High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
1. Future of Digital
Workplace
Luís João
Solution Sales – Modern Workplace
lujoao@microsoft.com / (+351) 92 540 45 22
Microsoft Portugal
Manuel Faria
Product Marketing Manager – Modern Workplace
v-mafari@microsoft.com / (+351) 96 978 75 30
Microsoft Portugal
7. Microsoft 365
Pervasive availability. Targeted communications.
Email
Inner Loop
People you work with
regularly on core projects
Outer Loop
People you connect with
openly across the organization
Content collaboration
Video & live events
20. SharePoint
hub sites
Brings together related team sites and
communication sites
Cross-site navigation
Roll up news and site activity
Search across associated sites
Consistent look-and-feel across sites
Admins create, users adopt and use
Benefits
today…
52. your
Your app
Gateway
Your or your
customer’s
data
Office 365 Windows 10 Enterprise Mobility + Security
1Microsoft Graph
53. SharePoint Framework
Modern client-side development
Lightweight web and mobile responsive
On-Premises and in the Cloud
Designed for 1st and 3rd parties
Backward compatible components
Opensource tools and JavaScript web frameworks
http://aka.ms/spfx-tutorials
54.
55.
56.
57.
58. Intuitive sharing controls with flexible policies
for internal and external sharing
Flexible sharing controls for targeted
scenarios
alerts of suspicious behavior using
Advanced Security Management
Minimize risk with secure external sharing
without sign-in
63. HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
The deepest and most comprehensive compliance coverage in the industry
64. Supporting you
with contractual
commitments
We will provide documentation
to help you demonstrate
compliance with GDPR
requirements applicable
to processors.
Our cloud services will meet
stringent security requirements.
We will help you manage data
subject requests.
67. Compliance Manager
View your compliance posture against
evolving regulations in real-time.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
78. Protect resources through identity
Hardware protection
for credentials
Privileged Identity
Management
Multifactor
authentication
Conditional
access
79. Easy to use passwordless authentication
Replace passwords with an easy to use, strong and
multifactor credential
Reduce risk from compromised credentials
Multifactor: your device plus biometric or PIN
Single sign-on to resources protected with
conditional access
Coming soon: use portable security keys
and authenticate to a shared device
80. ******
Require MFA
Allow access
Deny access
Force
password reset
Limit access
Controls
Users
Devices
Location
Apps
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
10TB
Effective
policy
Conditional access
Limit access for the right
users from the right devices
and locations
81. Information protection
Govern sensitive data across
devices, apps, cloud services,
and on-premises.
Enable data governance
practices and processes
organization wide.
Search for and identify sensitive
and personal data.
Automatically classify and label
data with security policies.
83. Create, import, or
modify data
Detect data
Classify and label
sensitive data
Protect data
based on policy
Send, share,
move data
Monitor data
Retain, expire,
delete data
Protect sensitive data throughout its lifecycle
85. SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
86. Reclassification
You can override a
classification and
optionally be required
to provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
87. Due Diligence Documentation
Due Diligence
Category Documentation Task Owner Status
Business Plan, Corporate Structure, Financing
Business plan Current five-year business plan
Prior business plan
Corporate
organization
Articles of incorporation
Bylaws
Recent changes in corporate structure
Parent, subsidiaries, and affiliates
Shareholders’ agreements
Minutes from board meetings
88.
89.
90.
91. Label and protect any file through
the windows shell-explorer
Select either one file, multiple files
or a folder and apply a label
92.
93.
94.
95. Recognize known attacks and
suspicious behavior.
Threat protection
Recover quickly when attacked by
configuring automated responses.
Detect breaches and attackers
moving laterally.
97. Unique insights, informed
by trillions of signals
Microsoft intelligent
security graph
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial
services
98. Detect threats with Advanced Threat Analytics
Suspicious logons
Multiple failed log-on
attempts, privileged
user/admin activity
Suspicious activities
Access from suspicious
devices or IPs,
new high volume
app, new risky app
Sensitive data
Mass file transfers, sensitive
and financial data
Suspicious sessions
Impossible travel, data
transfer to remote locations,
unfamiliar IP or location
Possible threats
Unique file extensions indicating
ransomware, known attacks
100. Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
101. Simplify GDPR
compliance with
Microsoft 365
Enterprise
3. Streamline processes
1. Assess and manage
compliance risk
2. Protect personal data
- Identity and Access Mgmt.
- Information Protection
- Threat Protection