SlideShare a Scribd company logo
1 of 46
365EduCon Seattle – 2023
Drew Madelung
Breakdown of
Microsoft Purview
Solutions
Drew Madelung
Email : drew.madelung@protiviti.com
Twitter : @dmadelung
Website: drewmadelung.com
Associate Director – M365 Cloud Applications
What is Microsoft Purview
Safeguarding your data
Improve risk and compliance
Breakdown of
Microsoft Purview
Solutions
365EduCon Seattle 2023
#365EduCon
Understand & govern your data
Demos on Demos
Data usage is evolving and complex,
moving outside of the traditional
borders of business
OS
OS
93% of data within an
organization is dark
Year over year, the amount
of data available doubles
OS
OS
Organizations lack visibility into their data
OS
OS
The landscape is fragmented, creating risks
We live in a hybrid technology environment
of organizations
are multi-cloud
90%
find it hard to manage
fragmented
compliance and risk
related solutions
80%
80%
of decision makers have
purchased multiple
products to meet
compliance and data-
protection needs
Microsoft Purview
Microsoft Purview is a comprehensive set of solutions which help
organizations govern and protect data across their multi-cloud,
multi-platform data environment, while meeting the compliance
requirements they are subject to.
Purview brings together solutions
Purview branding simplification
Azure Purview portal Microsoft Purview Governance Portal
Azure Purview Data Map Microsoft Purview Data Map
Azure Purview Data Catalog Microsoft Purview Data Catalog
Azure Purview Data Insights Microsoft Purview Data Estate Insights
Microsoft 365 compliance center Microsoft Purview Compliance Portal
Microsoft Information Governance Microsoft Purview Data Lifecycle Management
Records Management in Microsoft 365 Microsoft Purview Records Management
Microsoft Information Protection Microsoft Purview Information Protection
Office 365 Data Loss Prevention Microsoft Purview Data Loss Prevention
Insider Risk Management Microsoft Purview Insider Risk Management
Communication Compliance Microsoft Purview Communication Compliance
Compliance Manager Microsoft Purview Compliance Manager
Core eDiscovery in Microsoft 365 Microsoft Purview eDiscovery (Standard)
Advanced eDiscovery in Microsoft 365 Microsoft Purview eDiscovery (Premium)
Basic Audit in Microsoft 365 Microsoft Purview Audit (Standard)
Advanced Audit in Microsoft 365 Microsoft Purview Audit (Premium)
Microsoft Purview
Understand & govern data
Manage visibility and governance of data
assets across your environment
Safeguard data,
wherever it lives
Protect sensitive data across
clouds, apps, and devices
Improve risk &
compliance posture
Identify data risks and manage
regulatory compliance requirements
Microsoft ecosystem
Support for multi-cloud, hybrid, SaaS data | Third-party/partner ecosystem
Classification - General
Safeguarding your data
Protect your data where it lives
• Understand your
data landscape and
identify data across
environments
Know your
data
• Classify data with
labels, apply
protection and
markings
Protect your
data • Prevent
unauthorized or
accidental sharing
of sensitive data
Prevent data
loss
• Automatically
retain, delete, and
store data and
records in a
compliant manner
Govern data
loss
Do you have a strategy?
Do you know where your business critical
and sensitive data resides and what is being
done with it?
Do you have control of this data as it travels
inside and outside of your organization?
Are you using multiple solutions to classify,
label, and protect this data?
Top data security risks
Data security
incidents are
widespread
83%
of organizations
experience more than
one data breach in their
lifetime1
Malicious insiders
account for 20% of
data breaches,
adding to costs
$4.18M
Average cost of
data breach with a
malicious insider2
Organizations
are struggling with
a fragmented
solution landscape
80%
of decision makers purchased
multiple products to meet
compliance and data
protection needs3
Organizations need to
Protect sensitive data wherever it lives throughout its lifecycle
Understand user activity context around the data and identify risks
Prevent data from unauthorized use across apps, services, and devices
Keys to safeguarding your data
Manage
insider risks
Protect
sensitive data
Prevent
data loss
• Discover and classify data at scale using
automation and machine-learning
• Safeguard data throughout its lifecycle
with labeling and encryption built into
productivity tools
• Extend the protection experience across
environments to protect data wherever it
lives
Purview Information Protection
Purview Insider Risk Management
• Protect user trust and build a holistic
insider risk program with pseudonymization
and strong privacy controls
• Identify hidden risks with hundreds of built-
in machine-learning models and indicators,
requiring no endpoint agents.
• Expedite mitigation with enriched
investigations and adaptive protection that
enforce controls dynamically.
Purview Data Loss Prevention
• Cloud native with built-in protection in
Microsoft 365 apps, services, and windows
endpoints - no on-premise infrastructure or
agents needed
• Balance protection and productivity with
granular policy controls and manage DLP
policies all workloads from a single location
• Leverage classification and user activity
insights to better inform DLP polices and
benefit from an integrated incident
management
Safeguarding data examples
`
Block an email or
document from being
shared externally
Utilize Exchange, SharePoint, and
OneDrive DLP policies
Stopping sensitive data
sharing in Teams
internally and externally
Utilize Teams DLP policies,
Sensitivity labels for
containers, and for files with
encryption
Prevent a file from being
copied from an endpoint
to a non-approved
location
Utilize Endpoint DLP for
Windows and macOS
Demo
Classification - General
Improve risk & compliance
Do you have a
strategy for retaining
and managing
regulatory and
business critical
data?
Do you know what your regulatory
requirements are for your organization?
Do you know where the data resides
requiring retention?
Do you have established guidelines on
the information lifecycle of this data
from creation thru disposal?
Purview Data Lifecycle Management
• Retain or delete data and manage records
where users collaborate to manage risk and
prevent productivity loss
• Demonstrate compliance with label
analytics
insights, defensible disposal, and rich audit
trails
• Manage non-Microsoft data import with
pre-built
data connectors*
Purview Records Management
• Mange regulatory, legal, and business-
critical records with records labels and
regular disposition.
• Manage your retention requirements with a
file plan.
• Start different retention periods when an
event occurs with event-based retention.
• Set specific permissions for records
manager functions and review, validate, and
export disposition details.
What is a “Record”
• Restrictions are placed on the items in terms of what actions are allowed or
blocked
Keeping data longer than needed or required…
• imposes significant costs and risks for your organization
Removing data sooner than you should…
• may cause undue hardship if it’s required for business reasons
• may make you non-compliant with policies and government regulations
Tools to manage retention and policy-based deletion are needed to balance these needs in a
uniform way
Why Data Retention & Deletion is important
Govern your data
Demo
Purview Communication Compliance
• Intelligent customizable playbooks detect
violations across Teams, Exchange, Engage, and
third-party content to detect violations such as
confidential information, harassing, threatening
language, or adult content
• Flexible remediation workflows enable quick
action on violations, like remove incriminating
messages on Teams
• Identify and investigate communications risks
while maintaining end-user privacy
Purview eDiscovery
• Standard and premium offerings
• Preserve content by custodian, send
hold notifications, and track
acknowledgements
• Review and manage static sets of
documents within a case, that can be
independently searched, analyzed,
shared, and acted upon
• Near duplicate detection, email
threading, themes, and ML models to
identify potential
high value content and make the review
process more efficient
Purview Audit
• Tap into additional events that are important for
forensic investigations (e.g. mail items accessed,
mail send, user search) and enabled by default
• Preserve audit logs for up to a year, with option
for 10-year retention add-on (premium)
• Standard audit = 90 day retention and no
mailitemaccessed activity
• High bandwidth access to data with ~2x the
baseline and ability to export via PowerShell
• Search-UnifiedAuditLog
Purview Data Connectors
• One catalog for all connectors built by
Microsoft and partners
(TeleMessage,Veritas,17a-4,CellTrust) in one
place
• Simplified deployment and monitoring with
few clicks to setup data import for most
connectors*
• 73 built-in connectors including Bloomberg
Message, Slack eDiscovery, Zoom Meetings,
Webex, Twitter etc.
• Can perform eDiscovery, holds, retention,
and more
Purview Compliance Manager
• Manage end-to-end compliance from easy
onboarding to control implementation
• Configure out of the box (pre-built)
assessments to meet your requirements
across all assets
• Simplify compliance with continuous
assessments, automated control mapping,
and a compliance score
• Detailed step-by-step guidance on
improvement actions
It’s all integrated
Demo
Classification - General
Understand & govern your data
Graph describes the data
assets and their
relationships across your
data estate and run scans
with built in classifiers to
label.
Purview Data within Azure
Data Map Data Catalog Data Estate Insights
Make data discoverable
with search, browsing, and
curation along with data
lineage visualization.
Gain an understanding of
your data management
activities such as health,
status, and the whole data
estate together.
163 zettabytes of data a year will
be created by 2025
Cost of compliance continues to
increase year over year
200+ updates per day from 750
regulatory bodies
Challenges
Adopt a comprehensive data governance
strategy
Leverage the shared responsibility model
Use integrated tools that span end to
end scenarios
163 zettabytes of data a year will
be created by 2025
200+ updates per day from 750
regulatory bodies
Cost of compliance continues to
increase year over year
Strategies
Where and how to start
• Learn about the technical capabilities
within the Purview toolkit
• Identify REAL scenarios or challenges
that Purview can solve
• Assign Purview ownership by solution
and get permissions setup
• Identify competing solutions with a
solution rationalization
• Build a Purview roadmap aligned to your
overall product, M365, or security
roadmap
Allows you to start
without having it
all figured out
Allows for
incremental
improvements
Eases information
workers into the
world of protection
and retention
Some protection
and retention is
better than
nothing
Utilizing a crawl-walk-run strategy
Questions?
Email: drew.madelung@protiviti.com
Twitter: @dmadelung
Website: drewmadelung.com
Slides: http://bit.ly/DrewSlides
Breakdown of
Microsoft
Purview Solutions

More Related Content

What's hot

Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
DW Migration Webinar-March 2022.pptx
DW Migration Webinar-March 2022.pptxDW Migration Webinar-March 2022.pptx
DW Migration Webinar-March 2022.pptxDatabricks
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisUni Systems S.M.S.A.
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...ArethaSimons
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Azure data platform overview
Azure data platform overviewAzure data platform overview
Azure data platform overviewJames Serra
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Building Modern Data Platform with Microsoft Azure
Building Modern Data Platform with Microsoft AzureBuilding Modern Data Platform with Microsoft Azure
Building Modern Data Platform with Microsoft AzureDmitry Anoshin
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
DataMinds 2022 Azure Purview Erwin de Kreuk
DataMinds 2022 Azure Purview Erwin de KreukDataMinds 2022 Azure Purview Erwin de Kreuk
DataMinds 2022 Azure Purview Erwin de KreukErwin de Kreuk
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy☁ Hicham KADIRI ☁
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 

What's hot (20)

Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
DW Migration Webinar-March 2022.pptx
DW Migration Webinar-March 2022.pptxDW Migration Webinar-March 2022.pptx
DW Migration Webinar-March 2022.pptx
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Introduction to Azure Data Lake
Introduction to Azure Data LakeIntroduction to Azure Data Lake
Introduction to Azure Data Lake
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D Koutsanastasis
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Webinar Data Mesh - Part 3
Webinar Data Mesh - Part 3Webinar Data Mesh - Part 3
Webinar Data Mesh - Part 3
 
Azure data platform overview
Azure data platform overviewAzure data platform overview
Azure data platform overview
 
Azure Synapse Analytics
Azure Synapse AnalyticsAzure Synapse Analytics
Azure Synapse Analytics
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Building Modern Data Platform with Microsoft Azure
Building Modern Data Platform with Microsoft AzureBuilding Modern Data Platform with Microsoft Azure
Building Modern Data Platform with Microsoft Azure
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
DataMinds 2022 Azure Purview Erwin de Kreuk
DataMinds 2022 Azure Purview Erwin de KreukDataMinds 2022 Azure Purview Erwin de Kreuk
DataMinds 2022 Azure Purview Erwin de Kreuk
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 

Similar to Breakdown of Microsoft Purview Solutions

Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareKonverge Technologies Pvt. Ltd.
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionKesavan Munuswamy
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...EdiverLadino
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyPrivacera
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 

Similar to Breakdown of Microsoft Purview Solutions (20)

Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 

More from Drew Madelung

Introduction to Microsoft Syntex
Introduction to Microsoft SyntexIntroduction to Microsoft Syntex
Introduction to Microsoft SyntexDrew Madelung
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDriveDrew Madelung
 
Deploying Viva Topics
Deploying Viva TopicsDeploying Viva Topics
Deploying Viva TopicsDrew Madelung
 
How to Successfully Manage OneDrive for Business
How to Successfully Manage OneDrive for BusinessHow to Successfully Manage OneDrive for Business
How to Successfully Manage OneDrive for BusinessDrew Madelung
 
What's New with OneDrive
What's New with OneDriveWhat's New with OneDrive
What's New with OneDriveDrew Madelung
 
Getting started with with SharePoint Syntex
Getting started with with SharePoint SyntexGetting started with with SharePoint Syntex
Getting started with with SharePoint SyntexDrew Madelung
 
Intro to Shared Channels
Intro to Shared ChannelsIntro to Shared Channels
Intro to Shared ChannelsDrew Madelung
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsDrew Madelung
 
Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...Drew Madelung
 
Microsoft Ignite 2021 Recap
Microsoft Ignite 2021 RecapMicrosoft Ignite 2021 Recap
Microsoft Ignite 2021 RecapDrew Madelung
 
How to successfully manage OneDrive
How to successfully manage OneDriveHow to successfully manage OneDrive
How to successfully manage OneDriveDrew Madelung
 
What's new with OneDrive - July 2021
What's new with OneDrive - July 2021What's new with OneDrive - July 2021
What's new with OneDrive - July 2021Drew Madelung
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Sensitivity for Groups, Teams, and SharePoint
Sensitivity for Groups, Teams, and SharePointSensitivity for Groups, Teams, and SharePoint
Sensitivity for Groups, Teams, and SharePointDrew Madelung
 
Wisconsin SharePoint User Group - November 2020 - Ignite News
Wisconsin SharePoint User Group - November 2020 - Ignite NewsWisconsin SharePoint User Group - November 2020 - Ignite News
Wisconsin SharePoint User Group - November 2020 - Ignite NewsDrew Madelung
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
Enabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePointEnabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePointDrew Madelung
 
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsFollowing the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsDrew Madelung
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesDrew Madelung
 

More from Drew Madelung (20)

Introduction to Microsoft Syntex
Introduction to Microsoft SyntexIntroduction to Microsoft Syntex
Introduction to Microsoft Syntex
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDrive
 
Deploying Viva Topics
Deploying Viva TopicsDeploying Viva Topics
Deploying Viva Topics
 
How to Successfully Manage OneDrive for Business
How to Successfully Manage OneDrive for BusinessHow to Successfully Manage OneDrive for Business
How to Successfully Manage OneDrive for Business
 
What's New with OneDrive
What's New with OneDriveWhat's New with OneDrive
What's New with OneDrive
 
Getting started with with SharePoint Syntex
Getting started with with SharePoint SyntexGetting started with with SharePoint Syntex
Getting started with with SharePoint Syntex
 
Intro to Shared Channels
Intro to Shared ChannelsIntro to Shared Channels
Intro to Shared Channels
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
 
Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...Everything you need to know about external sharing in OneDrive, SharePoint, a...
Everything you need to know about external sharing in OneDrive, SharePoint, a...
 
Microsoft Ignite 2021 Recap
Microsoft Ignite 2021 RecapMicrosoft Ignite 2021 Recap
Microsoft Ignite 2021 Recap
 
How to successfully manage OneDrive
How to successfully manage OneDriveHow to successfully manage OneDrive
How to successfully manage OneDrive
 
What's new with OneDrive - July 2021
What's new with OneDrive - July 2021What's new with OneDrive - July 2021
What's new with OneDrive - July 2021
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Sensitivity for Groups, Teams, and SharePoint
Sensitivity for Groups, Teams, and SharePointSensitivity for Groups, Teams, and SharePoint
Sensitivity for Groups, Teams, and SharePoint
 
Wisconsin SharePoint User Group - November 2020 - Ignite News
Wisconsin SharePoint User Group - November 2020 - Ignite NewsWisconsin SharePoint User Group - November 2020 - Ignite News
Wisconsin SharePoint User Group - November 2020 - Ignite News
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Enabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePointEnabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePoint
 
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsFollowing the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Breakdown of Microsoft Purview Solutions

  • 1. 365EduCon Seattle – 2023 Drew Madelung Breakdown of Microsoft Purview Solutions
  • 2. Drew Madelung Email : drew.madelung@protiviti.com Twitter : @dmadelung Website: drewmadelung.com Associate Director – M365 Cloud Applications
  • 3. What is Microsoft Purview Safeguarding your data Improve risk and compliance Breakdown of Microsoft Purview Solutions 365EduCon Seattle 2023 #365EduCon Understand & govern your data Demos on Demos
  • 4. Data usage is evolving and complex, moving outside of the traditional borders of business OS OS
  • 5. 93% of data within an organization is dark Year over year, the amount of data available doubles OS OS Organizations lack visibility into their data
  • 6. OS OS The landscape is fragmented, creating risks
  • 7. We live in a hybrid technology environment of organizations are multi-cloud 90% find it hard to manage fragmented compliance and risk related solutions 80% 80% of decision makers have purchased multiple products to meet compliance and data- protection needs
  • 8. Microsoft Purview Microsoft Purview is a comprehensive set of solutions which help organizations govern and protect data across their multi-cloud, multi-platform data environment, while meeting the compliance requirements they are subject to.
  • 10. Purview branding simplification Azure Purview portal Microsoft Purview Governance Portal Azure Purview Data Map Microsoft Purview Data Map Azure Purview Data Catalog Microsoft Purview Data Catalog Azure Purview Data Insights Microsoft Purview Data Estate Insights Microsoft 365 compliance center Microsoft Purview Compliance Portal Microsoft Information Governance Microsoft Purview Data Lifecycle Management Records Management in Microsoft 365 Microsoft Purview Records Management Microsoft Information Protection Microsoft Purview Information Protection Office 365 Data Loss Prevention Microsoft Purview Data Loss Prevention Insider Risk Management Microsoft Purview Insider Risk Management Communication Compliance Microsoft Purview Communication Compliance Compliance Manager Microsoft Purview Compliance Manager Core eDiscovery in Microsoft 365 Microsoft Purview eDiscovery (Standard) Advanced eDiscovery in Microsoft 365 Microsoft Purview eDiscovery (Premium) Basic Audit in Microsoft 365 Microsoft Purview Audit (Standard) Advanced Audit in Microsoft 365 Microsoft Purview Audit (Premium)
  • 11. Microsoft Purview Understand & govern data Manage visibility and governance of data assets across your environment Safeguard data, wherever it lives Protect sensitive data across clouds, apps, and devices Improve risk & compliance posture Identify data risks and manage regulatory compliance requirements Microsoft ecosystem Support for multi-cloud, hybrid, SaaS data | Third-party/partner ecosystem
  • 13. Protect your data where it lives • Understand your data landscape and identify data across environments Know your data • Classify data with labels, apply protection and markings Protect your data • Prevent unauthorized or accidental sharing of sensitive data Prevent data loss • Automatically retain, delete, and store data and records in a compliant manner Govern data loss
  • 14. Do you have a strategy? Do you know where your business critical and sensitive data resides and what is being done with it? Do you have control of this data as it travels inside and outside of your organization? Are you using multiple solutions to classify, label, and protect this data?
  • 15. Top data security risks Data security incidents are widespread 83% of organizations experience more than one data breach in their lifetime1 Malicious insiders account for 20% of data breaches, adding to costs $4.18M Average cost of data breach with a malicious insider2 Organizations are struggling with a fragmented solution landscape 80% of decision makers purchased multiple products to meet compliance and data protection needs3
  • 16. Organizations need to Protect sensitive data wherever it lives throughout its lifecycle Understand user activity context around the data and identify risks Prevent data from unauthorized use across apps, services, and devices
  • 17. Keys to safeguarding your data Manage insider risks Protect sensitive data Prevent data loss
  • 18. • Discover and classify data at scale using automation and machine-learning • Safeguard data throughout its lifecycle with labeling and encryption built into productivity tools • Extend the protection experience across environments to protect data wherever it lives Purview Information Protection
  • 19. Purview Insider Risk Management • Protect user trust and build a holistic insider risk program with pseudonymization and strong privacy controls • Identify hidden risks with hundreds of built- in machine-learning models and indicators, requiring no endpoint agents. • Expedite mitigation with enriched investigations and adaptive protection that enforce controls dynamically.
  • 20. Purview Data Loss Prevention • Cloud native with built-in protection in Microsoft 365 apps, services, and windows endpoints - no on-premise infrastructure or agents needed • Balance protection and productivity with granular policy controls and manage DLP policies all workloads from a single location • Leverage classification and user activity insights to better inform DLP polices and benefit from an integrated incident management
  • 21. Safeguarding data examples ` Block an email or document from being shared externally Utilize Exchange, SharePoint, and OneDrive DLP policies Stopping sensitive data sharing in Teams internally and externally Utilize Teams DLP policies, Sensitivity labels for containers, and for files with encryption Prevent a file from being copied from an endpoint to a non-approved location Utilize Endpoint DLP for Windows and macOS
  • 22. Demo
  • 23. Classification - General Improve risk & compliance
  • 24. Do you have a strategy for retaining and managing regulatory and business critical data? Do you know what your regulatory requirements are for your organization? Do you know where the data resides requiring retention? Do you have established guidelines on the information lifecycle of this data from creation thru disposal?
  • 25. Purview Data Lifecycle Management • Retain or delete data and manage records where users collaborate to manage risk and prevent productivity loss • Demonstrate compliance with label analytics insights, defensible disposal, and rich audit trails • Manage non-Microsoft data import with pre-built data connectors*
  • 26. Purview Records Management • Mange regulatory, legal, and business- critical records with records labels and regular disposition. • Manage your retention requirements with a file plan. • Start different retention periods when an event occurs with event-based retention. • Set specific permissions for records manager functions and review, validate, and export disposition details.
  • 27. What is a “Record” • Restrictions are placed on the items in terms of what actions are allowed or blocked
  • 28. Keeping data longer than needed or required… • imposes significant costs and risks for your organization Removing data sooner than you should… • may cause undue hardship if it’s required for business reasons • may make you non-compliant with policies and government regulations Tools to manage retention and policy-based deletion are needed to balance these needs in a uniform way Why Data Retention & Deletion is important
  • 30. Demo
  • 31. Purview Communication Compliance • Intelligent customizable playbooks detect violations across Teams, Exchange, Engage, and third-party content to detect violations such as confidential information, harassing, threatening language, or adult content • Flexible remediation workflows enable quick action on violations, like remove incriminating messages on Teams • Identify and investigate communications risks while maintaining end-user privacy
  • 32. Purview eDiscovery • Standard and premium offerings • Preserve content by custodian, send hold notifications, and track acknowledgements • Review and manage static sets of documents within a case, that can be independently searched, analyzed, shared, and acted upon • Near duplicate detection, email threading, themes, and ML models to identify potential high value content and make the review process more efficient
  • 33. Purview Audit • Tap into additional events that are important for forensic investigations (e.g. mail items accessed, mail send, user search) and enabled by default • Preserve audit logs for up to a year, with option for 10-year retention add-on (premium) • Standard audit = 90 day retention and no mailitemaccessed activity • High bandwidth access to data with ~2x the baseline and ability to export via PowerShell • Search-UnifiedAuditLog
  • 34. Purview Data Connectors • One catalog for all connectors built by Microsoft and partners (TeleMessage,Veritas,17a-4,CellTrust) in one place • Simplified deployment and monitoring with few clicks to setup data import for most connectors* • 73 built-in connectors including Bloomberg Message, Slack eDiscovery, Zoom Meetings, Webex, Twitter etc. • Can perform eDiscovery, holds, retention, and more
  • 35. Purview Compliance Manager • Manage end-to-end compliance from easy onboarding to control implementation • Configure out of the box (pre-built) assessments to meet your requirements across all assets • Simplify compliance with continuous assessments, automated control mapping, and a compliance score • Detailed step-by-step guidance on improvement actions
  • 37. Demo
  • 39. Graph describes the data assets and their relationships across your data estate and run scans with built in classifiers to label. Purview Data within Azure Data Map Data Catalog Data Estate Insights Make data discoverable with search, browsing, and curation along with data lineage visualization. Gain an understanding of your data management activities such as health, status, and the whole data estate together.
  • 40. 163 zettabytes of data a year will be created by 2025 Cost of compliance continues to increase year over year 200+ updates per day from 750 regulatory bodies Challenges
  • 41. Adopt a comprehensive data governance strategy Leverage the shared responsibility model Use integrated tools that span end to end scenarios 163 zettabytes of data a year will be created by 2025 200+ updates per day from 750 regulatory bodies Cost of compliance continues to increase year over year Strategies
  • 42. Where and how to start • Learn about the technical capabilities within the Purview toolkit • Identify REAL scenarios or challenges that Purview can solve • Assign Purview ownership by solution and get permissions setup • Identify competing solutions with a solution rationalization • Build a Purview roadmap aligned to your overall product, M365, or security roadmap
  • 43. Allows you to start without having it all figured out Allows for incremental improvements Eases information workers into the world of protection and retention Some protection and retention is better than nothing Utilizing a crawl-walk-run strategy
  • 44.
  • 45. Questions? Email: drew.madelung@protiviti.com Twitter: @dmadelung Website: drewmadelung.com Slides: http://bit.ly/DrewSlides

Editor's Notes

  1. We all have unstructured data Not all data is risky, we need to find whtas risky
  2. There are so many places to control in a zero trust environment Lots of places to discover data
  3. It’s not all MS
  4. Think about the flow of data when safeguarding it
  5. DLM & RM