Kaasaegsed ettevõtted muutuvad üha mobiilsemaks, kuna töötajad suudavad üha enam tööd teha kontorisse tulemata. Kuidas sellises uues situatsioonis säilitada kontroll organisatsiooni andmete üle ning tagada kasutajate ja seadmete turvalisus.
Esineja: Tõnis Tikerpäe
2. The age of the customer
Started by the explosion of social and mobile technology
Companies are responding by delivering amazing customer experiences
3. Business leaders
Enable employees to work anywhere,
from any device
Transform the way we do business
with mobile devices and apps
Delight customers with new
digital experiences
IT leaders
Help business leaders achieve
these goals
Ensure solutions are cost-efficient,
secure, and manageable
Why enterprise mobility matters:
4. Productivity
Devices
Line of business apps
Identity
Management
Data
How can I mobilize my apps?
BYOD, CYOD, or Corporate-owned?
How do we go beyond email and calendar?
Can we centralize our identity stores?
How do I maintain control over a mobile environment?
Is my corporate data protected?
5. Mobility is the new normal72%
72% of employees who use
smartphones for work
select their smartphones
personally*
>80%
>80% of employees admit
to using non-approved
software-as-a-service (SaaS)
applications in their jobs**
>70%
>70% percentof network
intrusions exploitedweak or
stolen credentials***
Source:
* Forrester Research: “Building The Business Case For A Bring-Your-Own-Device (BYOD) Program,” Dec. 4, 2014
** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
*** Verizon 2013 data breach investigation report
7. Windows Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and audit
reports, multi-factor
authentication
Self-service password reset
and group management
Connection between Active
Directory and Azure Active
Directory
Introducing the Enterprise Mobility Suite
Microsoft Azure Rights Management service
Information protection Connection to on-premises
assets
Bring your own key
Advanced Threat Analytics (ATA)
8. Single sign-on
Self-service experiences
SaaS applications
Multi-factor authentication
Desktop
virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Security reports
12. Mobile application
management
PC managementMobile device
management
Intune helps organizations provide their employees with access to corporate
applications, data, and resources from virtually anywhere on almost any device,
while helping to keep corporate information secure.
ITUser
Microsoft Intune
14. Maximize mobile productivity and protect corporate
resources with Office mobile apps
Extend these capabilities to existing line-of-business apps
using the Intune App Wrapping Tool
Enable secure viewing of content using the Managed
Browser, PDF Viewer, AV Player, and Image Viewer apps
Managed apps
Personal appsPersonal apps
Managed apps
ITUser
15. Personal apps
Managed apps
Maximize productivity while preventing leakage of
company data by restricting actions such as
copy/cut/paste/save in your managed app ecosystem
User
16. Personal apps
Managed apps Company Portal
Are you sure you want to wipe
corporate data and applications
from the user’s device?
OK Cancel
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
ITIT
17. Windows Intune integreeritud System Center 2012 R2
Configuration Manager serveriga
IT
Mac OS X
Windows PCs
(x86/64, Intel SoC),
Windows to Go
Windows Embedded
Windows Phone 8.x
iOS, Android
Single Admin
Console
Microsoft System Center 2012 R2
configuration manager
18. Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Conditional access to corporate resources
Secure data sharing
Easy management and control
25. Analyze1 After installation:
• Simple non-intrusive port mirroring
configuration copies all Active Directory
related traffic
• Remains invisible to the attackers
• Analyzes all Active Directory network traffic
• Collects relevant events from SIEM and
information from Active Directory (titles,
groups membership and more)
26. ATA:
• Automatically starts learning and profiling
entity behavior
• Identifies normal behavior for entities
• Learns continuously to update the activities
of the users, devices, and resources
Learn2
What is entity?
Entity represents users, devices, or resources
27. Detect3 Microsoft Advanced Threat
Analytics:
• Looks for abnormal behavior and identifies
suspicious activities
• Only raises red flags if abnormal activities are
contextually aggregated
• Leverages world-class security research to
detect security risks and attacks in near real-
time based on attackers Tactics, Techniques
and Procedures (TTPs)
ATA not only compares the entity’s behavior
to its own, but also to the behavior of
entities in its interaction path.
28. Alert4
ATA reports all suspicious
activities on a simple,
functional, actionable
attack timeline
ATA identifies
Who?
What?
When?
How?
For each suspicious
activity, ATA provides
recommendations for
the investigation and
remediation.
29.
30. Place Partner Logo here and/or Microsoft
Partner Program Logo
tonis.tikerpae@primend.com
Aitäh!