Advertisement
Advertisement

More Related Content

Slideshows for you(20)

Similar to NIC - Securing one drive and its content(20)

Advertisement
Advertisement

NIC - Securing one drive and its content

  1. Securing and its content
  2. Layers And Levels
  3. Office 365 EMS E3 EMS E5 Basic Extended Advanced Information • Controlled Access • Manuel Protection & labelling • Monitoring • Automatic Protection & labelling Devices • Enrolled • Basic MDM • Encryption • Monitoring • MDM • Monitoring with automated responses Identity • Cloud presence • Passwords • MFA • Conditional Access • Monitoring • Monitoring with automated responses • Automation Layers Levels
  4. Microsoft 365 E3 Microsoft 365 E5 Basic Extended Advanced Information • Controlled Access • Manuel Protection & labelling • Monitoring • Automatic Protection & labelling Devices • Enrolled • Basic MDM • Encryption • Monitoring • MDM • Monitoring with automated responses Identity • Cloud presence • Passwords • MFA • Conditional Access • Monitoring • Monitoring with automated responses • Automation Layers Levels
  5. Microsoft’s Side • Physical Security • Bitlocker • File Encryption • In Transit Encryption • Lockbox • BYOK
  6. Security, usability, and data sensitivity Security Usability Data sensitivityLow High
  7. Security, usability, and data sensitivity SecurityUsability Data sensitivity
  8. Security, usability, and data sensitivity Security Usability Data sensitivityLow High
  9. Built-In Features • OneDrive • Admin portal • Self-defense • Office 365 • IRM • DLP • Etc.
  10. OneDrive Self Defense
  11. DEMO: SharePoint OneDrive Portals
  12. SharePoint Built-In
  13. DEMO: SharePoint IRM
  14. EM+S E3 related features • Intune • Device Access Protection • Multi Factor Authentication • Conditional Access • Azure Information Protection
  15. The ultimate information protection is when the information protect itself
  16. DEMO: Conditional Access Information Protection
  17. EM+S E5 related features • AIP Automation • Microsoft Cloud App security
  18. DEMO: Microsoft Cloud App Security
  19. 5 Things we have learned along the way
  20. #1 Know your information
  21. #2 Know your customers/users.
  22. #3 Avoid frustrated users
  23. #4 Have a dedicated pilot group
  24. #5 Training and user motivation is vital.
  25. Knowledge speaks, but wisdom listens Jimi Hendrix
  26. Olav Tvedt Principal Solutions Architect Twitter: @olavtwitt Blog: https://olavtvedt.blogspot.com LinkedIn: https://www.linkedin.com/in/otvedt
Advertisement