Life & Work Online Protecting Your Identity

711 views

Published on

Presented on May 3, 2012 for InnoTech Oregon. All rights reserved.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
711
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Life & Work Online Protecting Your Identity

  1. 1. Life and Work OnlineProtecting Identity
  2. 2. Sony Finds More Cases of Hacking of Its Servers By NICK BILTON , May 2, 2011 Sony said Monday that it had discovered that more credit card information and customer profiles had been compromised during an attack on its servers last week.Microsoft Exposes Scopeof Botnet ThreatBy Tony Bradley, October 15, 2010Microsofts latest SecurityIntelligence Report focuses on theexpanding threat posed by bots andbotnets.Microsoft this week unveiled theninth volume of its Security
  3. 3. Destroy CreateRetain Store End to End Information LifecycleMaintain Discover Secure Classify
  4. 4. De-provision Provision Report End to End AuthenticateWhy Identity What Lifecycle Attest Authorize Who Keep Current Secure Federate
  5. 5. Japan JSOX France NFZ 42-013 Germany GDPdu & GoBS India SOX SEBI Clause 49 US HIPAA Product designs US HIPAA Marketing planswww.plainenglish.co.uk
  6. 6.  Top Secret Confidential Public
  7. 7. Company or • ---------- • ---------- PartnerIdentity • ---------- DirectorySource
  8. 8. Private Cloud Public Cloud On-Premises OnlineINFORMATION ACCESS ANTI- POLICY RESEARCH SECURE PROTECTION CONTROL MALWARE MANAGEMENT & RESPONSE DEVELOPMENT DEVICES
  9. 9. Global PhishingBotnet Takedowns Enforcement InitiativeDigital PhishNet Cybersecurity Agenda Microsoft Security Response Alliance
  10. 10. Expression-based access policy AD DS File Server User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High ACCESS POLICY For access to highly confidential financial information, a user must be in the financedepartment, have a high security clearance, and be using a managed device registered with the finance department. 19
  11. 11. Dynamic Access Control Classification Access Control Auditing RMS Protection• File inherits • Central access policies • Central audit policies • Automatic Rights classification tags from based on classification can be applied across Management Services parent folder multiple file servers (RMS) protection for • Expression-based Microsoft Office• Manual tagging by access conditions for • Expression-based documents owner user claims, device audits for user claims, and file tags claims, device • Near real-time• Automatic tagging claims, and file tags protection when a file is • Access denied• Tagging by applications tagged remediation • Staging audits to simulate policy • Extensibility for non- changes in a real Office RMS protectors environment 20
  12. 12. Directory File ServerEmployee Identity Management Application Manager/s 2
  13. 13. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarksand/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view ofMicrosoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted tobe a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

×