SlideShare a Scribd company logo
1 of 34
© 2015 Netskope. All Rights Reserved.
Presenters
2
Insert pic of
Shamiana
Adrian Sanabria
Senior Analyst
451 Research
Shamiana Soderberg
Senior Business
Development Manager,
Cloud Productivity,
Microsoft
Jamie Barnett
Chief Marketing Officer,
Netskope
© 2015 Netskope. All Rights Reserved.
Brief Introduction of Netskope
3
• Leader in safe cloud enablement
• Founded in 2012
• Architects from Palo Alto Networks,
Juniper, Cisco, McAfee, VMware
• Microsoft Premier Solutions Partner,
member of OneAPI advisory board, and
invite-only Microsoft O365 TAP program
+
Professional Tools &
Capabilities
“Our Ability to quickly expand
and open new franchises would
not be possible without the
turnkey capabilities enabled by
office 365.”
Ted Vu -
Cofounder, Tastea
Learn More
Low Total Cost of
Ownership
“Thanks to the high level of
security and reliability of Office
365, HSS avoids the need to
hire staff to manage security
that would be required with
using exchange server.“
Marina Johnson -
Chief Information Officer, HSS
Learn More
Secure Future
“We could see that the
Microsoft solution was very
robust and complete, and we
liked their strategy for
integration between on-
premises systems and cloud
service.“
Leandro Balbinot -
Chief Information Officer, Lojas
Renner Learn More
Low/No Switching
Costs
“Microsoft Office 365 works with
Active Directory, so we have
more control in administering
our environment - while
delivering benefits like a single
sign-on experience to
employees.”
Muttia Alkhayyat -
Chief Information Officer,
UrbaCon Learn More
Security, Compliance
& Privacy
“WITH office 365, Microsoft
could meet all of our security
requirements in addition to our
needs for regulatory and legal
compliance.”
Charles Wardrip -
Vice President of Information
Technology and Infrastructure
Services, Kindred Healthcare
Learn More
All possible with Office 365 -
online, on-premises, or hybrid.
5 Things Customers Want…
© 2015 Netskope. All Rights Reserved.
Observed in Netskope Cloud
6
• Massive adoption of Office 365,
monetizing Live and gaining share
• 37% and 124% QoQ growth in O365
Outlook and OneDrive, respectively
• “For business” versions in top 20 for
first time
Source: Netskope Cloud Report, Summer 2015
© 2015 Netskope. All Rights Reserved.
Helped by CIOs’ Shadow IT Consolidation Efforts
7
Source: Wall Street Journal
© 2015 Netskope. All Rights Reserved. 8
Security teams are
moving more cautiously
Lines of business have big
plans and are moving fast
© 2015 Netskope. All Rights Reserved.
Office 365 a Leader in Enterprise-Readiness and Security
9
© 2015 Netskope. All Rights Reserved.
The Cloud Requires a Shared Responsibility Model
10
App Vendors’ Responsibility:
Make Apps Secure
Users’ Responsibility:
Be Good Stewards of Policy
and Sensitive Data
© 2015 Netskope. All Rights Reserved.
Your Data Are in the Cloud Like Never Before
(Ponemon: 30% of Business Information in the Cloud)
11
30%
70%
Source: Data Breach: The Cloud Multiplier Effect, Ponemon, 2014
© 2015 Netskope. All Rights Reserved.
Netskope Cloud Report: 17.9% of Files Violate DLP Policy
12
30%
70%
Source: Netskope Cloud Report, Summer 2015
© 2015 Netskope. All Rights Reserved. 13
Source: Netskope Cloud Report, Summer 2015
© 2015 Netskope. All Rights Reserved.
Ecosystems – The Way of the World
14
• Two dozen apps, on average, per “anchor tenant”
• Share data, complete workflows
• IT only aware of 10% of all apps
• Not all apps created equal
Source: Cloud App Ecosystems: Why They Should Matter to You, Netskope, 2015
Advice for Security Teams
© 2015 Netskope. All Rights Reserved. 15
Understand the LOB’s plans for deploying Office 365. Apps?
Timelines? Solutions & workflows involving ecosystem apps?
Articulate your policies. Let them know how this
applies to the cloud apps they’re using.
Put a plan in place to encourage consumption
of Office 365 through user coaching.
Allow is the new block (allow is new block green light slide)
19
Without getting in the way of business process.
Security Brass Tacks
© 2015 Netskope. All Rights Reserved. 20
© 2015 Netskope. All Rights Reserved.
Key Security Requirements for a Shared Responsibility Model
21
Policy and Access
Control
Risk
Anomalies
Forensics
Data Governance
© 2015 Netskope. All Rights Reserved.
Policy and Access Control Across the Suite and its Ecosystem
22
Create
Delete
Download
Edit
Login Attempt
Login Failed
Login Successful
Logout
Post
Share
Upload
View
View All
Office 365 users
(on-campus, mobile, remote)
© 2015 Netskope. All Rights Reserved. 23
First, admins. Separate admin privileges across apps, e.g.,
Exchange and SharePoint privileges. “Least privilege.”
© 2015 Netskope. All Rights Reserved.
Three Must-Haves for Shared Responsibility in Office 365
24
Policy and Access
Control
Risk
Anomalies
Forensics
Data Governance
for
Next, users: Grant granular access policies, e.g., web-only
email for BYOD; full suite for corporate-issued.
© 2015 Netskope. All Rights Reserved.
Don’t Forget the Ecosystem!
(Azure AD can bring ecosystem apps into your identity fold)
25
★
★
★
★
★
★
© 2015 Netskope. All Rights Reserved.
Then, Discover and Govern Sensitive Data
26
API-based DLP
In-line DLP
Find and control content
already in Office 365
Monitor and control
content en route
to and from Office 365
and its ecosystem
© 2015 Netskope. All Rights Reserved. 27
© 2014 Netskope. All Rights Reserved.
Finally, Detect Risks and Anomalies in O365 and its Ecosystem
28
• Detect non-compliant behavior
and security threats
• Behaviors like excessive
downloads or failed logins
• Same user logins from two
separate devices or locations
© 2015 Netskope. All Rights Reserved.
And Keep Robust Audit Trails
29
• Conduct forensic analysis
across all cloud apps
• Confirm and report on
suspicious activity
• Don’t guess; prove it so
you can take action
WHO?
WHAT?
WHEN?
WITH WHOM?
FROM WHERE?
TO WHERE?
ON WHAT DEVICE?
OS? BROWSER?
…EVERYTHING!
© 2015 Netskope. All Rights Reserved. 30
Examples from the Front Lines
© 2015 Netskope. All Rights Reserved. 31
© 2015 Netskope. All Rights Reserved.
GLOBAL RETAILER
32
Solution:
• Netskope for Office 365
• Netskope Active
• Netskope Active DLP
Challenges:
• New roll-out of Office 365
• Granular admin controls, user auditing,
and by-device access control
• Data visibility within/en route to suite,
including doc fingerprinting
Benefits:
• Secure content in Office 365 by discovering content against PCI and PII profiles
• Visibility and usage control for 20,000 knowledge workers and lightweight control for
Yammer for 160,000 hourly employees
+
© 2015 Netskope. All Rights Reserved. 33
Solution:
• Netskope for Office 365
• Netskope Active
• Netskope Active DLP
Challenges:
• Security audit revealed cloud risk
• Migration from alternative to Office 365
• Visibility into PCI and PII in cloud for
200,000+ global employees
Benefits:
• Discover DLP violations (PCI and PII) in Google Apps and prioritize migration to Office
365
• Legal hold for content related to legal and regulatory investigation
• Visibility and control for all apps; identify and coach users of alternatives to Office 365
GLOBAL HOSPITALITY CO.
+
Thank You, and Q&A
Adrian Sanabria
adrian.sanabria@451research.com
Shamiana Soderberg
shamians@microsoft.com
Jamie Barnett
jamie@netskope.com

More Related Content

What's hot

Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudNetskope
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
Securing The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpSecuring The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpDevOps.com
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Tripwire
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 

What's hot (20)

Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Securing The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpSecuring The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom Up
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 

Similar to Office 365 in Focus. Security and Governance Strategies from the Experts - Webinar Slides

Safely Enabling Office 365
Safely Enabling Office 365Safely Enabling Office 365
Safely Enabling Office 365HammerNJ
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Amazon Web Services
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Optimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudOptimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudEnterprise Management Associates
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
A New Day for Oracle Analytics
A New Day for Oracle AnalyticsA New Day for Oracle Analytics
A New Day for Oracle AnalyticsRich Clayton
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzSeniorStoryteller
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)ITpreneurs
 
The Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITThe Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITXebiaLabs
 
Deloitte & Mulesoft : The Right Mix
Deloitte & Mulesoft : The Right MixDeloitte & Mulesoft : The Right Mix
Deloitte & Mulesoft : The Right MixDavid Graham
 
7. Andy Campbell - Make the Most of the Cloud
7. Andy Campbell -  Make the Most of the Cloud7. Andy Campbell -  Make the Most of the Cloud
7. Andy Campbell - Make the Most of the CloudCedar Consulting
 

Similar to Office 365 in Focus. Security and Governance Strategies from the Experts - Webinar Slides (20)

Safely Enabling Office 365
Safely Enabling Office 365Safely Enabling Office 365
Safely Enabling Office 365
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Agile EcoSystem
Agile EcoSystemAgile EcoSystem
Agile EcoSystem
 
Optimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudOptimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the Cloud
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
A New Day for Oracle Analytics
A New Day for Oracle AnalyticsA New Day for Oracle Analytics
A New Day for Oracle Analytics
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
 
The Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITThe Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise IT
 
Deloitte & Mulesoft : The Right Mix
Deloitte & Mulesoft : The Right MixDeloitte & Mulesoft : The Right Mix
Deloitte & Mulesoft : The Right Mix
 
7. Andy Campbell - Make the Most of the Cloud
7. Andy Campbell -  Make the Most of the Cloud7. Andy Campbell -  Make the Most of the Cloud
7. Andy Campbell - Make the Most of the Cloud
 

More from Netskope

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Netskope
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesNetskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPNetskope
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportNetskope
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportNetskope
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope
 

More from Netskope (16)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Office 365 in Focus. Security and Governance Strategies from the Experts - Webinar Slides

  • 1.
  • 2. © 2015 Netskope. All Rights Reserved. Presenters 2 Insert pic of Shamiana Adrian Sanabria Senior Analyst 451 Research Shamiana Soderberg Senior Business Development Manager, Cloud Productivity, Microsoft Jamie Barnett Chief Marketing Officer, Netskope
  • 3. © 2015 Netskope. All Rights Reserved. Brief Introduction of Netskope 3 • Leader in safe cloud enablement • Founded in 2012 • Architects from Palo Alto Networks, Juniper, Cisco, McAfee, VMware • Microsoft Premier Solutions Partner, member of OneAPI advisory board, and invite-only Microsoft O365 TAP program +
  • 4.
  • 5. Professional Tools & Capabilities “Our Ability to quickly expand and open new franchises would not be possible without the turnkey capabilities enabled by office 365.” Ted Vu - Cofounder, Tastea Learn More Low Total Cost of Ownership “Thanks to the high level of security and reliability of Office 365, HSS avoids the need to hire staff to manage security that would be required with using exchange server.“ Marina Johnson - Chief Information Officer, HSS Learn More Secure Future “We could see that the Microsoft solution was very robust and complete, and we liked their strategy for integration between on- premises systems and cloud service.“ Leandro Balbinot - Chief Information Officer, Lojas Renner Learn More Low/No Switching Costs “Microsoft Office 365 works with Active Directory, so we have more control in administering our environment - while delivering benefits like a single sign-on experience to employees.” Muttia Alkhayyat - Chief Information Officer, UrbaCon Learn More Security, Compliance & Privacy “WITH office 365, Microsoft could meet all of our security requirements in addition to our needs for regulatory and legal compliance.” Charles Wardrip - Vice President of Information Technology and Infrastructure Services, Kindred Healthcare Learn More All possible with Office 365 - online, on-premises, or hybrid. 5 Things Customers Want…
  • 6. © 2015 Netskope. All Rights Reserved. Observed in Netskope Cloud 6 • Massive adoption of Office 365, monetizing Live and gaining share • 37% and 124% QoQ growth in O365 Outlook and OneDrive, respectively • “For business” versions in top 20 for first time Source: Netskope Cloud Report, Summer 2015
  • 7. © 2015 Netskope. All Rights Reserved. Helped by CIOs’ Shadow IT Consolidation Efforts 7 Source: Wall Street Journal
  • 8. © 2015 Netskope. All Rights Reserved. 8 Security teams are moving more cautiously Lines of business have big plans and are moving fast
  • 9. © 2015 Netskope. All Rights Reserved. Office 365 a Leader in Enterprise-Readiness and Security 9
  • 10. © 2015 Netskope. All Rights Reserved. The Cloud Requires a Shared Responsibility Model 10 App Vendors’ Responsibility: Make Apps Secure Users’ Responsibility: Be Good Stewards of Policy and Sensitive Data
  • 11. © 2015 Netskope. All Rights Reserved. Your Data Are in the Cloud Like Never Before (Ponemon: 30% of Business Information in the Cloud) 11 30% 70% Source: Data Breach: The Cloud Multiplier Effect, Ponemon, 2014
  • 12. © 2015 Netskope. All Rights Reserved. Netskope Cloud Report: 17.9% of Files Violate DLP Policy 12 30% 70% Source: Netskope Cloud Report, Summer 2015
  • 13. © 2015 Netskope. All Rights Reserved. 13 Source: Netskope Cloud Report, Summer 2015
  • 14. © 2015 Netskope. All Rights Reserved. Ecosystems – The Way of the World 14 • Two dozen apps, on average, per “anchor tenant” • Share data, complete workflows • IT only aware of 10% of all apps • Not all apps created equal Source: Cloud App Ecosystems: Why They Should Matter to You, Netskope, 2015
  • 15. Advice for Security Teams © 2015 Netskope. All Rights Reserved. 15
  • 16. Understand the LOB’s plans for deploying Office 365. Apps? Timelines? Solutions & workflows involving ecosystem apps?
  • 17. Articulate your policies. Let them know how this applies to the cloud apps they’re using.
  • 18. Put a plan in place to encourage consumption of Office 365 through user coaching.
  • 19. Allow is the new block (allow is new block green light slide) 19 Without getting in the way of business process.
  • 20. Security Brass Tacks © 2015 Netskope. All Rights Reserved. 20
  • 21. © 2015 Netskope. All Rights Reserved. Key Security Requirements for a Shared Responsibility Model 21 Policy and Access Control Risk Anomalies Forensics Data Governance
  • 22. © 2015 Netskope. All Rights Reserved. Policy and Access Control Across the Suite and its Ecosystem 22 Create Delete Download Edit Login Attempt Login Failed Login Successful Logout Post Share Upload View View All Office 365 users (on-campus, mobile, remote)
  • 23. © 2015 Netskope. All Rights Reserved. 23 First, admins. Separate admin privileges across apps, e.g., Exchange and SharePoint privileges. “Least privilege.”
  • 24. © 2015 Netskope. All Rights Reserved. Three Must-Haves for Shared Responsibility in Office 365 24 Policy and Access Control Risk Anomalies Forensics Data Governance for Next, users: Grant granular access policies, e.g., web-only email for BYOD; full suite for corporate-issued.
  • 25. © 2015 Netskope. All Rights Reserved. Don’t Forget the Ecosystem! (Azure AD can bring ecosystem apps into your identity fold) 25 ★ ★ ★ ★ ★ ★
  • 26. © 2015 Netskope. All Rights Reserved. Then, Discover and Govern Sensitive Data 26 API-based DLP In-line DLP Find and control content already in Office 365 Monitor and control content en route to and from Office 365 and its ecosystem
  • 27. © 2015 Netskope. All Rights Reserved. 27
  • 28. © 2014 Netskope. All Rights Reserved. Finally, Detect Risks and Anomalies in O365 and its Ecosystem 28 • Detect non-compliant behavior and security threats • Behaviors like excessive downloads or failed logins • Same user logins from two separate devices or locations
  • 29. © 2015 Netskope. All Rights Reserved. And Keep Robust Audit Trails 29 • Conduct forensic analysis across all cloud apps • Confirm and report on suspicious activity • Don’t guess; prove it so you can take action WHO? WHAT? WHEN? WITH WHOM? FROM WHERE? TO WHERE? ON WHAT DEVICE? OS? BROWSER? …EVERYTHING!
  • 30. © 2015 Netskope. All Rights Reserved. 30
  • 31. Examples from the Front Lines © 2015 Netskope. All Rights Reserved. 31
  • 32. © 2015 Netskope. All Rights Reserved. GLOBAL RETAILER 32 Solution: • Netskope for Office 365 • Netskope Active • Netskope Active DLP Challenges: • New roll-out of Office 365 • Granular admin controls, user auditing, and by-device access control • Data visibility within/en route to suite, including doc fingerprinting Benefits: • Secure content in Office 365 by discovering content against PCI and PII profiles • Visibility and usage control for 20,000 knowledge workers and lightweight control for Yammer for 160,000 hourly employees +
  • 33. © 2015 Netskope. All Rights Reserved. 33 Solution: • Netskope for Office 365 • Netskope Active • Netskope Active DLP Challenges: • Security audit revealed cloud risk • Migration from alternative to Office 365 • Visibility into PCI and PII in cloud for 200,000+ global employees Benefits: • Discover DLP violations (PCI and PII) in Google Apps and prioritize migration to Office 365 • Legal hold for content related to legal and regulatory investigation • Visibility and control for all apps; identify and coach users of alternatives to Office 365 GLOBAL HOSPITALITY CO. +
  • 34. Thank You, and Q&A Adrian Sanabria adrian.sanabria@451research.com Shamiana Soderberg shamians@microsoft.com Jamie Barnett jamie@netskope.com

Editor's Notes

  1. Jamie
  2. Jamie
  3. Supplemental Questions to pose to Customers Considering Google: Do end users value fully integrated productivity, communications and collaboration across the Enterprise (e.g. messaging, video conferencing, web-based file sharing)? Does the customer have power user needs around MS Office advanced functionality (BI using excel, professional PowerPoints, etc.) What is the potential investment costs associated with switching to Google when considering deployment, change management, applications integration, end-user training, additional software components (e.g. connectors, middleware, client compatibility tools, etc.)? Does it the customer have different business units (and requirements) for usability, security, data privacy, and applications integration? Are there any pre-existing business dependencies on Office LOB (line of business) or SharePoint applications? Are there critical architecture dependencies such as Active Directory and the ongoing need to manage and maintain these services? What’s the customer’s strategy around risk management? Have they considered the impact of moving to ‘Google’s Island’ in terms of data sharing, security, privacy? Does the customer view government security, compliance and cross-departmental requirements as important when implementing a broad cloud strategy.
  4. Jamie
  5. Adrian
  6. Adrian
  7. Adrian & Shamiana
  8. Adrian
  9. Jamie
  10. Jamie
  11. Jamie
  12. Adrian
  13. Adrian
  14. Adrian
  15. Adrian
  16. Adrian
  17. Adrian
  18. Adrian
  19. Adrian
  20. Adrian
  21. Adrian
  22. Adrian
  23. Jamie
  24. Adrian
  25. Jamie
  26. Adrian
  27. Adrian
  28. Jamie
  29. Jamie
  30. Jamie
  31. Jamie
  32. Q&A: All