Submit Search
Upload
Azure information protection_datasheet_en-us
•
2 likes
•
364 views
Kjetil Lund-Paulsen
Follow
Enabled within the Office 365 E3 or Office 365 E5 subscription
Read less
Read more
Software
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
One name unify them all
One name unify them all
BizTalk360
Azure information protection
Azure information protection
Kjetil Lund-Paulsen
Azure Information Protection
Azure Information Protection
Robert Crane
2 Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
Andrew Bettany
Microsoft Azure Rights Management
Microsoft Azure Rights Management
David J Rosenthal
Information protection & classification
Information protection & classification
David De Vos
Recommended
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
One name unify them all
One name unify them all
BizTalk360
Azure information protection
Azure information protection
Kjetil Lund-Paulsen
Azure Information Protection
Azure Information Protection
Robert Crane
2 Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
Andrew Bettany
Microsoft Azure Rights Management
Microsoft Azure Rights Management
David J Rosenthal
Information protection & classification
Information protection & classification
David De Vos
EMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
Protect your data in / with the Cloud
Protect your data in / with the Cloud
GWAVA
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
Chris Genazzio
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
sang yoo
Emma Aubert | Information Protection
Emma Aubert | Information Protection
Microsoft Österreich
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
Thread Legal
1 Modern Security - Keynote
1 Modern Security - Keynote
Andrew Bettany
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
AntonioMaio2
Secure the modern Enterprise
Secure the modern Enterprise
Microsoft Österreich
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Microsoft Österreich
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Microsoft Österreich
Data Classification Protection | Seclore
Data Classification Protection | Seclore
Seclore
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
Microsoft Österreich
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Primend
Microsoft 365 Security and Compliance
Microsoft 365 Security and Compliance
David J Rosenthal
Trusted information protection
Trusted information protection
Pablo Junco
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
More Related Content
What's hot
EMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
Protect your data in / with the Cloud
Protect your data in / with the Cloud
GWAVA
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
Chris Genazzio
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
sang yoo
Emma Aubert | Information Protection
Emma Aubert | Information Protection
Microsoft Österreich
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
Thread Legal
1 Modern Security - Keynote
1 Modern Security - Keynote
Andrew Bettany
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
AntonioMaio2
Secure the modern Enterprise
Secure the modern Enterprise
Microsoft Österreich
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Microsoft Österreich
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Microsoft Österreich
Data Classification Protection | Seclore
Data Classification Protection | Seclore
Seclore
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
Microsoft Österreich
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Primend
Microsoft 365 Security and Compliance
Microsoft 365 Security and Compliance
David J Rosenthal
What's hot
(20)
EMS Diagram Click Through Web
EMS Diagram Click Through Web
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
Protect your data in / with the Cloud
Protect your data in / with the Cloud
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
Emma Aubert | Information Protection
Emma Aubert | Information Protection
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
1 Modern Security - Keynote
1 Modern Security - Keynote
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Secure the modern Enterprise
Secure the modern Enterprise
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Data Classification Protection | Seclore
Data Classification Protection | Seclore
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Microsoft 365 Security and Compliance
Microsoft 365 Security and Compliance
Similar to Azure information protection_datasheet_en-us
Trusted information protection
Trusted information protection
Pablo Junco
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
Wp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
Seclore
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
Joanne Klein
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
Marketing Team
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
RebeccaMunasheChimhe
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
Data Security
Data Security
ankita_kashyap
NogaLogic
NogaLogic
marknieuwenhuizen
Seclore File Secure Introduction Brief
Seclore File Secure Introduction Brief
Nováccent
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schools
e-Safe Systems
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
Your Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information Protection
Technology Solutions Worldwide
Unit 5 v2
Unit 5 v2
ShubhraGoyal4
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
Similar to Azure information protection_datasheet_en-us
(20)
Trusted information protection
Trusted information protection
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
Wp security-data-safe
Wp security-data-safe
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Data Security
Data Security
NogaLogic
NogaLogic
Seclore File Secure Introduction Brief
Seclore File Secure Introduction Brief
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schools
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Your Ultimate Cyber Security Partner – Azure Information Protection
Your Ultimate Cyber Security Partner – Azure Information Protection
Unit 5 v2
Unit 5 v2
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Recently uploaded
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
Frank van der Linden
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
gurkirankumar98700
Asset Management Software - Infographic
Asset Management Software - Infographic
Hr365.us smith
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
harshavardhanraghave
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Neo4j
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
Fatema Valibhai
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
OnePlan Solutions
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio, Inc.
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
shikhaohhpro
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
Intelisync
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
AxelRicardoTrocheRiq
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
kellynguyen01
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
joe51371421
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
stazi3110
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
kalichargn70th171
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
VICTOR MAESTRE RAMIREZ
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
BradBedford3
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
MyIntelliSource, Inc.
Recently uploaded
(20)
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
Asset Management Software - Infographic
Asset Management Software - Infographic
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Azure information protection_datasheet_en-us
1.
Microsoft Mobility Management ©
Microsoft 2016 Azure Information Protection ENSURE PERSISTENT CLASSIFICATION AND PROTECTION OF YOUR DATA Organizations no longer operate within their own perimeter. Data is traveling between users, devices, apps, and services more than ever before. And protecting your perimeter, users, or devices does not guarantee protection of your data as it travels outside of corporate boundaries. Even simply identifying the data that needs protection can be a major challenge. So how can you identify and secure your data when it’s being stored in disparate locations and shared across boundaries? Microsoft Azure Information Protection helps you classify and label your data at the time of creation. Protection (encryption + authentication + use rights) can then be applied to sensitive data. Classification labels and protection are persistent, traveling with the data so that it’s identifiable and protected at all times – regardless of where it’s stored or with whom it’s shared. The interface is simple and intuitive and does not interrupt your normal working experience. You also have deep visibility and control over shared data. What does Azure Information Protection provide? Classification and labeling Classify data based on source, context, and content at the time of creation or modification, either automatically or manually. Once classified, a persistent label is embedded in the data and actions such as visual marking and encryption can be taken based on the classification and label. Protection and use rights Protect sensitive data by encrypting it and allowing only authorized users access to the data. The protection is persistent to ensure data is protected at all times, regardless of where it’s stored or with whom it’s shared. Tracking and reporting Users can track activities on shared files and revoke access if they encounter unexpected activities. The solution provides rich logs and reporting that can be leveraged for compliance and regulatory purposes.
2.
AZURE INFORMATION PROTECTION ©
Microsoft 2016 Key features Automatic, user-driven, and recommended classifications Data can be classified and labelled automatically through content detection rules. Users can also manually classify data or be prompted to make an informed classification decision. Classification overrides and justifications Based on policies and rules, users can be empowered to override a classification and optionally be required to provide a justification. Flexible policy and rules engine A set of default sensitivity labels are available with options to define custom labels based on business needs. Rules can also be configured for actions to take based on classification. Protection using encryption, authentication, and use rights For sensitive data, protection can be applied after classification and labeling. This includes encrypting the document, which requires authentication of the user and enforces user rights that define what can be done with the data. Document tracking and revocation Documents can be tracked to show who has opened the document and from which geographical location. Users can choose to revoke access to the document in the event of unexpected activity.
3.
AZURE INFORMATION PROTECTION ©
Microsoft 2016 Why you’ll love Azure Information Protection Classification and protection from the start Policies classify, label, and protect data at the time of creation or modification based on source, context, and content. Classification can be fully automatic, user driven, or based on a recommendation. Once data is classified and labeled, optional protection can be applied based on the classification. Persistent protection that follows your data Classification and protection information is embedded within the data. This ensures data is protected at all times – regardless of where its stored or with whom its shared. Safer sharing with customers and partners Share data safely with users within your organization as well as with your customers and partners. Users can define who can access data and what they can do with it based on the use rights policy, such as being able to view and edit files but not print or forward. Simple, intuitive controls that help users make the right decisions and stay productive Data classification and protection controls are integrated into Office and common applications. This provides one-click options to classify data they’re working on. In-product notifications, such as recommended classification, help users make right decisions. More visibility and control over shared data Users can track activities on shared data and revoke access if necessary. IT can use powerful logging and reporting to monitor, analyze, and reason over shared data. Deployment and management flexibility Azure Information Protection helps you protect your data whether it is stored in the cloud or on-premises. With Azure Information Protection, you have the flexibility to choose how your encryption keys are managed including Bring Your Own Key (BYOK) options.
4.
AZURE INFORMATION PROTECTION ©
Microsoft 2016 How does it work? Policy setting Classification and protection policies allow you to define the way different types of data should be classified, labelled and optionally protected. Administrators are provided with a set of default labels which they can modify to fit their own needs. Rules can then be defined that govern how data is labelled and actions such as visual marking (headers, footers, watermarking) and protection (encryption, authentication and use rights) can be enforced. Classification Data can be classified based on content, context and source either automatically or by users. For user driven classification, users can select the sensitivity label applicable to the document. Classification and labeling information are then embedded to the document and defined actions are enforced. Labeling Labels are metadata that is embedded within the document, in clear text so other systems can read it. Labels are persistent and travel with the document. Actions such as visual marking of the document and encryption can be enforced based on the label. Protection encrypting the document and the inclusion of authentication requirements and a definition of the use rights to the data. This ensures only authorized users have access to protected data and they can perform only allowed actions on the data. Monitoring and logging Users can track activities on shared files and revoke access in case of unexpected activity. Rich logs and reporting tools are also available that can help IT monitor, analyze and reason over data for compliance and regulatory purposes. Please visit Azure Information Protection page for more information. Technical documentation is available here.
Download now