Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
Data center
security
Data loss
prevention
Compliance
tools
Anomaly
detection
Security
management
Information
rights
management
Email
security
Threat
detection
Hybrid cloud
security
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Security operations that work for you
Real-world intelligence at work
Intelligent Edge
Intelligent Cloud
Local ML models, behavior-based detection
algorithms, generics, heuristics
Metadata-based ML models
Sample analysis-based ML
models
Detonation-based ML
models
Big data
analytics
March 6 – Behavior-based detection
algorithms blocked more than 400,000
instances of the Dofoil trojan.
February 3 – Client machine learning
algorithms automatically stopped the
malware attack Emotet in real time.
October 2017 – Cloud-based detonation ML
models identified Bad Rabbit, protecting users
14 minutes after the first encounter.
2017 2018
August 2018 – Cloud machine learning
algorithms blocked a highly targeted campaign
to deliver Ursnif malware to under 200 targets
“From the expansion of ATP, to the new Security Graph API,
to Azure Sphere, it’s clear Microsoft is serious about
addressing the emerging threats that come part and parcel
with IoT...I do think Microsoft will be one of the last
standing when it comes to end-to-end security offering.”
Pat Moorhead
Moor Insights & Strategy
“Microsoft’s security offerings provide it with a
level of differentiation from its primary rivals.
Given the level of emphasis placed on security by
those rivals, we expect security to become a new
and more heated area of contention for leadership.”
Scott Crawford
451 Research
“Microsoft should probably scare most people as the biggest existential
threat…Time and time again, legacy security vendors failed to meet the
needs of their customers. Alert fatigue, poor context, poor usability, and lack
of integration capabilities continue to frustrate security teams. But now, the
tech titans are entering the market with customer-focused design,
offering integrated clouds, marketplaces, and interfaces.”
Joseph Blankenship
Forrester
“By 2022, one-third of organizations
hosting their applications on IaaS
vendors' services will use these
vendors' native IAM services.”
Gregg Kreizman
Research VP at Gartner Research
“The breadth of
Microsoft offerings
is attractive to IT
organizations that
require real-time
visibility and
control… the
capabilities of
Microsoft Cloud App
Security can enable IT
organizations to
achieve a level of
normalcy.”
Mark Bowker
ESG Group
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
Identity & access
management
Identity is at the center of security
Conditional access Identity protectionSecure authentication
Getting to a world without passwords
Microsoft Authenticator FIDO2 Security KeysWindows Hello
Azure AD
Conditional Access
User and location Device
Application Real time risk
Conditional
access
An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
Secure
identities to
reach zero trust
Strengthen your credentials by turning on MFA
Reduce your attack surface area by blocking
legacy authentication
Automate threat remediation with solutions such
as risk-based conditional access
Increase visibility into why IDs are blocked, monitor
security alerts and take action
Enable self-service capabilities for more predictable
and complete end-user security
Threat
protection
Correlate across
attack vectors
Detect & remediate
breaches
Protect the
digital estate
Help stop damaging attacks with integrated and automated security
Microsoft Threat Protection
Identities Endpoints User Data Cloud Apps Infrastructure
Intelligent Security Graph | 6.5 TRILLION signals per day
Help stop damaging
attacks with
integrated and
automated security
Quickly detect anomalous behavior through
integrated intelligence
Apply sophisticated machine learning, heuristics,
and intelligence to identify credential compromise
Reduce threat resolution times with automation
Identify and mitigate the latest email threats
Information
protection
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
Unified approach to discover,
classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations and
applications
Data growing at exponential rate
LabelDiscover Classify
Unified approach
Devices Apps Cloud services On-premises ISVs, 3rd-party
→ Sensitive data discovery
→ Data at risk
→ Policy violations
Monitor
→ Label Analytics
→ Proactive alerts
→ Supervision
Protection Governance
→ Encryption
→ Restrict access
→ Watermark
→ Header/Footer
→ Archiving
→ Retention & deletion
→ Records management
→ Event based
Apply policy
Option to manage and control your
own encryption keys to help meet
compliance needs
Additional customer controls for
added protection and control
Data is encrypted by default at-rest
and in-transit
Meets rigorous industry standards
Logging and auditing
Privileged workflow
Just in time and just enough access
The principle of zero standing access
Deliver native app experiences that
work and feel natural on any platform
Simplify access to resources
employees need across their devices
with single sign-on and conditional
access
Enable Office apps that users
love on mobile devices, without
compromising security
Locate and
classify
information
anywhere it
lives
Define sensitive data & establish your label taxonomy
Customize your protection policies – based on
internal objectives and compliance requirements
Start classifying and labeling content
Assess and adjust, based on ongoing monitoring
of sensitive data, impact on users
Security
management
Visibility Control Guidance
Devices InfrastructureApps & dataIdentity
Across
Strengthen your
security posture
with insights and
guidance
Understand your current security position
across your organization
Create policies and enable controls to better
define your security position
Use the built-in recommendations to find the
right balance of security
“If you make security hard,
people may work around it.
With Microsoft 365, we get
native capabilities, visibility into
our operational environment,
and simplicity for all employees.”
Simon Hodgkinson
Group Chief Information
Security Officer, BP
“With Advanced Threat Protection,
we’re more aware of potential
threats …. That helps us address
advanced malware threats that are
becoming more prevalent and
decreases the operational expense
of resolving security issues.”
Tony Taylor
Senior Director of Infrastructure and Security,
Land O’Lakes
Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Partner
with peers
Work with
industry alliances
Work with
government
M365
F1
$10
M365
E31
$32
M365
E51
$57
Productivity &
Collaboration
Office client apps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫
Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar
(Outlook, Exchange), social & internet (SharePoint, Yammer)
⚫2 ⚫ ⚫
Device & App
Management
Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows
Analytics Device Health
⚫ ⚫ ⚫
Security
Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure
Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3,
Windows Information Protection & BitLocker, Azure Information Protection Plan 1
⚫ ⚫ ⚫
Office 365 Data Loss Prevention ⚫ ⚫
Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan
2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP)
⚫
Compliance
Information Protection & Compliance (O365 Advanced Compliance, Azure Information
Protection Plan 2)
⚫
Voice Audio Conferencing, Phone System ⚫
Analytics
MyAnalytics ⚫ ⚫ ⚫
Delve ⚫ ⚫
Power BI Pro ⚫
PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation
SeeSpeakerNotesforfootnotes
Microsoft 365 Enterprise Plan Overview
Identity & Threat
Protection
$12
Information Protection
& Compliance
$10
M365 E5
Step-up
$25
Security O365 ATP Plan 2
1
⚫ ⚫
Microsoft Cloud App Security
2
⚫ ⚫
Azure Active Directory Plan 2 ⚫ ⚫
Azure ATP ⚫ ⚫
Windows Defender ATP ⚫ ⚫
Compliance
O365 Advanced Compliance ⚫ ⚫
Azure Information Protection Plan 2 ⚫ ⚫
Voice Phone System
3
⚫
Audio Conferencing
3
⚫
Analytics Power BI Pro
3
⚫
PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation
E5 Advanced Security & Compliance Offerings
1
Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value
2
Consolidates O365 CAS and MCAS value
© 2019 Razor Technology, LLC www.razor-tech.com
@DavidJRosenthal
Slideshare
www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Cell: 215.801.4430
Office: 866.RZR.DATA
LETS KEEP IN TOUCH

Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

  • 2.
    Cyberspace is the newbattlefield Security skills are in short supply Virtually anything can be attacked
  • 5.
  • 6.
    Security operations thatwork for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 7.
    Security operations thatwork for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 8.
  • 10.
    Real-world intelligence atwork Intelligent Edge Intelligent Cloud Local ML models, behavior-based detection algorithms, generics, heuristics Metadata-based ML models Sample analysis-based ML models Detonation-based ML models Big data analytics March 6 – Behavior-based detection algorithms blocked more than 400,000 instances of the Dofoil trojan. February 3 – Client machine learning algorithms automatically stopped the malware attack Emotet in real time. October 2017 – Cloud-based detonation ML models identified Bad Rabbit, protecting users 14 minutes after the first encounter. 2017 2018 August 2018 – Cloud machine learning algorithms blocked a highly targeted campaign to deliver Ursnif malware to under 200 targets
  • 11.
    “From the expansionof ATP, to the new Security Graph API, to Azure Sphere, it’s clear Microsoft is serious about addressing the emerging threats that come part and parcel with IoT...I do think Microsoft will be one of the last standing when it comes to end-to-end security offering.” Pat Moorhead Moor Insights & Strategy “Microsoft’s security offerings provide it with a level of differentiation from its primary rivals. Given the level of emphasis placed on security by those rivals, we expect security to become a new and more heated area of contention for leadership.” Scott Crawford 451 Research “Microsoft should probably scare most people as the biggest existential threat…Time and time again, legacy security vendors failed to meet the needs of their customers. Alert fatigue, poor context, poor usability, and lack of integration capabilities continue to frustrate security teams. But now, the tech titans are entering the market with customer-focused design, offering integrated clouds, marketplaces, and interfaces.” Joseph Blankenship Forrester “By 2022, one-third of organizations hosting their applications on IaaS vendors' services will use these vendors' native IAM services.” Gregg Kreizman Research VP at Gartner Research “The breadth of Microsoft offerings is attractive to IT organizations that require real-time visibility and control… the capabilities of Microsoft Cloud App Security can enable IT organizations to achieve a level of normalcy.” Mark Bowker ESG Group
  • 12.
    Security operations thatwork for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 13.
    Help stop damagingattacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  • 14.
  • 15.
    Identity is atthe center of security
  • 17.
    Conditional access IdentityprotectionSecure authentication
  • 18.
    Getting to aworld without passwords Microsoft Authenticator FIDO2 Security KeysWindows Hello
  • 20.
    Azure AD Conditional Access Userand location Device Application Real time risk Conditional access
  • 21.
    An integral componentof Microsoft Threat Protection Azure AD Identity Protection Azure ATP Microsoft Cloud App Security
  • 22.
    Secure identities to reach zerotrust Strengthen your credentials by turning on MFA Reduce your attack surface area by blocking legacy authentication Automate threat remediation with solutions such as risk-based conditional access Increase visibility into why IDs are blocked, monitor security alerts and take action Enable self-service capabilities for more predictable and complete end-user security
  • 24.
  • 26.
    Correlate across attack vectors Detect& remediate breaches Protect the digital estate Help stop damaging attacks with integrated and automated security
  • 27.
    Microsoft Threat Protection IdentitiesEndpoints User Data Cloud Apps Infrastructure Intelligent Security Graph | 6.5 TRILLION signals per day
  • 31.
    Help stop damaging attackswith integrated and automated security Quickly detect anomalous behavior through integrated intelligence Apply sophisticated machine learning, heuristics, and intelligence to identify credential compromise Reduce threat resolution times with automation Identify and mitigate the latest email threats
  • 33.
  • 35.
    Discover & classify sensitiveinformation Apply protection based on policy Monitor & remediate Apps On-premisesCloud servicesDevices Across Accelerate Compliance
  • 36.
    Unified approach todiscover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations and applications Data growing at exponential rate LabelDiscover Classify Unified approach Devices Apps Cloud services On-premises ISVs, 3rd-party → Sensitive data discovery → Data at risk → Policy violations Monitor → Label Analytics → Proactive alerts → Supervision Protection Governance → Encryption → Restrict access → Watermark → Header/Footer → Archiving → Retention & deletion → Records management → Event based Apply policy
  • 37.
    Option to manageand control your own encryption keys to help meet compliance needs Additional customer controls for added protection and control Data is encrypted by default at-rest and in-transit Meets rigorous industry standards
  • 38.
    Logging and auditing Privilegedworkflow Just in time and just enough access The principle of zero standing access
  • 39.
    Deliver native appexperiences that work and feel natural on any platform Simplify access to resources employees need across their devices with single sign-on and conditional access Enable Office apps that users love on mobile devices, without compromising security
  • 40.
    Locate and classify information anywhere it lives Definesensitive data & establish your label taxonomy Customize your protection policies – based on internal objectives and compliance requirements Start classifying and labeling content Assess and adjust, based on ongoing monitoring of sensitive data, impact on users
  • 42.
  • 44.
    Visibility Control Guidance DevicesInfrastructureApps & dataIdentity Across
  • 48.
    Strengthen your security posture withinsights and guidance Understand your current security position across your organization Create policies and enable controls to better define your security position Use the built-in recommendations to find the right balance of security
  • 50.
    “If you makesecurity hard, people may work around it. With Microsoft 365, we get native capabilities, visibility into our operational environment, and simplicity for all employees.” Simon Hodgkinson Group Chief Information Security Officer, BP
  • 51.
    “With Advanced ThreatProtection, we’re more aware of potential threats …. That helps us address advanced malware threats that are becoming more prevalent and decreases the operational expense of resolving security issues.” Tony Taylor Senior Director of Infrastructure and Security, Land O’Lakes
  • 52.
    Help stop damagingattacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  • 53.
    Security operations thatwork for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 54.
    Partner with peers Work with industryalliances Work with government
  • 55.
    M365 F1 $10 M365 E31 $32 M365 E51 $57 Productivity & Collaboration Office clientapps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫ Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar (Outlook, Exchange), social & internet (SharePoint, Yammer) ⚫2 ⚫ ⚫ Device & App Management Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows Analytics Device Health ⚫ ⚫ ⚫ Security Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3, Windows Information Protection & BitLocker, Azure Information Protection Plan 1 ⚫ ⚫ ⚫ Office 365 Data Loss Prevention ⚫ ⚫ Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan 2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP) ⚫ Compliance Information Protection & Compliance (O365 Advanced Compliance, Azure Information Protection Plan 2) ⚫ Voice Audio Conferencing, Phone System ⚫ Analytics MyAnalytics ⚫ ⚫ ⚫ Delve ⚫ ⚫ Power BI Pro ⚫ PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation SeeSpeakerNotesforfootnotes Microsoft 365 Enterprise Plan Overview
  • 56.
    Identity & Threat Protection $12 InformationProtection & Compliance $10 M365 E5 Step-up $25 Security O365 ATP Plan 2 1 ⚫ ⚫ Microsoft Cloud App Security 2 ⚫ ⚫ Azure Active Directory Plan 2 ⚫ ⚫ Azure ATP ⚫ ⚫ Windows Defender ATP ⚫ ⚫ Compliance O365 Advanced Compliance ⚫ ⚫ Azure Information Protection Plan 2 ⚫ ⚫ Voice Phone System 3 ⚫ Audio Conferencing 3 ⚫ Analytics Power BI Pro 3 ⚫ PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation E5 Advanced Security & Compliance Offerings 1 Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value 2 Consolidates O365 CAS and MCAS value
  • 58.
    © 2019 RazorTechnology, LLC www.razor-tech.com @DavidJRosenthal Slideshare www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Cell: 215.801.4430 Office: 866.RZR.DATA LETS KEEP IN TOUCH