your attack surface just got bigger · infosec teams need to be able to detect and respond to...

1
Your attack surface just got BIGGER Protect your organisation with Microsoft and Ultima Microsoft Security Integration with Ultima Digital transformation is changing the way employees work. Cloud based platforms and the availability of apps across different operating systems mean workers can access systems and data from anywhere, at any time and on any device. While this is allowing us to work more dynamically on the device we prefer, it presents a challenge to IT. Security used to mean protecting the perimeter: high, thick walls with heavily guarded doors preventing intruders from getting in and assets from getting out. Data can now be downloaded to a multitude of unmanaged devices, shared far beyond organisational boundaries or stored within publicly accessible platforms such as Microsoft Office 365. The challenge that businesses face is to provide enough security to allow its workers to continue working in a flexible and productive manner, while protecting corporate data, devices, and user identities. InfoSec teams need to be able to detect and respond to threats and breaches quickly and automatically, minimising the damage done. Data Security Can you protect your data on endpoints, in the cloud and in transit? Who is accessing your data? With the massive expansion in mobile and flexible working, data can be stored on a plethora of devices and platforms, both managed and unmanaged. It’s very difficult to keep the controls on the devices without getting in the way of productivity, which means if we want to keep data from getting into the wrong hands, we need to secure it. Preserving User Experience Is your security a hurdle for users to climb over? Good security should be invisible to the user. If you put too many obstacles in the way of someone trying to do their job then it is likely they will try and get round the security. The experience should be as clean and seamless as possible with the security measures based on the risk. If you are accessing a publicly available document then there should be no need to challenge for credentials or multi-factor authentication (MFA). If you are accessing an administrative console then it should be on a temporarily elevated account with MFA. Visibility and Auditing Do all your privileged accounts need to be admin's? Do you know what cloud applications are being used? Would you know if credentials had been compromised? James Comey - FBI Director once said “There are two kinds of big companies: those who’ve been hacked, and those who don’t know they’ve been hacked.” Always assume a breach could occur and have the tools available to identify suspicious behaviour associated with compromised accounts, devices and the use of resources. Mitigating Risk Is your organisation able to grant access to resources based on risk and in real time? If we have a sensitive document, we can lock it away in a safe so that no one can access it. Sadly this is not very productive. What we want to do is understand the risks involved in providing access and apply appropriate security controls, so if a user is trying to enter a system they don’t normally use from a device that is not recognised, it can be challenged. In order to understand the potential benefits and their relevance for your business, Ultima will carry out a Microsoft security integration workshop. This session will help you plan for the future through education, interviews and recommendations. We will provide you with an overview of the current threat landscape facing your organisation and help you learn about key security features in Windows 10, Office 365 and Enterprise Mobility and Security Suite. Specialists from our Modern Workspace practice will talk with you about users and devices in standard, administration, business sensitive as well as low trust workstations scenarios, giving you the opportunity to witness the potential for change throughout your organisation. We’ll give you recommendations to address gaps in your security portfolio, alongside a high-level time-line for implementation, so that you can begin planning for the delivery of a modern and highly robust security platform. Our team can then deliver on the recommendations made in accordance with Microsoft and general security best practices, either as a proof of concept, a pilot or a production implementation. Finally, we can fully mange the solutions on your behalf from our ITIL-aligned ISO 27001 compliant 24x7 Technical Support Centre, notifying you of risk events, investigating potential breaches and providing you with regular updates on the latest products included in the suites and updated best practices. Data Loss Prevention Comply with business standards and industry regulations, preventing sensitive data from being disclosed via email, and protect information across OneDrive and SharePoint Online. O365 Advanced Threat Protection By protecting against unsafe attachments and expanding protection against malicious links, ATP helps prevent zero- day malware attacks in your messaging environment. Office 365 and Exchange Windows Defender Built-in to Windows 10, it automatically scans programs you open, downloads new definitions from Windows Update and provides an interface you can use for in-depth malware scans. Windows Information Protection WIP uses the Encrypted File System (EFS) to protect data, which is retained across devices. Together with Azure Information Protection, this can be extended into the Office 365 cloud. Windows Defender - Advanced Threat Protection Uses a combination of behavioural sensors, cloud security analytics and threat intelligence to enable enterprise customers to detect, investigate and respond to advanced threats BitLocker Is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen or inappropriately decommissioned computers. Windows 10 Microsoft Security Products In response to constantly evolving threats, Windows 10 with supporting technologies in EM+S and Office 365 has introduced many innovative security features. These help harden identity, data and devices against common attacks, and help you respond more effectively to breaches when they happen. Classify and Secure Data Discover how Rights Management and Data Loss Protection, built into Office can prevent sensitive email data and Office files from being leaked outside your organisation. Using buttons and rulesets, see how files can be automatically or manually classified and labelled. Managed Mobile Productivity Learn how Windows, iOS and Android devices can be managed on a per- application basis for personal devices, with corporate data both separated and encrypted. Experience how email and Office files can be secured without compromising end user experience, allowing users to encrypt and share files outside the business, track usage and withdraw access at any time. Insight into Cloud Apps Find out which software as a service (SaaS) applications your workforce is accessing and what the risks could mean for your users. Obtain deep insight into platforms such as Office 365, Box, Salesforce, ServiceNow, Google Apps, Amazon Web Services, Dropbox and Okta to monitor activity and alert for potential security breaches in those platforms. Identity Driven Security Utilising data from billions of authentications to the Microsoft platform, establish how attacks can be identified using behavioural analytics and anomaly detection before they are able to cause major damage. Learn how access to resources can be granted on a real-time risk score, with authentication stepped up to MFA if the risk increases. Reduce the attack surface by granting privileges on a just-in-time basis, with audit trails to maintain compliance. Enterprise Mobility & Security Suite (EM+S) - E5 Plan Enterprise Mobility & Security Suite (EM+S) - E3 Plan Azure AD Premium Adds enterprise-level identity management capabilities, including MFA; access control based on device health, user location, and holistic security reports, audits and alerts. Microsoft InTune Provide mobile device, application and PC management from the cloud. Deep integration with Microsoft Office 365, helping to keep company data secure within mobile apps. Azure Information Protection P1 Provides persistent data protection of files shared internally and externally, including the option to track, report, classify and label data, as well as remove access to files. Advanced Threat Analytics Extend visibility, auditing and control over on premise and cloud apps. Detect threats with behavioural analytics, reduce false positives and create organisational security graphs. Azure AD Identity Protection Detect potential vulnerabilities affecting your organisation’s identities, configure automated responses to suspicious activities and take appropriate action to resolve issues. Privileged Identity Management Manage, control, and monitor access within your organisation. Enable just in time access to administrative roles in the Microsoft cloud with step ups to Azure MFA for activation. Azure Information Protection P2 Builds on the capabilities of P1 by enabling automated data classification and Hold Your Own Key (HYOK), that spans Azure and AD Rights Management for highly regulated senarios. Cloud App Security Adapt to the changing nature of cyber-security threats by leveraging deep packet inspection to provide deep visibility and control of data inside cloud applications. At Ultima, we believe that the best security is that which you can’t see. Our dedicated team of Modern Workspace specialists can help you realise your vision of a more capable, dynamic and cost effective security platform, based upon Microsoft Enterprise Mobility & Security Suite, Office 365 and Windows 10. As a Microsoft Gold partner, we're able to design, deliver and manage all aspects of Microsoft's security stack, including data classification and loss prevention, mobile device, content and application management, cloud application security, and identity and access management. Certified Experts Delivered by qualified consultants from our Modern Workspace practice, specialising in delivering Microsoft security engagements. Connected Services Gain access to the Ultima ecosystem, linking in associated strategic and tactical engagements including network, security and beyond. Information and Cyber Security With a dedicated Assurance and Compliance division, we can provide additional support around GDPR, PCS DSS and ISO 27001. Vision and Leadership Our architects and consultants are able to support strategic business imperatives and become a trusted Microsoft security advisor. E3 E5 2 3 1 Protect Your Environment Detect Cyber Threats Respond To Breaches Fast Head Office Gainsborough House Manor Park, Basingstoke Road Reading, Berkshire, RG2 0NA 0333 015 8000 [email protected] www.ultima.com © Ultima Business Solutions 2017

Upload: others

Post on 28-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Your attack surface just got BIGGER · InfoSec teams need to be able to detect and respond to threats and breaches quickly and automatically, minimising the damage done. Data Security

Your attack surface just got

BIGGER Protect your organisation with Microsoft and Ultima

Microsoft Security Integration with Ultima

Digital transformation is changing the way employees work. Cloud based platforms and the availability of apps across different operating systems mean workers can access systems and data from anywhere, at any time and on any device. While this is allowing us to work more dynamically on the device we prefer, it presents a challenge to IT.

Security used to mean protecting the perimeter: high, thick walls with heavily guarded doors preventing intruders from getting in and assets from getting out. Data can now be downloaded to a multitude of unmanaged devices, shared far beyond organisational boundaries or stored within publicly accessible platforms such as Microsoft Office 365.

The challenge that businesses face is to provide enough security to allow its workers to continue working in a flexible and productive manner, while protecting corporate data, devices, and user identities. InfoSec teams need to be able to detect and respond to threats and breaches quickly and automatically, minimising the damage done.

Data Security Can you protect your data on endpoints, in the cloud and in transit? Who is accessing your data? With the massive expansion in mobile and flexible working, data can be stored on a plethora of devices and platforms, both managed and unmanaged. It’s very difficult to keep the controls on the devices without getting in the way of productivity, which means if we want to keep data from getting into the wrong hands, we need to secure it.

Preserving User Experience Is your security a hurdle for users to climb over? Good security should be invisible to the user. If you put too many obstacles in the way of someone trying to do their job then it is likely they will try and get round the security. The experience should be as clean and seamless as possible with the security measures based on the risk. If you are accessing a publicly available document then there should be no need to challenge for credentials or multi-factor authentication (MFA). If you are accessing an administrative console then it should be on a temporarily elevated account with MFA.

Visibility and Auditing Do all your privileged accounts need to be admin's? Do you know what cloud applications are being used? Would you know if credentials had been compromised? James Comey - FBI Director once said “There are two kinds of big companies: those who’ve been hacked, and those who don’t know they’ve been hacked.” Always assume a breach could occur and have the tools available to identify suspicious behaviour associated with compromised accounts, devices and the use of resources.

Mitigating Risk

Is your organisation able to grant access to resources based on

risk and in real time?

If we have a sensitive document, we can lock it away in a safe so that no one can access it. Sadly this is not very productive. What we want to do is understand the risks involved in providing access and apply appropriate security controls, so if a user is trying to enter a system they don’t normally use from a device that is not recognised, it can be challenged.

In order to understand the potential benefits and their relevance for your business, Ultima will carry out a Microsoft security integration workshop. This session will help you plan for the future through education, interviews and recommendations.

We will provide you with an overview of the current threat landscape facing your organisation and help you learn about key security features in Windows 10, Office 365 and Enterprise Mobility and Security Suite.

Specialists from our Modern Workspace practice will talk with you about users and devices in standard, administration, business sensitive as well as low trust workstations scenarios, giving you the opportunity to witness the potential for change throughout your organisation.

We’ll give you recommendations to address gaps in your security portfolio, alongside a high-level time-line for implementation, so that you can begin planning for the delivery of a modern and highly robust security platform.

Our team can then deliver on the recommendations made in accordance with Microsoft and general security best practices, either as a proof of concept, a pilot or a production implementation.

Finally, we can fully mange the solutions on your behalf from our ITIL-aligned ISO 27001 compliant 24x7 Technical Support Centre, notifying you of risk events, investigating potential breaches and providing you with regular updates on the latest products included in the suites and updated best practices.

Data Loss Prevention Comply with business standards and industry regulations, preventing sensitive data from being disclosed via email, and protect information across OneDrive and SharePoint Online.

O365 Advanced Threat Protection By protecting against unsafe attachments and expanding protection against malicious links, ATP helps prevent zero- day malware attacks in your messaging environment.

Office 365 and Exchange

Windows Defender Built-in to Windows 10, it automatically scans programs you open, downloads new definitions from Windows Update and provides an interface you can use for in-depth malware scans.

Windows Information Protection WIP uses the Encrypted File System (EFS) to protect data, which is retained across devices. Together with Azure Information Protection, this can be extended into the Office 365 cloud.

Windows Defender - Advanced Threat Protection Uses a combination of behavioural sensors, cloud security analytics and threat intelligence to enable enterprise customers to detect, investigate and respond to advanced threats BitLocker Is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen or inappropriately decommissioned computers.

Windows 10

Microsoft Security Products

In response to constantly evolving threats, Windows 10 with supporting technologies in EM+S and Office 365 has introduced many innovative security features. These help harden identity, data and devices

against common attacks, and help you respond more effectively to breaches when they happen.

Classify and Secure Data Discover how Rights Management and Data Loss Protection, built into Office can prevent sensitive email data and Office files from being leaked outside your organisation. Using buttons and rulesets, see how files can be automatically or manually classified and labelled.

Managed Mobile Productivity Learn how Windows, iOS and Android devices can be managed on a per-application basis for personal devices, with corporate data both separated and encrypted. Experience how email and Office files can be secured without compromising end user experience, allowing users to encrypt and share files outside the business, track usage and withdraw access at any time.

Insight into Cloud Apps

Find out which software as a service (SaaS) applications your workforce is accessing and what the risks could mean for your users. Obtain deep insight into platforms such as Office 365, Box, Salesforce, ServiceNow, Google Apps, Amazon Web Services, Dropbox and Okta to monitor activity and alert for potential security breaches in those platforms.

Identity Driven Security

Utilising data from billions of authentications to the Microsoft platform, establish how attacks can be identified using behavioural analytics and anomaly detection before they are able to cause major damage. Learn how access to resources can be granted on a real-time risk score, with authentication stepped up to MFA if the risk increases. Reduce the attack surface by granting privileges on a just-in-time basis, with audit trails to maintain compliance.

Enterprise Mobility & Security Suite (EM+S) - E5 Plan

Enterprise Mobility & Security Suite (EM+S) - E3 Plan

Azure AD Premium Adds enterprise-level identity management capabilities, including MFA; access control based on device health, user location, and holistic security reports, audits and alerts.

Microsoft InTune Provide mobile device, application and PC management from the cloud. Deep integration with Microsoft Office 365, helping to keep company data secure within mobile apps.

Azure Information Protection P1 Provides persistent data protection of files shared internally and externally, including the option to track, report, classify and label data, as well as remove access to files. Advanced Threat Analytics Extend visibility, auditing and control over on premise and cloud apps. Detect threats with behavioural analytics, reduce false positives and create organisational security graphs.

Azure AD Identity Protection Detect potential vulnerabilities affecting your organisation’s identities, configure automated responses to suspicious activities and take appropriate action to resolve issues.

Privileged Identity Management Manage, control, and monitor access within your organisation. Enable just in time access to administrative roles in the Microsoft cloud with step ups to Azure MFA for activation.

Azure Information Protection P2 Builds on the capabilities of P1 by enabling automated data classification and Hold Your Own Key (HYOK), that spans Azure and AD Rights Management for highly regulated senarios.

Cloud App Security Adapt to the changing nature of cyber-security threats by leveraging deep packet inspection to provide deep visibility and control of data inside cloud applications.

At Ultima, we believe that the best security is that which you can’t see. Our dedicated team of Modern Workspace specialists can help you realise your vision of a more capable, dynamic and cost effective security platform, based upon Microsoft Enterprise Mobility & Security Suite, Office 365 and Windows 10.

As a Microsoft Gold partner, we're able to design, deliver and manage all aspects of Microsoft's security stack, including data classification and loss prevention, mobile device, content and application management, cloud application security, and identity and access management.

Certified Experts Delivered by qualified consultants from our Modern Workspace practice, specialising in delivering Microsoft security engagements.

Connected Services Gain access to the Ultima ecosystem, linking in associated strategic and tactical engagements including network, security and beyond.

Information and Cyber Security With a dedicated Assurance and Compliance division, we can provide additional support around GDPR, PCS DSS and ISO 27001.

Vision and Leadership Our architects and consultants are able to support strategic business imperatives and become a trusted Microsoft security advisor.

E3

E5

2

3

1

Protect Your Environment

Detect Cyber Threats

Respond To Breaches Fast

Head OfficeGainsborough HouseManor Park, Basingstoke RoadReading, Berkshire, RG2 0NA

0333 015 8000 [email protected]

www.ultima.com© Ultima Business Solutions 2017