SlideShare a Scribd company logo
1 of 4
Download to read offline
Microsoft Mobility Management
© Microsoft 2016
Azure Information Protection
ENSURE PERSISTENT CLASSIFICATION AND PROTECTION OF YOUR DATA
Organizations no longer operate within
their own perimeter. Data is traveling
between users, devices, apps, and services
more than ever before. And protecting your
perimeter, users, or devices does not
guarantee protection of your data as it
travels outside of corporate boundaries.
Even simply identifying the data that needs
protection can be a major challenge.
So how can you identify and secure your
data when it’s being stored in disparate
locations and shared across boundaries?
Microsoft Azure Information Protection
helps you classify and label your data at the
time of creation. Protection (encryption + authentication + use rights) can then be applied to sensitive data.
Classification labels and protection are persistent, traveling with the data so that it’s identifiable and protected at
all times – regardless of where it’s stored or with whom it’s shared. The interface is simple and intuitive and does
not interrupt your normal working experience. You also have deep visibility and control over shared data.
What does Azure Information Protection provide?
Classification and
labeling
Classify data based on source, context, and content at the time of creation or
modification, either automatically or manually. Once classified, a persistent label is
embedded in the data and actions such as visual marking and encryption can be
taken based on the classification and label.
Protection and
use rights
Protect sensitive data by encrypting it and allowing only authorized users access to
the data. The protection is persistent to ensure data is protected at all times,
regardless of where it’s stored or with whom it’s shared.
Tracking and
reporting
Users can track activities on shared files and revoke access if they encounter
unexpected activities. The solution provides rich logs and reporting that can be
leveraged for compliance and regulatory purposes.
AZURE INFORMATION PROTECTION
© Microsoft 2016
Key features
Automatic, user-driven, and recommended
classifications
Data can be classified and labelled automatically
through content detection rules. Users can also
manually classify data or be prompted to make an
informed classification decision.
Classification overrides and justifications
Based on policies and rules, users can be
empowered to override a classification and
optionally be required to provide a justification.
Flexible policy and rules engine
A set of default sensitivity labels are available with
options to define custom labels based on business
needs. Rules can also be configured for actions to
take based on classification.
Protection using encryption, authentication,
and use rights
For sensitive data, protection can be applied after
classification and labeling. This includes encrypting
the document, which requires authentication of the
user and enforces user rights that define what can
be done with the data.
Document tracking and revocation
Documents can be tracked to show who has opened
the document and from which geographical
location. Users can choose to revoke access to the
document in the event of unexpected activity.
AZURE INFORMATION PROTECTION
© Microsoft 2016
Why you’ll love Azure Information Protection
Classification and protection from the start
Policies classify, label, and protect data at the time of
creation or modification based on source, context, and
content. Classification can be fully automatic, user
driven, or based on a recommendation. Once data is
classified and labeled, optional protection can be
applied based on the classification.
Persistent protection that follows your data
Classification and protection information is embedded
within the data. This ensures data is protected at all times –
regardless of where its stored or with whom its shared.
Safer sharing with customers and partners
Share data safely with users within your organization as
well as with your customers and partners. Users can
define who can access data and what they can do with
it based on the use rights policy, such as being able to
view and edit files but not print or forward.
Simple, intuitive controls that help users make
the right decisions and stay productive
Data classification and protection controls are
integrated into Office and common applications. This
provides one-click options to classify data they’re
working on.
In-product notifications, such as recommended
classification, help users make right decisions.
More visibility and control over shared data
Users can track activities on shared data and revoke
access if necessary. IT can use powerful logging and
reporting to monitor, analyze, and reason over shared
data.
Deployment and management flexibility
Azure Information Protection helps you protect your
data whether it is stored in the cloud or on-premises.
With Azure Information Protection, you have the
flexibility to choose how your encryption keys are
managed including Bring Your Own Key (BYOK) options.
AZURE INFORMATION PROTECTION
© Microsoft 2016
How does it work?
Policy setting
Classification and protection policies
allow you to define the way different
types of data should be classified, labelled
and optionally protected. Administrators are
provided with a set of default labels which
they can modify to fit their own needs. Rules
can then be defined that govern how data is
labelled and actions such as visual marking
(headers, footers, watermarking) and
protection (encryption, authentication and
use rights) can be enforced.
Classification
Data can be classified based on content, context and source either automatically or by users. For user driven
classification, users can select the sensitivity label applicable to the document. Classification and labeling
information are then embedded to the document and defined actions are enforced.
Labeling
Labels are metadata that is embedded within the document, in clear text so other systems can read it. Labels
are persistent and travel with the document. Actions such as visual marking of the document and encryption can be
enforced based on the label.
Protection
encrypting the document and the inclusion of authentication requirements and a definition of the use rights to
the data. This ensures only authorized users have access to protected data and they can perform only allowed
actions on the data.
Monitoring and logging
Users can track activities on shared files and revoke access in case of unexpected activity. Rich logs and reporting tools
are also available that can help IT monitor, analyze and reason over data for compliance and regulatory purposes.
Please visit Azure Information Protection page for more information. Technical documentation is
available here.

More Related Content

What's hot

EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceChris Genazzio
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018sang yoo
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - KeynoteAndrew Bettany
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Microsoft Österreich
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 

What's hot (20)

EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 

Similar to Azure information protection_datasheet_en-us

Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection Pablo Junco
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Marketing Team
 
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxRebeccaMunasheChimhe
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionKesavan Munuswamy
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolse-Safe Systems
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Your Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information ProtectionYour Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information ProtectionTechnology Solutions Worldwide
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 

Similar to Azure information protection_datasheet_en-us (20)

Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
 
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Data Security
Data SecurityData Security
Data Security
 
NogaLogic
NogaLogicNogaLogic
NogaLogic
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schools
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Your Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information ProtectionYour Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information Protection
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 

Recently uploaded

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Azure information protection_datasheet_en-us

  • 1. Microsoft Mobility Management © Microsoft 2016 Azure Information Protection ENSURE PERSISTENT CLASSIFICATION AND PROTECTION OF YOUR DATA Organizations no longer operate within their own perimeter. Data is traveling between users, devices, apps, and services more than ever before. And protecting your perimeter, users, or devices does not guarantee protection of your data as it travels outside of corporate boundaries. Even simply identifying the data that needs protection can be a major challenge. So how can you identify and secure your data when it’s being stored in disparate locations and shared across boundaries? Microsoft Azure Information Protection helps you classify and label your data at the time of creation. Protection (encryption + authentication + use rights) can then be applied to sensitive data. Classification labels and protection are persistent, traveling with the data so that it’s identifiable and protected at all times – regardless of where it’s stored or with whom it’s shared. The interface is simple and intuitive and does not interrupt your normal working experience. You also have deep visibility and control over shared data. What does Azure Information Protection provide? Classification and labeling Classify data based on source, context, and content at the time of creation or modification, either automatically or manually. Once classified, a persistent label is embedded in the data and actions such as visual marking and encryption can be taken based on the classification and label. Protection and use rights Protect sensitive data by encrypting it and allowing only authorized users access to the data. The protection is persistent to ensure data is protected at all times, regardless of where it’s stored or with whom it’s shared. Tracking and reporting Users can track activities on shared files and revoke access if they encounter unexpected activities. The solution provides rich logs and reporting that can be leveraged for compliance and regulatory purposes.
  • 2. AZURE INFORMATION PROTECTION © Microsoft 2016 Key features Automatic, user-driven, and recommended classifications Data can be classified and labelled automatically through content detection rules. Users can also manually classify data or be prompted to make an informed classification decision. Classification overrides and justifications Based on policies and rules, users can be empowered to override a classification and optionally be required to provide a justification. Flexible policy and rules engine A set of default sensitivity labels are available with options to define custom labels based on business needs. Rules can also be configured for actions to take based on classification. Protection using encryption, authentication, and use rights For sensitive data, protection can be applied after classification and labeling. This includes encrypting the document, which requires authentication of the user and enforces user rights that define what can be done with the data. Document tracking and revocation Documents can be tracked to show who has opened the document and from which geographical location. Users can choose to revoke access to the document in the event of unexpected activity.
  • 3. AZURE INFORMATION PROTECTION © Microsoft 2016 Why you’ll love Azure Information Protection Classification and protection from the start Policies classify, label, and protect data at the time of creation or modification based on source, context, and content. Classification can be fully automatic, user driven, or based on a recommendation. Once data is classified and labeled, optional protection can be applied based on the classification. Persistent protection that follows your data Classification and protection information is embedded within the data. This ensures data is protected at all times – regardless of where its stored or with whom its shared. Safer sharing with customers and partners Share data safely with users within your organization as well as with your customers and partners. Users can define who can access data and what they can do with it based on the use rights policy, such as being able to view and edit files but not print or forward. Simple, intuitive controls that help users make the right decisions and stay productive Data classification and protection controls are integrated into Office and common applications. This provides one-click options to classify data they’re working on. In-product notifications, such as recommended classification, help users make right decisions. More visibility and control over shared data Users can track activities on shared data and revoke access if necessary. IT can use powerful logging and reporting to monitor, analyze, and reason over shared data. Deployment and management flexibility Azure Information Protection helps you protect your data whether it is stored in the cloud or on-premises. With Azure Information Protection, you have the flexibility to choose how your encryption keys are managed including Bring Your Own Key (BYOK) options.
  • 4. AZURE INFORMATION PROTECTION © Microsoft 2016 How does it work? Policy setting Classification and protection policies allow you to define the way different types of data should be classified, labelled and optionally protected. Administrators are provided with a set of default labels which they can modify to fit their own needs. Rules can then be defined that govern how data is labelled and actions such as visual marking (headers, footers, watermarking) and protection (encryption, authentication and use rights) can be enforced. Classification Data can be classified based on content, context and source either automatically or by users. For user driven classification, users can select the sensitivity label applicable to the document. Classification and labeling information are then embedded to the document and defined actions are enforced. Labeling Labels are metadata that is embedded within the document, in clear text so other systems can read it. Labels are persistent and travel with the document. Actions such as visual marking of the document and encryption can be enforced based on the label. Protection encrypting the document and the inclusion of authentication requirements and a definition of the use rights to the data. This ensures only authorized users have access to protected data and they can perform only allowed actions on the data. Monitoring and logging Users can track activities on shared files and revoke access in case of unexpected activity. Rich logs and reporting tools are also available that can help IT monitor, analyze and reason over data for compliance and regulatory purposes. Please visit Azure Information Protection page for more information. Technical documentation is available here.