SlideShare a Scribd company logo
Change is constant
Peoples work
expectations
Evolving
threat
landscape
Industry
regulations
and standards
Security challenges
What makes cybersecurity a complex problem?
100101
011010
100011
MalwareSpam Smart attackers Intelligent attacks
Volume of attacks Sophistication of attacks
What type of attack to launch…
Who to target in attacks…
When to launch an attack…
Hackers How often to attack…
What type of attacks are happening…
Who is attacking them…
When attackers strike…
Analysts
How often do attacks occur…
A hacker’s advantage is preparation & knowledge
Today, infrastructures are very complex
!
EXPERIENCE
• 1M+ Corporate Machines
protected by enterprise IT security
• Multi-platform
Cloud-first hybrid enterprise
• Decades of experience
as a global enterprise
• Runs on Azure
same multi-tenant Azure
environment as you
EXPERTISE
• Development Security
Security Development Lifecycle
(SDL) - ISO/IEC 27034-1
• Operational Security
Hyper-scale cloud services
• Combatting Cybercrime
partnering with law enforcement
• Incident Investigation
and recovery for customers
Visibility
ExpertiseExperience
Context
Industry leading capabilities
VISIBILITY & CONTEXT
1 billion customers
across enterprise and
consumer segments
200+ cloud services
[ Privacy/Compliance boundary ]
Balancing productivity with protection.
How do IT Pros empower their users to be
productive, while protecting the massive
amounts of data flowing through their
mobile ecosystem?
Vision
Microsoft Intune
Experience Ready
Manage your diverse mobile environment in a secure and unified way with
Microsoft Intune.
Mobile application
management
PC managementMobile device
management
Strategically direct the flow of your mobile ecosystem, giving your end
users the experience they expect while ensuring your corporate data is
protected at every turn.
Enterprise mobility management with Intune
Enable
your users
Protect
your data
Microsoft Intune
User IT
ReadyExperienceVision
MICROSOFT INTUNE
Click to edit Master title
style
Delivering on a unified
Microsoft vision
Built with EMS, Office and
Windows, Intune delivers on a
unified Microsoft vision to
transform the way enterprise
secures mobile productivity.
This combined effort enables
awesome end-to-end scenarios.
Control access to your data
Control what happens to your data
after it’s been accessed
Modern PC management
Click to edit Master title
style
Control access to data
based on real-time context
Conditional access allows you to
define policies that provide
contextual controls at the user,
location, device, and app levels.
As conditions change, natural user
prompts ensure that only the right
users on compliant devices can
access sensitive data.
Azure Active Directory
Premium
Microsoft Intune
Microsoft Intelligent
Security Graph
Risk-based conditional access
• Block access
• Wipe device
Conditions
• Allow
• Enforce MFA
• Remediate
Actions
Location (IP range)
Device state
User groupUser
MFA
Risk
On-premises
applications
Microsoft Azure
Risk (Low, Medium, High)
Click to edit Master title
style Managed apps
Personal appsPersonal apps
Managed apps
MDM – optional
(Intune or 3rd-party)
Our app protection policies allow you
to control what happens to docs and
data after they’ve been accessed.
• App encryption at rest
• App access control – PIN or credentials
• Save as/copy/paste restrictions
• App-level selective wipe
• Managed web browsing
• Secure viewing of PDFs, images, videos
Control what happens
after the data is accessed
Corporate
data
Personal
data
Multi-identity policy
Click to edit Master title
style
With the different options in
Windows 10, plus Configuration
Manager and Intune, you have the
flexibility to stage implementation
of modern management scenarios
while targeting different devices
the way that best suits your
business needs.
Everything you need for
modern PC management
ReadyVision
MICROSOFT INTUNE
Experience
Click to edit Master title
styleAn awesome end-user
and IT Pro experience
Natural and intuitive, the best
experience for both end users
and IT Pros. The control and
support IT requires; the
experience your people
expect.
Real Office apps
Protect data with and without device
enrollment
Intune on Azure
Support to get you started and
keep you going day-to-day
Click to edit Master title
style
The Office apps end-users
expect
Give your people the real Office
experience they expect, without
compromising the control you
need. Intune gives you
unparalleled control over the data
in that moves through Office -
across all your devices.
Click to edit Master title
style
Protect with and without
enrollment
Intune’s application protection
policies give you the versatility to
manage your data with or without
device enrollment.
Click to edit Master title
styleWorld class support –
included
FastTrack provides you access to a
team of engineers dedicated to
helping you plan and execute your
deployment. And our 24/7
support ensures you have the
support you need day to day.
Both included with your Intune subscription.
Vision Experience
MICROSOFT INTUNE
Ready
Click to edit Master title
styleMeets your immediate
needs and adapts to your
evolving IT strategy.
Microsoft Intune is built from
the cloud, with the flexibility
and control that meets your
needs today, and scales as
your mobile strategy matures
and evolves over time.
Microsoft Cloud Infrastructure
Inclusive partner ecosystem
Flexibility and choice in how you manage
your mobile ecosystem
Click to edit Master title
style
You need flexibility in a
complex device ecosystem
Microsoft Intune provides you
option that allow you to keep your
data secure across a range of
scenarios that occur day-to-day.
Our MAM and MDM capabilities
allow you to protect corporate data
with or without device
management.
Company-Managed
Employee-Managed
3rd Party-Managed
Click to edit Master title
style
Click to edit Master title
style
The best control with
Intune-enlightened apps
All Intune-enlightened applications
are built with the Intune App SDK,
enabling them with the richest set
of mobile application protection
policies available.
Many also support multi-identity
and without enrollment scenarios.
Click to edit Master title
style
Also manage apps via
native OS app controls
Intune can also manage apps via
native app controls that are
exposed through iOS and Android
operating systems. This capability
extends Intune’s app ecosystem
beyond our SDK built enlightened
apps, to include many other
popular business apps.
Only for managed devices.
Click to edit Master title
style
A growing partner
ecosystem
Intune partnerships are designed to
enhance our core functionality by
delivering interoperability with
popular point solutions our
customers want and rely upon.
All partner products must be purchased directly from the partner
Device is compliant
Device is managed
Scans apps for risk
ITScans unknown
network for risk
Allow access or
Block access
Enforce MFA per
user/per app
Device compliant
Scans OS for vulnerability
Risk (Low, Medium, High)
X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
Cisco ISE enforcement
VPN
WiFi
X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
NetScaler enforcement
VPN
Click to edit Master title
style
Delivered from the cloud
Because Microsoft Intune is cloud-
based, it lowers costs and
eliminates the need to plan,
purchase, and maintain on premise
hardware and infrastructure.
Intune is always up to date, and
scales with ease as your needs
evolve.
Key take away’s
PARTNERING TO IMPROVE CYBER SECURITY
HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
Azure has the deepest and most comprehensive compliance coverage in the industry
March
2017

More Related Content

What's hot

IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
wendyking63
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
Patrick Bouillaud
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
Simon May
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
Bharat Sinha
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
InTTrust S.A.
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
Juan Pablo Coelho
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
Motty Ben Atia
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
MobileIron
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
42Gears Mobility Systems
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
Northernstar
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
MarketingArrowECS_CZ
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
C/D/H Technology Consultants
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec
 
Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
PRAGMA PROGETTI
 

What's hot (20)

IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
 

Similar to Atea erfa microsoft mobile security

Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
Agora Group
 
Intune Deployment .pptx
Intune Deployment .pptxIntune Deployment .pptx
Intune Deployment .pptx
Encryption Consulting
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Technologies
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
Teemu Tiainen
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
JoTechies
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Understanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptxUnderstanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptx
Technology Solutions Worldwide
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
Perficient, Inc.
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
Guilherme Maia
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
Withum
 

Similar to Atea erfa microsoft mobile security (20)

Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Intune Deployment .pptx
Intune Deployment .pptxIntune Deployment .pptx
Intune Deployment .pptx
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Understanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptxUnderstanding The Power Of Microsoft Security Solutions!.pptx
Understanding The Power Of Microsoft Security Solutions!.pptx
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 

Recently uploaded

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 

Recently uploaded (11)

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 

Atea erfa microsoft mobile security

  • 1.
  • 2.
  • 3. Change is constant Peoples work expectations Evolving threat landscape Industry regulations and standards
  • 5.
  • 6. What makes cybersecurity a complex problem? 100101 011010 100011 MalwareSpam Smart attackers Intelligent attacks Volume of attacks Sophistication of attacks
  • 7. What type of attack to launch… Who to target in attacks… When to launch an attack… Hackers How often to attack… What type of attacks are happening… Who is attacking them… When attackers strike… Analysts How often do attacks occur… A hacker’s advantage is preparation & knowledge
  • 9.
  • 10.
  • 11.
  • 12. !
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. EXPERIENCE • 1M+ Corporate Machines protected by enterprise IT security • Multi-platform Cloud-first hybrid enterprise • Decades of experience as a global enterprise • Runs on Azure same multi-tenant Azure environment as you EXPERTISE • Development Security Security Development Lifecycle (SDL) - ISO/IEC 27034-1 • Operational Security Hyper-scale cloud services • Combatting Cybercrime partnering with law enforcement • Incident Investigation and recovery for customers Visibility ExpertiseExperience Context Industry leading capabilities VISIBILITY & CONTEXT 1 billion customers across enterprise and consumer segments 200+ cloud services
  • 21. Balancing productivity with protection. How do IT Pros empower their users to be productive, while protecting the massive amounts of data flowing through their mobile ecosystem?
  • 22. Vision Microsoft Intune Experience Ready Manage your diverse mobile environment in a secure and unified way with Microsoft Intune.
  • 23. Mobile application management PC managementMobile device management Strategically direct the flow of your mobile ecosystem, giving your end users the experience they expect while ensuring your corporate data is protected at every turn. Enterprise mobility management with Intune Enable your users Protect your data Microsoft Intune User IT
  • 25. Click to edit Master title style Delivering on a unified Microsoft vision Built with EMS, Office and Windows, Intune delivers on a unified Microsoft vision to transform the way enterprise secures mobile productivity. This combined effort enables awesome end-to-end scenarios. Control access to your data Control what happens to your data after it’s been accessed Modern PC management
  • 26. Click to edit Master title style Control access to data based on real-time context Conditional access allows you to define policies that provide contextual controls at the user, location, device, and app levels. As conditions change, natural user prompts ensure that only the right users on compliant devices can access sensitive data.
  • 27. Azure Active Directory Premium Microsoft Intune Microsoft Intelligent Security Graph Risk-based conditional access • Block access • Wipe device Conditions • Allow • Enforce MFA • Remediate Actions Location (IP range) Device state User groupUser MFA Risk On-premises applications Microsoft Azure Risk (Low, Medium, High)
  • 28. Click to edit Master title style Managed apps Personal appsPersonal apps Managed apps MDM – optional (Intune or 3rd-party) Our app protection policies allow you to control what happens to docs and data after they’ve been accessed. • App encryption at rest • App access control – PIN or credentials • Save as/copy/paste restrictions • App-level selective wipe • Managed web browsing • Secure viewing of PDFs, images, videos Control what happens after the data is accessed Corporate data Personal data Multi-identity policy
  • 29. Click to edit Master title style With the different options in Windows 10, plus Configuration Manager and Intune, you have the flexibility to stage implementation of modern management scenarios while targeting different devices the way that best suits your business needs. Everything you need for modern PC management
  • 31. Click to edit Master title styleAn awesome end-user and IT Pro experience Natural and intuitive, the best experience for both end users and IT Pros. The control and support IT requires; the experience your people expect. Real Office apps Protect data with and without device enrollment Intune on Azure Support to get you started and keep you going day-to-day
  • 32. Click to edit Master title style The Office apps end-users expect Give your people the real Office experience they expect, without compromising the control you need. Intune gives you unparalleled control over the data in that moves through Office - across all your devices.
  • 33. Click to edit Master title style Protect with and without enrollment Intune’s application protection policies give you the versatility to manage your data with or without device enrollment.
  • 34. Click to edit Master title styleWorld class support – included FastTrack provides you access to a team of engineers dedicated to helping you plan and execute your deployment. And our 24/7 support ensures you have the support you need day to day. Both included with your Intune subscription.
  • 36. Click to edit Master title styleMeets your immediate needs and adapts to your evolving IT strategy. Microsoft Intune is built from the cloud, with the flexibility and control that meets your needs today, and scales as your mobile strategy matures and evolves over time. Microsoft Cloud Infrastructure Inclusive partner ecosystem Flexibility and choice in how you manage your mobile ecosystem
  • 37. Click to edit Master title style You need flexibility in a complex device ecosystem Microsoft Intune provides you option that allow you to keep your data secure across a range of scenarios that occur day-to-day. Our MAM and MDM capabilities allow you to protect corporate data with or without device management. Company-Managed Employee-Managed 3rd Party-Managed
  • 38. Click to edit Master title style
  • 39. Click to edit Master title style The best control with Intune-enlightened apps All Intune-enlightened applications are built with the Intune App SDK, enabling them with the richest set of mobile application protection policies available. Many also support multi-identity and without enrollment scenarios.
  • 40. Click to edit Master title style Also manage apps via native OS app controls Intune can also manage apps via native app controls that are exposed through iOS and Android operating systems. This capability extends Intune’s app ecosystem beyond our SDK built enlightened apps, to include many other popular business apps. Only for managed devices.
  • 41. Click to edit Master title style A growing partner ecosystem Intune partnerships are designed to enhance our core functionality by delivering interoperability with popular point solutions our customers want and rely upon. All partner products must be purchased directly from the partner
  • 42. Device is compliant Device is managed Scans apps for risk ITScans unknown network for risk Allow access or Block access Enforce MFA per user/per app Device compliant Scans OS for vulnerability Risk (Low, Medium, High)
  • 43. X X X X X ✓ Require enrollment through the Intune portal to ensure compliance Intune conditions Device managed Device compliant ✓ Enforce appropriate network access policies based on mobile device posture and risk assessment. Allow access Block access Cisco ISE enforcement VPN WiFi
  • 44. X X X X X ✓ Require enrollment through the Intune portal to ensure compliance Intune conditions Device managed Device compliant ✓ Enforce appropriate network access policies based on mobile device posture and risk assessment. Allow access Block access NetScaler enforcement VPN
  • 45. Click to edit Master title style Delivered from the cloud Because Microsoft Intune is cloud- based, it lowers costs and eliminates the need to plan, purchase, and maintain on premise hardware and infrastructure. Intune is always up to date, and scales with ease as your needs evolve.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51. PARTNERING TO IMPROVE CYBER SECURITY
  • 52. HIPAA / HITECH Act FERPA GxP 21 CFR Part 11 Singapore MTCS UK G-Cloud Australia IRAP/CCSL FISC Japan New Zealand GCIO China GB 18030 EU Model Clauses ENISA IAF Argentina PDPA Japan CS Mark Gold CDSA Shared Assessments Japan My Number Act FACT UK GLBA Spain ENS PCI DSS Level 1 MARS-E FFIEC China TRUCS Canada Privacy Laws MPAA Privacy Shield India MeitY Germany IT Grundschutz workbook Spain DPA HITRUST IG Toolkit UK China DJCP ITAR Section 508 VPAT SP 800-171 FIPS 140-2 High JAB P-ATO CJIS DoD DISA SRG Level 2 DoD DISA SRG Level 4 IRS 1075 DoD DISA SRG Level 5 Moderate JAB P-ATO GLOBALUSGOVINDUSTRYREGIONAL ISO 27001 SOC 1 Type 2ISO 27018 CSA STAR Self-AssessmentISO 27017 SOC 2 Type 2 SOC 3ISO 22301 CSA STAR Certification CSA STAR AttestationISO 9001 Azure has the deepest and most comprehensive compliance coverage in the industry March 2017