CISSP | CCSP | CEH | MCE | MCT
Sensitivity: Unrestricted
Security
Challenges
Visibility into security
and compliance
Without security controls in
place, 68% of breaches take
months or longer to discover.
Increase in number and
sophistication of attacks
12B cloud activities inspected,
monitored, and controlled in 2020.2
Time to respond
​In 2020 … saw a 95 percent
increase in the cost of a breach—
on average $5.16 million.1
Sensitivity: Unrestricted
Integrating Silos is Challenging
MAPPING CHALLENGES
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Azure Sentinel
and more
Identity Endpoint Cloud Network
Log Flow
Azure Security Center
GRC
Professional
IT / Security
Professional
Generate Alerts
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Native CSP tools
New! New!
On-prem
New!
Azure Arc
Security posture
& compliance
Secure score Asset management Regulatory compliance
Server protection
(Azure Defender for VMs)
Threat detection VA (powered by Qualys)
Automation &
management at scale
Automation SIEM integration Export
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Compliance Management And Assessment
Demonstrate compliance status, based on
continuous assessments of Azure resources
Monitor AWS and GCP resources with
multi-cloud support
Azure Security Benchmark monitoring enabled
by default, fully aligned with Secure Score
Support common industry standards, as well as
custom initiatives based on Azure Policy
Overview of compliance status and report download
Sensitivity: Unrestricted
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Azure Defender for Servers
Protect Linux and Windows servers from threats
Reduce open network ports
Use Just-in-Time VM to control access to commonly attacked
management ports
Limit open ports with adaptive network hardening
Block malware with adaptive application controls
Protect Windows servers and clients with the
integration of Microsoft Defender for Endpoint
and protect Linux servers
Antimalware
Microsoft Defender
for Endpoint
Lateral
Movement
Data
exfiltration
Malicious code
execution
On-premise
! ! !
Behavior
analytics
Allow list
for Apps
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Azure Defender for SQL and open source databases
Protect your databases anywhere: in Azure, on premises or in other clouds
Azure
Azure Synapse
Analytics (DHW)
Azure SQL
Managed Instance
Azure SQL
Database
MySQL on
Azure VM
Azure Defender
for SQL
SQL Server
On Prem
SQL Server
On AWS EC2
SQL Server
On Google Cloud
Azure Arc enabled SQL Server
Advanced Threat Protection: detect unusual and harmful attempts to breach SQL servers across hybrid estate
Vulnerability Assessment: discover and remediate security misconfigurations in SQL servers across hybrid estate
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Azure Defender for Storage
Protect blobs containers, file shares and data lakes in Azure
Sensitivity: Unrestricted
Manage
secrets
Storage account keys
Certificates
Encryption keys
Passwords
SQL Connection Strings
Monitor
secrets Increase security and control over keys and passwords
Create and import encryption keys in minutes
Applications have no direct access to keys
Use FIPS 140-2 Level 2 validated HSMs
Reduce latency with cloud scale and global redundancy
Simplify and automate tasks for SSL/TLS certificates
Azure Defender for Key Vault
Safeguard cryptographic keys and other secrets used by cloud apps and services
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Built-in vulnerability assessment for VMs
Available as part of Azure Defender for Servers
Automated deployment of the
vulnerability scanner
Continuously scans installed applications
to find vulnerabilities for Linux &
Windows VMs
Visibility to the vulnerability findings in
Security Center portal and APIs
Powered by Qualys
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Azure Defender for Container Registries
Seamless deployment
and configuration
Image scan in ship
Scan all images, and get
visibility to vulnerable
images
Image scan in runtime
Continuous scanning of
recently pulled images
Sensitivity: Unrestricted
©Microsoft Corporation
Azure
Azure Defender for IoT
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Why are we having a Zero Trust conversation?
3. Assets increasingly leave the network
• BYOD, WFH, Mobile, and SaaS
4. Attackers shift to identity attacks
• Phishing and credential theft
• Security teams often overwhelmed
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Correlate alerts related to same attack
into single SOC work item
Automatically resolves 75% of incidents
Microsoft 365 Defender & Azure
Defender is a full protection stack!
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Microsoft Threat Intelligence
BuiltondiversesignalsourcesandAI
Sensitivity: Unrestricted
Sensitivity: Unrestricted
Attacks are crossing modalities
Emotet/Ryuk Ransomware campaign
Simplify security operations and investigation
Quickly assess the
scope and impact of
an attack
Interactive
experience to
explore links across
alerts, computers
and users
Use predefined or
ad hoc queries for
deeper examination
Sensitivity: Unrestricted
Cyber Security Advisory
Menu card
Threat
Check
Discovery
Session
Security
Conversations
Security
Demos
Add-on
Modules
Recommendations
and Next Steps

Cloud summit demystifying cloud security