SlideShare a Scribd company logo
1 of 52
Change is constant
Peoples work
expectations
Evolving
threat
landscape
Industry
regulations
and standards
Security challenges
What makes cybersecurity a complex problem?
100101
011010
100011
MalwareSpam Smart attackers Intelligent attacks
Volume of attacks Sophistication of attacks
What type of attack to launch…
Who to target in attacks…
When to launch an attack…
Hackers How often to attack…
What type of attacks are happening…
Who is attacking them…
When attackers strike…
Analysts
How often do attacks occur…
A hacker’s advantage is preparation & knowledge
Today, infrastructures are very complex
!
EXPERIENCE
• 1M+ Corporate Machines
protected by enterprise IT security
• Multi-platform
Cloud-first hybrid enterprise
• Decades of experience
as a global enterprise
• Runs on Azure
same multi-tenant Azure
environment as you
EXPERTISE
• Development Security
Security Development Lifecycle
(SDL) - ISO/IEC 27034-1
• Operational Security
Hyper-scale cloud services
• Combatting Cybercrime
partnering with law enforcement
• Incident Investigation
and recovery for customers
Visibility
ExpertiseExperience
Context
Industry leading capabilities
VISIBILITY & CONTEXT
1 billion customers
across enterprise and
consumer segments
200+ cloud services
[ Privacy/Compliance boundary ]
Balancing productivity with protection.
How do IT Pros empower their users to be
productive, while protecting the massive
amounts of data flowing through their
mobile ecosystem?
Vision
Microsoft Intune
Experience Ready
Manage your diverse mobile environment in a secure and unified way with
Microsoft Intune.
Mobile application
management
PC managementMobile device
management
Strategically direct the flow of your mobile ecosystem, giving your end
users the experience they expect while ensuring your corporate data is
protected at every turn.
Enterprise mobility management with Intune
Enable
your users
Protect
your data
Microsoft Intune
User IT
ReadyExperienceVision
MICROSOFT INTUNE
Click to edit Master title
style
Delivering on a unified
Microsoft vision
Built with EMS, Office and
Windows, Intune delivers on a
unified Microsoft vision to
transform the way enterprise
secures mobile productivity.
This combined effort enables
awesome end-to-end scenarios.
Control access to your data
Control what happens to your data
after it’s been accessed
Modern PC management
Click to edit Master title
style
Control access to data
based on real-time context
Conditional access allows you to
define policies that provide
contextual controls at the user,
location, device, and app levels.
As conditions change, natural user
prompts ensure that only the right
users on compliant devices can
access sensitive data.
Azure Active Directory
Premium
Microsoft Intune
Microsoft Intelligent
Security Graph
Risk-based conditional access
• Block access
• Wipe device
Conditions
• Allow
• Enforce MFA
• Remediate
Actions
Location (IP range)
Device state
User groupUser
MFA
Risk
On-premises
applications
Microsoft Azure
Risk (Low, Medium, High)
Click to edit Master title
style Managed apps
Personal appsPersonal apps
Managed apps
MDM – optional
(Intune or 3rd-party)
Our app protection policies allow you
to control what happens to docs and
data after they’ve been accessed.
• App encryption at rest
• App access control – PIN or credentials
• Save as/copy/paste restrictions
• App-level selective wipe
• Managed web browsing
• Secure viewing of PDFs, images, videos
Control what happens
after the data is accessed
Corporate
data
Personal
data
Multi-identity policy
Click to edit Master title
style
With the different options in
Windows 10, plus Configuration
Manager and Intune, you have the
flexibility to stage implementation
of modern management scenarios
while targeting different devices
the way that best suits your
business needs.
Everything you need for
modern PC management
ReadyVision
MICROSOFT INTUNE
Experience
Click to edit Master title
styleAn awesome end-user
and IT Pro experience
Natural and intuitive, the best
experience for both end users
and IT Pros. The control and
support IT requires; the
experience your people
expect.
Real Office apps
Protect data with and without device
enrollment
Intune on Azure
Support to get you started and
keep you going day-to-day
Click to edit Master title
style
The Office apps end-users
expect
Give your people the real Office
experience they expect, without
compromising the control you
need. Intune gives you
unparalleled control over the data
in that moves through Office -
across all your devices.
Click to edit Master title
style
Protect with and without
enrollment
Intune’s application protection
policies give you the versatility to
manage your data with or without
device enrollment.
Click to edit Master title
styleWorld class support –
included
FastTrack provides you access to a
team of engineers dedicated to
helping you plan and execute your
deployment. And our 24/7
support ensures you have the
support you need day to day.
Both included with your Intune subscription.
Vision Experience
MICROSOFT INTUNE
Ready
Click to edit Master title
styleMeets your immediate
needs and adapts to your
evolving IT strategy.
Microsoft Intune is built from
the cloud, with the flexibility
and control that meets your
needs today, and scales as
your mobile strategy matures
and evolves over time.
Microsoft Cloud Infrastructure
Inclusive partner ecosystem
Flexibility and choice in how you manage
your mobile ecosystem
Click to edit Master title
style
You need flexibility in a
complex device ecosystem
Microsoft Intune provides you
option that allow you to keep your
data secure across a range of
scenarios that occur day-to-day.
Our MAM and MDM capabilities
allow you to protect corporate data
with or without device
management.
Company-Managed
Employee-Managed
3rd Party-Managed
Click to edit Master title
style
Click to edit Master title
style
The best control with
Intune-enlightened apps
All Intune-enlightened applications
are built with the Intune App SDK,
enabling them with the richest set
of mobile application protection
policies available.
Many also support multi-identity
and without enrollment scenarios.
Click to edit Master title
style
Also manage apps via
native OS app controls
Intune can also manage apps via
native app controls that are
exposed through iOS and Android
operating systems. This capability
extends Intune’s app ecosystem
beyond our SDK built enlightened
apps, to include many other
popular business apps.
Only for managed devices.
Click to edit Master title
style
A growing partner
ecosystem
Intune partnerships are designed to
enhance our core functionality by
delivering interoperability with
popular point solutions our
customers want and rely upon.
All partner products must be purchased directly from the partner
Device is compliant
Device is managed
Scans apps for risk
ITScans unknown
network for risk
Allow access or
Block access
Enforce MFA per
user/per app
Device compliant
Scans OS for vulnerability
Risk (Low, Medium, High)
X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
Cisco ISE enforcement
VPN
WiFi
X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
NetScaler enforcement
VPN
Click to edit Master title
style
Delivered from the cloud
Because Microsoft Intune is cloud-
based, it lowers costs and
eliminates the need to plan,
purchase, and maintain on premise
hardware and infrastructure.
Intune is always up to date, and
scales with ease as your needs
evolve.
Key take away’s
PARTNERING TO IMPROVE CYBER SECURITY
HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
Azure has the deepest and most comprehensive compliance coverage in the industry
March
2017

More Related Content

What's hot

What's hot (20)

IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
 

Similar to Atea erfa microsoft mobile security

Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 

Similar to Atea erfa microsoft mobile security (20)

Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Intune Deployment .pptx
Intune Deployment .pptxIntune Deployment .pptx
Intune Deployment .pptx
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Understanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptxUnderstanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptx
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 

Recently uploaded

一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
ayvbos
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Recently uploaded (20)

Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuineSholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 

Atea erfa microsoft mobile security

  • 1.
  • 2.
  • 3. Change is constant Peoples work expectations Evolving threat landscape Industry regulations and standards
  • 5.
  • 6. What makes cybersecurity a complex problem? 100101 011010 100011 MalwareSpam Smart attackers Intelligent attacks Volume of attacks Sophistication of attacks
  • 7. What type of attack to launch… Who to target in attacks… When to launch an attack… Hackers How often to attack… What type of attacks are happening… Who is attacking them… When attackers strike… Analysts How often do attacks occur… A hacker’s advantage is preparation & knowledge
  • 9.
  • 10.
  • 11.
  • 12. !
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. EXPERIENCE • 1M+ Corporate Machines protected by enterprise IT security • Multi-platform Cloud-first hybrid enterprise • Decades of experience as a global enterprise • Runs on Azure same multi-tenant Azure environment as you EXPERTISE • Development Security Security Development Lifecycle (SDL) - ISO/IEC 27034-1 • Operational Security Hyper-scale cloud services • Combatting Cybercrime partnering with law enforcement • Incident Investigation and recovery for customers Visibility ExpertiseExperience Context Industry leading capabilities VISIBILITY & CONTEXT 1 billion customers across enterprise and consumer segments 200+ cloud services
  • 21. Balancing productivity with protection. How do IT Pros empower their users to be productive, while protecting the massive amounts of data flowing through their mobile ecosystem?
  • 22. Vision Microsoft Intune Experience Ready Manage your diverse mobile environment in a secure and unified way with Microsoft Intune.
  • 23. Mobile application management PC managementMobile device management Strategically direct the flow of your mobile ecosystem, giving your end users the experience they expect while ensuring your corporate data is protected at every turn. Enterprise mobility management with Intune Enable your users Protect your data Microsoft Intune User IT
  • 25. Click to edit Master title style Delivering on a unified Microsoft vision Built with EMS, Office and Windows, Intune delivers on a unified Microsoft vision to transform the way enterprise secures mobile productivity. This combined effort enables awesome end-to-end scenarios. Control access to your data Control what happens to your data after it’s been accessed Modern PC management
  • 26. Click to edit Master title style Control access to data based on real-time context Conditional access allows you to define policies that provide contextual controls at the user, location, device, and app levels. As conditions change, natural user prompts ensure that only the right users on compliant devices can access sensitive data.
  • 27. Azure Active Directory Premium Microsoft Intune Microsoft Intelligent Security Graph Risk-based conditional access • Block access • Wipe device Conditions • Allow • Enforce MFA • Remediate Actions Location (IP range) Device state User groupUser MFA Risk On-premises applications Microsoft Azure Risk (Low, Medium, High)
  • 28. Click to edit Master title style Managed apps Personal appsPersonal apps Managed apps MDM – optional (Intune or 3rd-party) Our app protection policies allow you to control what happens to docs and data after they’ve been accessed. • App encryption at rest • App access control – PIN or credentials • Save as/copy/paste restrictions • App-level selective wipe • Managed web browsing • Secure viewing of PDFs, images, videos Control what happens after the data is accessed Corporate data Personal data Multi-identity policy
  • 29. Click to edit Master title style With the different options in Windows 10, plus Configuration Manager and Intune, you have the flexibility to stage implementation of modern management scenarios while targeting different devices the way that best suits your business needs. Everything you need for modern PC management
  • 31. Click to edit Master title styleAn awesome end-user and IT Pro experience Natural and intuitive, the best experience for both end users and IT Pros. The control and support IT requires; the experience your people expect. Real Office apps Protect data with and without device enrollment Intune on Azure Support to get you started and keep you going day-to-day
  • 32. Click to edit Master title style The Office apps end-users expect Give your people the real Office experience they expect, without compromising the control you need. Intune gives you unparalleled control over the data in that moves through Office - across all your devices.
  • 33. Click to edit Master title style Protect with and without enrollment Intune’s application protection policies give you the versatility to manage your data with or without device enrollment.
  • 34. Click to edit Master title styleWorld class support – included FastTrack provides you access to a team of engineers dedicated to helping you plan and execute your deployment. And our 24/7 support ensures you have the support you need day to day. Both included with your Intune subscription.
  • 36. Click to edit Master title styleMeets your immediate needs and adapts to your evolving IT strategy. Microsoft Intune is built from the cloud, with the flexibility and control that meets your needs today, and scales as your mobile strategy matures and evolves over time. Microsoft Cloud Infrastructure Inclusive partner ecosystem Flexibility and choice in how you manage your mobile ecosystem
  • 37. Click to edit Master title style You need flexibility in a complex device ecosystem Microsoft Intune provides you option that allow you to keep your data secure across a range of scenarios that occur day-to-day. Our MAM and MDM capabilities allow you to protect corporate data with or without device management. Company-Managed Employee-Managed 3rd Party-Managed
  • 38. Click to edit Master title style
  • 39. Click to edit Master title style The best control with Intune-enlightened apps All Intune-enlightened applications are built with the Intune App SDK, enabling them with the richest set of mobile application protection policies available. Many also support multi-identity and without enrollment scenarios.
  • 40. Click to edit Master title style Also manage apps via native OS app controls Intune can also manage apps via native app controls that are exposed through iOS and Android operating systems. This capability extends Intune’s app ecosystem beyond our SDK built enlightened apps, to include many other popular business apps. Only for managed devices.
  • 41. Click to edit Master title style A growing partner ecosystem Intune partnerships are designed to enhance our core functionality by delivering interoperability with popular point solutions our customers want and rely upon. All partner products must be purchased directly from the partner
  • 42. Device is compliant Device is managed Scans apps for risk ITScans unknown network for risk Allow access or Block access Enforce MFA per user/per app Device compliant Scans OS for vulnerability Risk (Low, Medium, High)
  • 43. X X X X X ✓ Require enrollment through the Intune portal to ensure compliance Intune conditions Device managed Device compliant ✓ Enforce appropriate network access policies based on mobile device posture and risk assessment. Allow access Block access Cisco ISE enforcement VPN WiFi
  • 44. X X X X X ✓ Require enrollment through the Intune portal to ensure compliance Intune conditions Device managed Device compliant ✓ Enforce appropriate network access policies based on mobile device posture and risk assessment. Allow access Block access NetScaler enforcement VPN
  • 45. Click to edit Master title style Delivered from the cloud Because Microsoft Intune is cloud- based, it lowers costs and eliminates the need to plan, purchase, and maintain on premise hardware and infrastructure. Intune is always up to date, and scales with ease as your needs evolve.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51. PARTNERING TO IMPROVE CYBER SECURITY
  • 52. HIPAA / HITECH Act FERPA GxP 21 CFR Part 11 Singapore MTCS UK G-Cloud Australia IRAP/CCSL FISC Japan New Zealand GCIO China GB 18030 EU Model Clauses ENISA IAF Argentina PDPA Japan CS Mark Gold CDSA Shared Assessments Japan My Number Act FACT UK GLBA Spain ENS PCI DSS Level 1 MARS-E FFIEC China TRUCS Canada Privacy Laws MPAA Privacy Shield India MeitY Germany IT Grundschutz workbook Spain DPA HITRUST IG Toolkit UK China DJCP ITAR Section 508 VPAT SP 800-171 FIPS 140-2 High JAB P-ATO CJIS DoD DISA SRG Level 2 DoD DISA SRG Level 4 IRS 1075 DoD DISA SRG Level 5 Moderate JAB P-ATO GLOBALUSGOVINDUSTRYREGIONAL ISO 27001 SOC 1 Type 2ISO 27018 CSA STAR Self-AssessmentISO 27017 SOC 2 Type 2 SOC 3ISO 22301 CSA STAR Certification CSA STAR AttestationISO 9001 Azure has the deepest and most comprehensive compliance coverage in the industry March 2017