Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

192 views

Published on

Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.

Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.

Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

  1. 1. Cyberspace is the new battlefield Security skills are in short supply Virtually anything can be attacked
  2. 2. Data center security Data loss prevention Compliance tools Anomaly detection Security management Information rights management Email security Threat detection Hybrid cloud security
  3. 3. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  4. 4. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  5. 5. Security operations that work for you
  6. 6. Real-world intelligence at work Intelligent Edge Intelligent Cloud Local ML models, behavior-based detection algorithms, generics, heuristics Metadata-based ML models Sample analysis-based ML models Detonation-based ML models Big data analytics March 6 – Behavior-based detection algorithms blocked more than 400,000 instances of the Dofoil trojan. February 3 – Client machine learning algorithms automatically stopped the malware attack Emotet in real time. October 2017 – Cloud-based detonation ML models identified Bad Rabbit, protecting users 14 minutes after the first encounter. 2017 2018 August 2018 – Cloud machine learning algorithms blocked a highly targeted campaign to deliver Ursnif malware to under 200 targets
  7. 7. “From the expansion of ATP, to the new Security Graph API, to Azure Sphere, it’s clear Microsoft is serious about addressing the emerging threats that come part and parcel with IoT...I do think Microsoft will be one of the last standing when it comes to end-to-end security offering.” Pat Moorhead Moor Insights & Strategy “Microsoft’s security offerings provide it with a level of differentiation from its primary rivals. Given the level of emphasis placed on security by those rivals, we expect security to become a new and more heated area of contention for leadership.” Scott Crawford 451 Research “Microsoft should probably scare most people as the biggest existential threat…Time and time again, legacy security vendors failed to meet the needs of their customers. Alert fatigue, poor context, poor usability, and lack of integration capabilities continue to frustrate security teams. But now, the tech titans are entering the market with customer-focused design, offering integrated clouds, marketplaces, and interfaces.” Joseph Blankenship Forrester “By 2022, one-third of organizations hosting their applications on IaaS vendors' services will use these vendors' native IAM services.” Gregg Kreizman Research VP at Gartner Research “The breadth of Microsoft offerings is attractive to IT organizations that require real-time visibility and control… the capabilities of Microsoft Cloud App Security can enable IT organizations to achieve a level of normalcy.” Mark Bowker ESG Group
  8. 8. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  9. 9. Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  10. 10. Identity & access management
  11. 11. Identity is at the center of security
  12. 12. Conditional access Identity protectionSecure authentication
  13. 13. Getting to a world without passwords Microsoft Authenticator FIDO2 Security KeysWindows Hello
  14. 14. Azure AD Conditional Access User and location Device Application Real time risk Conditional access
  15. 15. An integral component of Microsoft Threat Protection Azure AD Identity Protection Azure ATP Microsoft Cloud App Security
  16. 16. Secure identities to reach zero trust Strengthen your credentials by turning on MFA Reduce your attack surface area by blocking legacy authentication Automate threat remediation with solutions such as risk-based conditional access Increase visibility into why IDs are blocked, monitor security alerts and take action Enable self-service capabilities for more predictable and complete end-user security
  17. 17. Threat protection
  18. 18. Correlate across attack vectors Detect & remediate breaches Protect the digital estate Help stop damaging attacks with integrated and automated security
  19. 19. Microsoft Threat Protection Identities Endpoints User Data Cloud Apps Infrastructure Intelligent Security Graph | 6.5 TRILLION signals per day
  20. 20. Help stop damaging attacks with integrated and automated security Quickly detect anomalous behavior through integrated intelligence Apply sophisticated machine learning, heuristics, and intelligence to identify credential compromise Reduce threat resolution times with automation Identify and mitigate the latest email threats
  21. 21. Information protection
  22. 22. Discover & classify sensitive information Apply protection based on policy Monitor & remediate Apps On-premisesCloud servicesDevices Across Accelerate Compliance
  23. 23. Unified approach to discover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations and applications Data growing at exponential rate LabelDiscover Classify Unified approach Devices Apps Cloud services On-premises ISVs, 3rd-party → Sensitive data discovery → Data at risk → Policy violations Monitor → Label Analytics → Proactive alerts → Supervision Protection Governance → Encryption → Restrict access → Watermark → Header/Footer → Archiving → Retention & deletion → Records management → Event based Apply policy
  24. 24. Option to manage and control your own encryption keys to help meet compliance needs Additional customer controls for added protection and control Data is encrypted by default at-rest and in-transit Meets rigorous industry standards
  25. 25. Logging and auditing Privileged workflow Just in time and just enough access The principle of zero standing access
  26. 26. Deliver native app experiences that work and feel natural on any platform Simplify access to resources employees need across their devices with single sign-on and conditional access Enable Office apps that users love on mobile devices, without compromising security
  27. 27. Locate and classify information anywhere it lives Define sensitive data & establish your label taxonomy Customize your protection policies – based on internal objectives and compliance requirements Start classifying and labeling content Assess and adjust, based on ongoing monitoring of sensitive data, impact on users
  28. 28. Security management
  29. 29. Visibility Control Guidance Devices InfrastructureApps & dataIdentity Across
  30. 30. Strengthen your security posture with insights and guidance Understand your current security position across your organization Create policies and enable controls to better define your security position Use the built-in recommendations to find the right balance of security
  31. 31. “If you make security hard, people may work around it. With Microsoft 365, we get native capabilities, visibility into our operational environment, and simplicity for all employees.” Simon Hodgkinson Group Chief Information Security Officer, BP
  32. 32. “With Advanced Threat Protection, we’re more aware of potential threats …. That helps us address advanced malware threats that are becoming more prevalent and decreases the operational expense of resolving security issues.” Tony Taylor Senior Director of Infrastructure and Security, Land O’Lakes
  33. 33. Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  34. 34. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  35. 35. Partner with peers Work with industry alliances Work with government
  36. 36. M365 F1 $10 M365 E31 $32 M365 E51 $57 Productivity & Collaboration Office client apps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫ Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar (Outlook, Exchange), social & internet (SharePoint, Yammer) ⚫2 ⚫ ⚫ Device & App Management Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows Analytics Device Health ⚫ ⚫ ⚫ Security Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3, Windows Information Protection & BitLocker, Azure Information Protection Plan 1 ⚫ ⚫ ⚫ Office 365 Data Loss Prevention ⚫ ⚫ Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan 2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP) ⚫ Compliance Information Protection & Compliance (O365 Advanced Compliance, Azure Information Protection Plan 2) ⚫ Voice Audio Conferencing, Phone System ⚫ Analytics MyAnalytics ⚫ ⚫ ⚫ Delve ⚫ ⚫ Power BI Pro ⚫ PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation SeeSpeakerNotesforfootnotes Microsoft 365 Enterprise Plan Overview
  37. 37. Identity & Threat Protection $12 Information Protection & Compliance $10 M365 E5 Step-up $25 Security O365 ATP Plan 2 1 ⚫ ⚫ Microsoft Cloud App Security 2 ⚫ ⚫ Azure Active Directory Plan 2 ⚫ ⚫ Azure ATP ⚫ ⚫ Windows Defender ATP ⚫ ⚫ Compliance O365 Advanced Compliance ⚫ ⚫ Azure Information Protection Plan 2 ⚫ ⚫ Voice Phone System 3 ⚫ Audio Conferencing 3 ⚫ Analytics Power BI Pro 3 ⚫ PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation E5 Advanced Security & Compliance Offerings 1 Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value 2 Consolidates O365 CAS and MCAS value
  38. 38. © 2019 Razor Technology, LLC www.razor-tech.com @DavidJRosenthal Slideshare www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Cell: 215.801.4430 Office: 866.RZR.DATA LETS KEEP IN TOUCH

×