Advanced Threat Analytics

On-premises platform to help you protect your

enterprise from advanced targeted attacks

Detect suspicious activities and malicious attacks

with behavioral analytics

Adapt to the changing nature of cyber-security

threats

Focus on what is important with a simple attack

timeline

Reduce false positive fatigue

Page 39: Microsoft 365 - Security in a Cloud-Enabled World 

Q & A• Website: www.winwire.com

• Email: [email protected]

• Blog: http://www.winwire.com/blog-winsights/

• Twitter: www.twitter.com/winwire