Your SlideShare is downloading. ×
Microsoft India - Forefront Information Protection Deck Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Microsoft India - Forefront Information Protection Deck Presentation

607
views

Published on

As we all know the state of information protection is in dire need of change. Clearly, the information protection currently used by many organizations is not working, resulting in massive potential …

As we all know the state of information protection is in dire need of change. Clearly, the information protection currently used by many organizations is not working, resulting in massive potential for identity fraud and billions of dollars in losses across the business world; and scarier yet, breaches in national security that could cost millions of lives.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
607
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Information Protection Business Ready Security Solutions Presenter Title Date
  • 2. Agenda • Business Needs and IT Challenges • Business Ready Security • Information Protection • Customer Testimonial • The Road Ahead • Getting Started • Summary
  • 3. Customer Problem and Pains “Information Privacy is the most important security concern in the enterprise, outranking malware in 2007 for the first time” Personal Information Loss IP2, National Security Personal Information Loss -Sci-tech today 06/21/07 -Sci-tech today 06/15/07 -www.privacyrights.org, August 2008 Ohio state government loses 269,000 A consultant from Los Alamos sent an A flash drive with Social Security confidential information of taxpayers e-mail containing highly classified, numbers and other personal and employees. See more… non-encrypted nuclear weapons to information was removed from the several board members who unattended laptop of a state employee. forwarded it to other members Source: Ohio Data Loss Scope Broadens. Sci-Tech Today.com, June 2007. http://www.sci-tech- see more… today.com/story.xhtml?story_id=53225 Other high-profile incidents: 1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M 2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M 3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined Significant financial, business, and reputation loss due to regulatory compliance violations and intellectual property leaks
  • 4. Business Needs and IT Challenges Discover and classify information Sensitive information stored based on business importance in multiple locations Secure sensitive information Difficulty in discovering and while in use, in motion, securing information and at rest Enable simplified access to Multiple locations and devices information from anywhere Demonstrate compliance with Easy access to sensitive information control policies information on multiple devices BUSINESS Needs IT Needs Agility and Flexibility Control
  • 5. Business Ready Security Help securely enable business by managing risk and empowering people Protect everywhere, Identity Simplify the security access anywhere experience, manage compliance Highly Secure & Interoperable Platform Integrate and extend security across the enterprise from: to: Block Enable Cost Value Siloed Seamless
  • 6. Business Ready Security Solutions Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management
  • 7. Information Protection Discover, protect, and manage confidential data throughout your business with a comprehensive solution integrated with the computing platform and applications PROTECT everywhere INTEGRATE and SIMPLIFY security, ACCESS anywhere EXTEND security MANAGE compliance • Protect critical data • Extend confidential • Simplify deployment wherever It goes communication to and ongoing partners management • Protect data wherever it resides • Built into the Windows • Enable compliance with platform and information policy • Secure endpoints to applications reduce risk
  • 8. Protect Critical Information Wherever It Goes • Automatically protect sensitive e-mail with Active Directory Rights Management Services • Filter message body and subject based on content criteria SSN# 0000 • Policy-based restricted usage of e-mail attachments “ Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
  • 9. Protect Information Wherever It Resides • Automatically discover and classify sensitive information • Protect information based on content, context, and identity • Ensure only authorized usage through persistent policies • Restricts users from sharing inappropriate content “ Source: Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RSA-Partner-to-Develop-NextGen-Data-Loss-Prevention/
  • 10. Secure Endpoints to Reduce Risk Access policy for Reduce information loss risk Classify and protect removable media through integrated disk information with encryption built-in AD RMS Device Control BitLocker “ Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
  • 11. Enable Secure, Seamless Access to Information • Ability to move seamlessly between applications • Eliminate the need to manage external accounts • Simplified and flexible claims-based federation • Simplified partner on-boarding through administrative tools and wizards “ Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
  • 12. Simplify Management • Automatically apply information policies from within Microsoft Office SharePoint® Server and Microsoft Exchange Server • Demonstrate compliance with logging and auditing tools • Simplify management by centrally applying information protection templates “ Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
  • 13. Current Situation Discovery, classification, and protection of sensitive information is expensive Sensitive information is sent via e-mail because partners do not have access to collaboration site Limited to no access Limited to no access SSN# 0000
  • 14. Information Protection Solution Enterprise-wide classification, discovery, and protection Classification and protection built into platform SSN# 0000
  • 15. Customer Testimonial Dow Corning uses enterprise rights management to help protect intellectual property A global leader in silicon-based technology and innovation through a joint venture between Corning and Dow Chemical BUSINESS SITUATION SOLUTION BENEFITS PROVIDED • With 4,000 patents globally, • The company deployed Active • Ease of use and management protecting its intellectual Directory Rights Management property (IP) is a business Services in Windows Server • Minimal additional imperative 2008, which enables users to infrastructure and complexity limit how others can open, • More specifically, Dow Corning modify, print, forward, or take • Extensibility to business partners wanted to institutionalize how it other actions with content protected IP in a way that could • Full corporate control and be scaled across the enterprise auditability • Low total cost of ownership “ Source: Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
  • 16. Getting Started Hands-on Labs and VMs Architecture Planning and Evaluation Guides Design Guides Infrastructure Planning Proof of Concepts Guide Operations Guides Data Protection Using Rights Management Services Administrator Guides Secure Remote Application Publishing Troubleshooting Guides
  • 17. The Road Ahead Management Management Consoles Access Solutions Protection & Platform Subject to Change
  • 18. Information Protection Discover, protect, and manage confidential data throughout your business with a comprehensive solution integrated with the computing platform and applications PROTECT everywhere INTEGRATE and SIMPLIFY security, ACCESS anywhere EXTEND security MANAGE compliance • Protect critical data • Extend confidential • Simplify deployment wherever It goes communication to and ongoing partners management • Protect data wherever it resides • Built into the Windows • Enable compliance with platform and information policy • Secure endpoints to applications reduce risk Learn more at: www.microsoft.com/forefront
  • 19. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESSED, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.