SlideShare a Scribd company logo
1 of 19
Download to read offline
Information Protection
Business Ready Security Solutions

Presenter
Title
Date
Agenda


         • Business Needs and IT Challenges
         • Business Ready Security
         • Information Protection
         • Customer Testimonial
         • The Road Ahead
         • Getting Started
         • Summary
Customer Problem and Pains
 “Information Privacy is the most important security concern in the enterprise, outranking
                             malware in 2007 for the first time”




Personal Information Loss                                     IP2, National Security                 Personal Information Loss
-Sci-tech today 06/21/07                                      -Sci-tech today 06/15/07               -www.privacyrights.org, August 2008

Ohio state government loses 269,000                           A consultant from Los Alamos sent an   A flash drive with Social Security
confidential information of taxpayers                         e-mail containing highly classified,   numbers and other personal
and employees. See more…                                      non-encrypted nuclear weapons to       information was removed from the
                                                              several board members who              unattended laptop of a state employee.
                                                              forwarded it to other members
 Source: Ohio Data Loss Scope Broadens. Sci-Tech Today.com,
 June 2007. http://www.sci-tech-                              see more…
 today.com/story.xhtml?story_id=53225




 Other high-profile incidents:
 1.       T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M
 2.       Veterans Affairs, 26.5M PII1 records. Financial loss: $500M
 3.       Boeing, 382,000 PII1 records stolen. Financial loss: undetermined


                        Significant financial, business, and reputation loss due to regulatory
                                compliance violations and intellectual property leaks
Business Needs and IT Challenges
  Discover and classify information    Sensitive information stored
   based on business importance           in multiple locations

    Secure sensitive information
                                       Difficulty in discovering and
      while in use, in motion,
                                           securing information
             and at rest

     Enable simplified access to
                                      Multiple locations and devices
    information from anywhere


   Demonstrate compliance with             Easy access to sensitive
    information control policies      information on multiple devices




    BUSINESS Needs                            IT Needs
  Agility and Flexibility                     Control
Business Ready Security
Help securely enable business by managing risk and empowering people




 Protect everywhere,                     Identity                    Simplify the security
  access anywhere                                                        experience,
                                                                     manage compliance

                            Highly Secure & Interoperable Platform



                            Integrate and extend
                              security across the
                                  enterprise
                                                                      from:   to:
                                                                      Block   Enable
                                                                       Cost   Value
                                                                     Siloed   Seamless
Business Ready Security Solutions

   Secure Messaging      Secure Collaboration      Secure Endpoint


                       Information Protection




                  Identity and Access Management
Information Protection

    Discover, protect, and manage confidential data throughout your business with a
    comprehensive solution integrated with the computing platform and applications



    PROTECT everywhere              INTEGRATE and                SIMPLIFY security,
     ACCESS anywhere                EXTEND security             MANAGE compliance




 • Protect critical data       • Extend confidential          • Simplify deployment
   wherever It goes               communication to              and ongoing
                                  partners                      management
 • Protect data wherever it
   resides                     • Built into the Windows       • Enable compliance with
                                  platform and                  information policy
 • Secure endpoints to            applications
   reduce risk
Protect Critical Information Wherever It Goes



  • Automatically protect sensitive
        e-mail with Active Directory
        Rights Management Services

  • Filter message body and subject
        based on content criteria
                                                                                                                                             SSN# 0000



  • Policy-based restricted usage of
        e-mail attachments




  “
Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
Protect Information Wherever It Resides


     • Automatically discover and
           classify sensitive information
     • Protect information based on
           content, context, and identity
     • Ensure only authorized usage
           through persistent policies
     • Restricts users from sharing
           inappropriate content




  “
Source: Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RSA-Partner-to-Develop-NextGen-Data-Loss-Prevention/
Secure Endpoints to Reduce Risk




               Access policy for                                             Reduce information loss risk                                                         Classify and protect
              removable media                                                  through integrated disk                                                             information with
                                                                                     encryption                                                                     built-in AD RMS




                          Device Control                                                             BitLocker




   “
Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
Enable Secure, Seamless Access to Information



• Ability to move seamlessly between
      applications
• Eliminate the need to manage external
      accounts
• Simplified and flexible claims-based
      federation
• Simplified partner on-boarding through
      administrative tools and wizards




  “
Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
Simplify Management



  • Automatically apply information policies
        from within Microsoft Office SharePoint®
        Server and Microsoft Exchange Server
  • Demonstrate compliance with logging
        and auditing tools
  • Simplify management by centrally
        applying information protection
        templates




  “
Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
Current Situation
Discovery, classification, and protection of sensitive information is expensive

                                 Sensitive information is sent via e-mail
                                  because partners do not have access
                                           to collaboration site




        Limited to no access
                                                                            Limited to no access




                          SSN# 0000
Information Protection Solution
Enterprise-wide classification, discovery, and protection




                                                      Classification and protection
                                                           built into platform




                                 SSN# 0000
Customer Testimonial
        Dow Corning uses enterprise rights management to help protect intellectual property

                                                          A global leader in silicon-based technology and innovation through a joint
                                                          venture between Corning and Dow Chemical



                  BUSINESS SITUATION                                                               SOLUTION                                                  BENEFITS PROVIDED

             • With 4,000 patents globally,                                       • The company deployed Active                                        • Ease of use and management
               protecting its intellectual                                          Directory Rights Management
               property (IP) is a business                                          Services in Windows Server                                         • Minimal additional
               imperative                                                           2008, which enables users to                                         infrastructure and complexity
                                                                                    limit how others can open,
             • More specifically, Dow Corning                                       modify, print, forward, or take                                    • Extensibility to business partners
               wanted to institutionalize how it                                    other actions with content
               protected IP in a way that could                                                                                                        • Full corporate control and
               be scaled across the enterprise                                                                                                           auditability

                                                                                                                                                       • Low total cost of ownership




             “
Source: Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
Getting Started

 Hands-on Labs and VMs


                           Architecture Planning and
    Evaluation Guides
                                 Design Guides

                             Infrastructure Planning
   Proof of Concepts
                                      Guide




   Operations Guides      Data Protection Using Rights
                             Management Services

  Administrator Guides    Secure Remote Application
                                  Publishing
 Troubleshooting Guides
The Road Ahead
     Management




                     Management Consoles
  Access Solutions
   Protection &
     Platform




                                           Subject to Change
Information Protection

    Discover, protect, and manage confidential data throughout your business with a
    comprehensive solution integrated with the computing platform and applications



    PROTECT everywhere              INTEGRATE and                SIMPLIFY security,
     ACCESS anywhere                EXTEND security             MANAGE compliance




 • Protect critical data       • Extend confidential          • Simplify deployment
   wherever It goes               communication to              and ongoing
                                  partners                      management
 • Protect data wherever it
   resides                     • Built into the Windows       • Enable compliance with
                                  platform and                  information policy
 • Secure endpoints to            applications
   reduce risk



Learn more at: www.microsoft.com/forefront
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be
registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of
this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this
presentation.

MICROSOFT MAKES NO WARRANTIES, EXPRESSED, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

More from Microsoft Private Cloud

Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyMicrosoft Private Cloud
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingMicrosoft Private Cloud
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyMicrosoft Private Cloud
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...Microsoft Private Cloud
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyMicrosoft Private Cloud
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Microsoft Private Cloud
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Private Cloud
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperMicrosoft Private Cloud
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Microsoft Private Cloud
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Microsoft Private Cloud
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperMicrosoft Private Cloud
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Microsoft Private Cloud
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Microsoft Private Cloud
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftMicrosoft Private Cloud
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteMicrosoft Private Cloud
 
Avail Advanced Email Features with Microsoft Exchange Online: Whitepaper
Avail Advanced Email Features with Microsoft Exchange Online: WhitepaperAvail Advanced Email Features with Microsoft Exchange Online: Whitepaper
Avail Advanced Email Features with Microsoft Exchange Online: WhitepaperMicrosoft Private Cloud
 
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...Microsoft Private Cloud
 

More from Microsoft Private Cloud (20)

Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO Survey
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth Modeling
 
A Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud PowerA Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud Power
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from Microsoft
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
A Microsoft Approach to Cloud Computing
A Microsoft Approach to Cloud ComputingA Microsoft Approach to Cloud Computing
A Microsoft Approach to Cloud Computing
 
Avail Advanced Email Features with Microsoft Exchange Online: Whitepaper
Avail Advanced Email Features with Microsoft Exchange Online: WhitepaperAvail Advanced Email Features with Microsoft Exchange Online: Whitepaper
Avail Advanced Email Features with Microsoft Exchange Online: Whitepaper
 
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...
Protect your Messages & Access them from Anywhere with Microsoft Exchange Onl...
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Microsoft India - Forefront Information Protection Deck Presentation

  • 1. Information Protection Business Ready Security Solutions Presenter Title Date
  • 2. Agenda • Business Needs and IT Challenges • Business Ready Security • Information Protection • Customer Testimonial • The Road Ahead • Getting Started • Summary
  • 3. Customer Problem and Pains “Information Privacy is the most important security concern in the enterprise, outranking malware in 2007 for the first time” Personal Information Loss IP2, National Security Personal Information Loss -Sci-tech today 06/21/07 -Sci-tech today 06/15/07 -www.privacyrights.org, August 2008 Ohio state government loses 269,000 A consultant from Los Alamos sent an A flash drive with Social Security confidential information of taxpayers e-mail containing highly classified, numbers and other personal and employees. See more… non-encrypted nuclear weapons to information was removed from the several board members who unattended laptop of a state employee. forwarded it to other members Source: Ohio Data Loss Scope Broadens. Sci-Tech Today.com, June 2007. http://www.sci-tech- see more… today.com/story.xhtml?story_id=53225 Other high-profile incidents: 1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M 2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M 3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined Significant financial, business, and reputation loss due to regulatory compliance violations and intellectual property leaks
  • 4. Business Needs and IT Challenges Discover and classify information Sensitive information stored based on business importance in multiple locations Secure sensitive information Difficulty in discovering and while in use, in motion, securing information and at rest Enable simplified access to Multiple locations and devices information from anywhere Demonstrate compliance with Easy access to sensitive information control policies information on multiple devices BUSINESS Needs IT Needs Agility and Flexibility Control
  • 5. Business Ready Security Help securely enable business by managing risk and empowering people Protect everywhere, Identity Simplify the security access anywhere experience, manage compliance Highly Secure & Interoperable Platform Integrate and extend security across the enterprise from: to: Block Enable Cost Value Siloed Seamless
  • 6. Business Ready Security Solutions Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management
  • 7. Information Protection Discover, protect, and manage confidential data throughout your business with a comprehensive solution integrated with the computing platform and applications PROTECT everywhere INTEGRATE and SIMPLIFY security, ACCESS anywhere EXTEND security MANAGE compliance • Protect critical data • Extend confidential • Simplify deployment wherever It goes communication to and ongoing partners management • Protect data wherever it resides • Built into the Windows • Enable compliance with platform and information policy • Secure endpoints to applications reduce risk
  • 8. Protect Critical Information Wherever It Goes • Automatically protect sensitive e-mail with Active Directory Rights Management Services • Filter message body and subject based on content criteria SSN# 0000 • Policy-based restricted usage of e-mail attachments “ Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
  • 9. Protect Information Wherever It Resides • Automatically discover and classify sensitive information • Protect information based on content, context, and identity • Ensure only authorized usage through persistent policies • Restricts users from sharing inappropriate content “ Source: Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RSA-Partner-to-Develop-NextGen-Data-Loss-Prevention/
  • 10. Secure Endpoints to Reduce Risk Access policy for Reduce information loss risk Classify and protect removable media through integrated disk information with encryption built-in AD RMS Device Control BitLocker “ Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
  • 11. Enable Secure, Seamless Access to Information • Ability to move seamlessly between applications • Eliminate the need to manage external accounts • Simplified and flexible claims-based federation • Simplified partner on-boarding through administrative tools and wizards “ Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
  • 12. Simplify Management • Automatically apply information policies from within Microsoft Office SharePoint® Server and Microsoft Exchange Server • Demonstrate compliance with logging and auditing tools • Simplify management by centrally applying information protection templates “ Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
  • 13. Current Situation Discovery, classification, and protection of sensitive information is expensive Sensitive information is sent via e-mail because partners do not have access to collaboration site Limited to no access Limited to no access SSN# 0000
  • 14. Information Protection Solution Enterprise-wide classification, discovery, and protection Classification and protection built into platform SSN# 0000
  • 15. Customer Testimonial Dow Corning uses enterprise rights management to help protect intellectual property A global leader in silicon-based technology and innovation through a joint venture between Corning and Dow Chemical BUSINESS SITUATION SOLUTION BENEFITS PROVIDED • With 4,000 patents globally, • The company deployed Active • Ease of use and management protecting its intellectual Directory Rights Management property (IP) is a business Services in Windows Server • Minimal additional imperative 2008, which enables users to infrastructure and complexity limit how others can open, • More specifically, Dow Corning modify, print, forward, or take • Extensibility to business partners wanted to institutionalize how it other actions with content protected IP in a way that could • Full corporate control and be scaled across the enterprise auditability • Low total cost of ownership “ Source: Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
  • 16. Getting Started Hands-on Labs and VMs Architecture Planning and Evaluation Guides Design Guides Infrastructure Planning Proof of Concepts Guide Operations Guides Data Protection Using Rights Management Services Administrator Guides Secure Remote Application Publishing Troubleshooting Guides
  • 17. The Road Ahead Management Management Consoles Access Solutions Protection & Platform Subject to Change
  • 18. Information Protection Discover, protect, and manage confidential data throughout your business with a comprehensive solution integrated with the computing platform and applications PROTECT everywhere INTEGRATE and SIMPLIFY security, ACCESS anywhere EXTEND security MANAGE compliance • Protect critical data • Extend confidential • Simplify deployment wherever It goes communication to and ongoing partners management • Protect data wherever it resides • Built into the Windows • Enable compliance with platform and information policy • Secure endpoints to applications reduce risk Learn more at: www.microsoft.com/forefront
  • 19. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESSED, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.