Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security

630 views

Published on

Digital transformation with freedom and peace of mind
Holistic, identity-driven protection

Help guard your data from attacks on multiple levels using innovative, identity-driven security techniques.
Productivity without compromise

Preserve the mobile and desktop experiences your workers need to stay working with familiar apps and tools.
Flexible, comprehensive solutions

Do more with less—protect users, devices, apps, and data with intuitive mobile management on a future-ready platform.

microsoft@atidan.com

Published in: Technology
  • Be the first to comment

Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security

  1. 1. New blind spots for IT Data breaches 63% of confirmed data breaches involve weak, default, or stolen passwords Shadow IT >80% of employees admit using non-approved SaaS apps for work purposes Cybercrimes 32% of businesses reported to be affected by cybercrimes
  2. 2. Employees Partners Customers Identity Devices Apps & Data On-premises apps and data Cloud apps and data Transition to cloud & mobility New attack landscape Current defenses not sufficient+ = ? Microsoft Azure ?
  3. 3. Protects your data from new and changing cybersecurity attacks Innovative Enhances threat and anomaly detection with the Microsoft Intelligent Security Graph driven by a vast amount of datasets and machine learning in the cloud Intelligent Offers one protected common identity for secure access to all corporate resources, on-premises and in the cloud, with risk-based conditional access Identity-driven Addresses security challenges across users (identities), devices, data, apps, and platforms―on- premises and in the cloud Holistic
  4. 4. Holistic. Innovative. Intelligent. Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses Protect at the front door Gain deep visibility into user, device, and data activity on-premises and in the cloud. Protect your data against user mistakes Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics. Detect attacks before they cause damage
  5. 5. Conditions Allow access Block access Actions Location (IP range) Device state User groupUser Identity Protection MFA Risk On-premises applications Microsoft Azure Risk-based conditional access Privileged Identity Management How can I protect my organization at the front door?
  6. 6. Cloud App Security Risk scoring Shadow IT Discovery Policies for data control How do I gain visibility and control of my cloud apps? Microsoft Intune How do I prevent data leakage from my mobile apps? LOB app protection DLP for Office 365 mobile apps Optional device management Azure Information Protection Classify & Label Protect How do I control data on-premises and in the cloud Monitor and Respond
  7. 7. How do I detect attacks in the cloud? Cloud App Security (App level) • Behavioral analytics • Anomaly detection How do I detect on-premises attacks? Azure Active Directory (Identity level) • Behavioral Analytics • Security reporting and monitoring On-premises Microsoft Advanced Threat Analytics Detection in the cloud On-premises detection Cloud Microsoft Cloud App Security Azure Active Directory Premium Advanced Threat Analytics • User and Entity Behavioral Analytics • Detection of known malicious attacks and security issues
  8. 8. Azure Information ProtectionProtect your data, everywhere Microsoft Cloud App Security Azure Active Directory Extend enterprise-grade security to your cloud and SaaS apps Protect devices and apps Microsoft Intune Enterprise Mobility + Security Detect problems early with visibility and threat analytics Microsoft Advanced Threat Analytics Manage identity with hybrid integration to protect application access from identity attacks
  9. 9. Information protection Identity-driven security Managed mobile productivity Identity and access management Azure Information Protection Premium P2 Intelligent classification and protection for files and emails shared inside and outside your organization (includes all capabilities in P1) Azure Information Protection Premium P1 Manual classification and protection for files and emails shared inside and outside your organization Cloud-based file tracking Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities (includes all capabilities in P1) Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting EMS E3 EMS E5
  10. 10. Is it possible to keep up? Employees Business partners Customers The Microsoft vision Secure and protect against new threats Maximum productivity experience Comprehensive and integrated Apps Devices Data Users
  11. 11. On-premises Firewall Corp email, business apps • Open access for users – any device, any network • Unrestricted sharing methods – users decide how to share • Cloud app ecosystem • Limited visibility and control • Access via managed devices and networks • Layers of defense protecting internal apps • Known security perimeter LIFE AFTER CLOUD AND MOBILITYLIFE BEFORE CLOUD AND MOBILITY Office 365
  12. 12. Transitioning to cloud and mobility Controlling/securing critical data across devices Lack of visibility and control for cloud apps End users making non- compliant choices New attack landscape Costly recovery from advanced attacks Changes in attackers’ techniques Credential theft Traditional security solutions False positives Not up to the challenge Complex
  13. 13. Protect at the front door Detect attacks before they cause damage Protect your data against user mistakes Identity-driven security scenarios
  14. 14. Risk severity calculation Remediation recommendations Risk-based conditional access automatically protects against suspicious logins and compromised credentials Gain insights from a consolidated view of machine learning based threat detection Leaked credentials Infected devices Configuration vulnerabilities Risk-based policies MFA Challenge Risky Logins Block attacks Change bad credentials Machine-Learning Engine Brute force attacks Suspicious sign- in activities PROTECT AT THE FRONT DOOR Identity Protection at its best
  15. 15. Security/Monitoring/Reporting SolutionsNotifications Data Extracts/Downloads Reporting APIs Power BI Apply Microsoft learnings to your existing security tools SIEM Monitor Tools Microsoft machine - learning engine PROTECT AT THE FRONT DOOR Use the power of Identity Protection in PowerBI, SIEM and other monitoring tools Leaked credentials Infected devices Configuration vulnerabilitiesBrute force attacks Suspicious sign- in activities
  16. 16. Audit SECURITY ADMIN Configure Privileged Identity Management USER PRIVILEGED IDENTITY MANAGEMENT Identity verification Monitor Access reports MFA ALERT Read only ADMIN PROFILES Billing Admin Global Admin Service Admin PROTECT AT THE FRONT DOOR How time-limited activation of privileged roles works MFA enforced during activation process Alerts inform administrators about out- of-band changes Users need to activate their privileges to perform a task Users retain privileges for a pre-configured amount of time Security admins can discover all privileged identities, view audit reports, and review everyone who is eligible to activate via access reviews
  17. 17. Protect at the front door Detect attacks before they cause damage Protect your data against user mistakes Identity-driven security scenarios
  18. 18. PROTECT YOUR DATA AGAINST USER MISTAKES • Discover 13,000+ cloud apps in use—no agents required • Identify all users, IP addresses, top apps, top users Shadow IT discovery • Get an automated risk score driven by 60+ parameters • See each app’s risk assessment based on its security mechanisms and compliance regulations Risk scoring • Ongoing risk detection, powerful reporting, and analytics on users, usage patterns, upload/download traffic, and transactions • Ongoing anomaly detection for discovered apps Ongoing analytics
  19. 19. PROTECT YOUR DATA AGAINST USER MISTAKES • Set granular-control security policies for your approved apps • Use out-of-the-box policies or customize your own Policy definition • Prevent data loss both inline and at rest • Govern data in the cloud, such as files stored in cloud drives, attachments, or within cloud apps • Use pre-defined templates or extend existing DLP policies DLP and data sharing • Identify policy violations, investigate on a user, file, activity level • Enforce actions such as quarantine and permissions removal • Block sensitive transactions, limit sessions for unmanaged devices Policy enforcement
  20. 20. DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT PROTECT YOUR DATA AGAINST USER MISTAKES
  21. 21. Full Data Lifecycle Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT PROTECT YOUR DATA AGAINST USER MISTAKES
  22. 22. PROTECT YOUR DATA AGAINST USER MISTAKES Simplify BYOD program - device management is optional Secure your LOB apps with App SDK and App Wrapping Tool Prevent data loss from Office mobile apps; natively built in. Personal apps Corporate apps MDM policies MAM policies File policies MDM – optional (Intune or third party) Azure Rights Management Microsoft Intune Corporate data Personal data Multi-identity policy Extend protection at file level with Azure Information Protection
  23. 23. Protect at the front door Detect attacks before they cause damage Protect your data against user mistakes Identity-driven security scenarios
  24. 24. Microsoft Advanced Threat Analytics brings the behavioral analytics concept to IT and the organization’s users. An on-premises platform to identify advanced security attacks and insider threats before they cause damage DETECT ATTACKS BEFORE THEY CAUSE DAMAGE Behavioral Analytics Detection of advanced attacks and security risks Advanced Threat Detection
  25. 25. Analyze1 DETECT ATTACKS BEFORE THEY CAUSE DAMAGE ATA analyzes all Active Directory- related traffic and collects relevant events from SIEM ATA builds the organizational security graph, detects abnormal behavior, protocol attacks, and weaknesses, and constructs an attack timeline ATA automatically learns all entities’ behaviors Learn2 Detect3
  26. 26. DETECT ATTACKS BEFORE THEY CAUSE DAMAGE Behavioral analytics Attack detection • Identify anomalies in your cloud environment which may be indicative of a breach • Leverage behavioral analytics (each user’s interaction with SaaS apps) to assess risk in each transaction • Identify and stop known attack pattern activities originating from risky sources with threat prevention enhanced with vast Microsoft threat intelligence • Coming soon: send any file through real-time behavioral malware analysis
  27. 27. Protect at the front door Detect attacks before they cause damage Protect your data against user mistakes Identity-driven security scenarios
  28. 28. Microsoft Intelligent Security Graph Unique insights into the threat landscape Informed by trillions of signals from billions of sources Powered by inputs we receive across our endpoints, consumer services, commercial services, and on-premises technologies Anomaly detection that draws from our vast amount of threat intelligence, machine learning, security research, and development data Intelligence
  29. 29. ! DETECT RESPOND PROTECT
  30. 30. User security Infrastructure security
  31. 31. Try Enterprise Mobility + Security for free, today: www.microsoft.com/en-us/cloud-platform/enterprise-mobility-trial See Microsoft Cloud App Security in action www.microsoft.com/en-us/server-cloud/products/cloud-app-security/ Explore Identity + Access Management www.microsoft.com/en-us/cloud-platform/identity-management Learn more about Azure Information Protection www.microsoft.com/en-us/cloud-platform/information-protection Discover new MDM and MAM solutions with Microsoft Intune www.microsoft.com/en-us/cloud-platform/mobile-device-managementlink Check out new Desktop virtualization capabilities www.microsoft.com/en-us/cloud-platform/desktop-virtualization
  32. 32. microsoft@atidan.com

×