SlideShare a Scribd company logo
1 of 6
Case Study
Enterprise Agreement to
support an ongoing
modern transformation
strategy.
Case Study - Context
Modern transformation for Contoso Insurance
Partners
Microsoft 365 E5 Azure Sentinel
Efficiency Simplification Resilience
Microsoft Agreement
User Identities & Collaborations
A Large Acquisition
No. of Users
100K
Regulations
local data residency,
GDPR
Remote working (secure access to
corporate resources through continuous
assessment & intent-based policies.
Business Requirements
Visibility into threats across all
resources and the ability to respond
swiftly across the organization
Security
Requirements
1. SSO & MFA
2. Discover, classify &
protect information at-rest &
In-motion.
3. Protect multi-cloud apps
4. Unify sec & threat
management for on-prem and
cloud.
5. Restrict admin scope
6. Key/secrets management
7. Anti-DDoS
8. Secure email, documents
& data shared outside.
9. WAF
Azure Well-Architected Framework
Key pillars on which the renewed value proposition will contribute
Efficiency Simplification Resilience
 Go global in minutes – deploy
your workload in any region at minimal
cost.
 Azure Autoscale - to match the
right demand to accommodate
workload.
 Improve Communication &
Collaboration – using OneDrive,
Teams, SharePoint, etc.
 Use serverless architecture –
Avoid operations burden of own
servers.
 Manage mobile devices
efficiently - enforcement of security
policies.
 Democratize advance
technologies – using adv.
Technologies may help in efficiency.
 Strong Identity Foundation and
Protection – Azure AD and AD
Identity Protection with least privilege,
RBAC, PIM, etc.
 Automate recovery from
failures – monitor the workload and
trigger the automation where possible.
 Prepare for the events and the
incidents – Develop incident
management process & run regular
simulations to accelerate the
detection, investigation and recovery.
 Scale horizontally – replace one
large resource with small multiple to
reduce the impact of single failure.
 Implement Azure Security
Service – like WAF, Anti DDoS,
Firewall, etc.
 Anywhere Accessibility - from
any device and any location with an
internet connection.
 Enable single-sign-on for all
the enterprise application – User
login once and access any resource
with provided permissions.
 Stop spending money and
efforts on heavy lifting – Let
Microsoft does the heavy lifting ( data
center management, racking,
stacking , powering servers, etc.) and
simply focus on the business.
 Make frequent, small and
reversable changes - update
regularly to increase the flow of
beneficial changes. Make changes in
small increments that’s reversible.
Microsoft 365 Security Center > Defender
Integrated protection against sophisticated attacks
Microsoft
Defender for
Endpoint
A unified endpoint platform
for preventative protection,
post-breach detection,
automated investigation,
and response.
Microsoft
Defender for
Office 365
Microsoft
Defender for
Identity
Microsoft
Defender for
Endpoint
Safeguards the organization
against malicious threats
posed by email messages,
links (URLs) and
collaboration tools.
It uses Active Directory signals to
identify, detect, and investigate
advanced threats, compromised
identities, and malicious insider
actions directed at the organization.
Microsoft 365
Defender
Cross-product single
pane of glass
Microsoft has integrated Microsoft Defender for Endpoint (formerly Microsoft
Defender ATP) and Microsoft Defender for Office 365 (formerly Office ATP)
experiences into a coordinated cross-domain security suite, with better data
coverage, combined incident management, automatic investigation and
remediation, Microsoft Threat Experts, Threat Analytics reports, and cross-domain
hunting capabilities.
& Azure AD Identity
Protection
Email and
collaboration
Comprehensive cross-SaaS solution
bringing deep visibility, strong data
controls, and enhanced threat
protection to your cloud apps.
Microsoft
Cloud App
Security
1
2 3
4
(CASB)
Microsoft Sentinel
End to end visibility plus collect, detect, investigate, respond & automate
High Level Architecture
On-premises network
Other cloud applications
Azure hub virtual network Azure virtual spoke network 1
Azure virtual spoke network 2
Azure managed services
Virtual network
peering
Virtual network
peering
Azure AD + MFA
Azure AD
Connect
Active Directory GatewaySubnet
FirewallSubnet
Azure
Firewall
API Connections
SaaS Applications
(SAML 2.0/OpenID
Connect)
ExpressRoute
virtual network
gateway
On-premises gateways
Management
Subnet
Bastion Hosts
DDOS Protection Microsoft Cloud App Security
AD
Sync
Send
logs
Data ExpressRoute
Risk
Management
&
Data
Protection
Azure Key Vault Azure JSM Azure Security Center Office365 Security Center Azure Policy
Azure Sentinel

More Related Content

Similar to Azure-Casestudy.pptx

seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqriteseo
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwarewardell henley
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceDavid J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Chris Bortlik
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMike Brannon
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterMicrosoft Österreich
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionKesavan Munuswamy
 

Similar to Azure-Casestudy.pptx (20)

seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business Resilience
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptx
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Azure-Casestudy.pptx

  • 1. Case Study Enterprise Agreement to support an ongoing modern transformation strategy.
  • 2. Case Study - Context Modern transformation for Contoso Insurance Partners Microsoft 365 E5 Azure Sentinel Efficiency Simplification Resilience Microsoft Agreement User Identities & Collaborations A Large Acquisition No. of Users 100K Regulations local data residency, GDPR Remote working (secure access to corporate resources through continuous assessment & intent-based policies. Business Requirements Visibility into threats across all resources and the ability to respond swiftly across the organization Security Requirements 1. SSO & MFA 2. Discover, classify & protect information at-rest & In-motion. 3. Protect multi-cloud apps 4. Unify sec & threat management for on-prem and cloud. 5. Restrict admin scope 6. Key/secrets management 7. Anti-DDoS 8. Secure email, documents & data shared outside. 9. WAF
  • 3. Azure Well-Architected Framework Key pillars on which the renewed value proposition will contribute Efficiency Simplification Resilience  Go global in minutes – deploy your workload in any region at minimal cost.  Azure Autoscale - to match the right demand to accommodate workload.  Improve Communication & Collaboration – using OneDrive, Teams, SharePoint, etc.  Use serverless architecture – Avoid operations burden of own servers.  Manage mobile devices efficiently - enforcement of security policies.  Democratize advance technologies – using adv. Technologies may help in efficiency.  Strong Identity Foundation and Protection – Azure AD and AD Identity Protection with least privilege, RBAC, PIM, etc.  Automate recovery from failures – monitor the workload and trigger the automation where possible.  Prepare for the events and the incidents – Develop incident management process & run regular simulations to accelerate the detection, investigation and recovery.  Scale horizontally – replace one large resource with small multiple to reduce the impact of single failure.  Implement Azure Security Service – like WAF, Anti DDoS, Firewall, etc.  Anywhere Accessibility - from any device and any location with an internet connection.  Enable single-sign-on for all the enterprise application – User login once and access any resource with provided permissions.  Stop spending money and efforts on heavy lifting – Let Microsoft does the heavy lifting ( data center management, racking, stacking , powering servers, etc.) and simply focus on the business.  Make frequent, small and reversable changes - update regularly to increase the flow of beneficial changes. Make changes in small increments that’s reversible.
  • 4. Microsoft 365 Security Center > Defender Integrated protection against sophisticated attacks Microsoft Defender for Endpoint A unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response. Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Endpoint Safeguards the organization against malicious threats posed by email messages, links (URLs) and collaboration tools. It uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at the organization. Microsoft 365 Defender Cross-product single pane of glass Microsoft has integrated Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) and Microsoft Defender for Office 365 (formerly Office ATP) experiences into a coordinated cross-domain security suite, with better data coverage, combined incident management, automatic investigation and remediation, Microsoft Threat Experts, Threat Analytics reports, and cross-domain hunting capabilities. & Azure AD Identity Protection Email and collaboration Comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps. Microsoft Cloud App Security 1 2 3 4 (CASB)
  • 5. Microsoft Sentinel End to end visibility plus collect, detect, investigate, respond & automate
  • 6. High Level Architecture On-premises network Other cloud applications Azure hub virtual network Azure virtual spoke network 1 Azure virtual spoke network 2 Azure managed services Virtual network peering Virtual network peering Azure AD + MFA Azure AD Connect Active Directory GatewaySubnet FirewallSubnet Azure Firewall API Connections SaaS Applications (SAML 2.0/OpenID Connect) ExpressRoute virtual network gateway On-premises gateways Management Subnet Bastion Hosts DDOS Protection Microsoft Cloud App Security AD Sync Send logs Data ExpressRoute Risk Management & Data Protection Azure Key Vault Azure JSM Azure Security Center Office365 Security Center Azure Policy Azure Sentinel