SlideShare a Scribd company logo
Enterprise Mobility
Suite (EMS)
Lai Yoong Seng | MVP Hyper-V
Senior Consultant |
Yoongseng.lai@infrontconsulting.com
Part 1
Hybrid Identity
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
EMS
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
User’s identity
•••••••••••••
User’s identity
•••••••••••••
Username
?
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
Username
?
New app
Identity layer
ITUser
On-premises
User’s identity
•••••••••••••
Username
•••••••••••••
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
Username
?
Forgot your password?
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
New device
ITUser
Cloud
On-premises
Policy control
SaaS discovery
User’s identity
ITUser
Cloud
On-premises
Identity: Cloud, Sync or Federated?


Cloud identity provides a
solution where all identity
resides in the cloud
Federated identity allows
customers to retain all
authentication on-premises
Identity sync enables customers
to bridge their existing identity
into the cloud
Demo
Azure Active Directory
Enriched user experience through a single, verified identity
Unified across cloud and on-premises with single sign-on
Integrated identity solution reduces risk across the business
Reduced IT burden of creating and managing multiple identities

More Related Content

What's hot

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
Ali Mkahal
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
David J Rosenthal
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
Sentri
 
Windows intune
Windows intuneWindows intune
Windows intune
Iron Cove Solutions
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
EPC Group
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
Peter Daalmans
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
MarketingArrowECS_CZ
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
AgileIT
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
Robert Crane
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
David J Rosenthal
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
ratneshsinghparihar
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 

What's hot (20)

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Windows intune
Windows intuneWindows intune
Windows intune
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 

Similar to Enterprise Mobility Suite- Azure AD Premium

Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
Primend
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
Richard Harbridge
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
The user s identities
The user s identitiesThe user s identities
The user s identities
Giuliano Latini
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
Community IT Innovators
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
Hitachi ID Systems, Inc.
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the device
Olav Tvedt
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra Infosystems
Lyra Infosystems Pvt. Ltd
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
Debashis Banerjee
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Giuliano Latini
 
Zero Credential Development with Managed Identities
Zero Credential Development with Managed IdentitiesZero Credential Development with Managed Identities
Zero Credential Development with Managed Identities
Joonas Westlin
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
CompuTrain. De IT opleider.
 
Understanding the Olympus Multi-License Administration
Understanding the Olympus Multi-License AdministrationUnderstanding the Olympus Multi-License Administration
Understanding the Olympus Multi-License Administration
gr8situation
 

Similar to Enterprise Mobility Suite- Azure AD Premium (20)

Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the device
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra Infosystems
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
 
Zero Credential Development with Managed Identities
Zero Credential Development with Managed IdentitiesZero Credential Development with Managed Identities
Zero Credential Development with Managed Identities
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
 
Understanding the Olympus Multi-License Administration
Understanding the Olympus Multi-License AdministrationUnderstanding the Olympus Multi-License Administration
Understanding the Olympus Multi-License Administration
 

More from Lai Yoong Seng

Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
Lai Yoong Seng
 
ISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better TogetherISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better Together
Lai Yoong Seng
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
Lai Yoong Seng
 
Visibility With Veeam One
Visibility With Veeam OneVisibility With Veeam One
Visibility With Veeam One
Lai Yoong Seng
 
What's next: Veeam Backup for Microsoft O365 2.0
What's next: Veeam Backup for Microsoft O365 2.0What's next: Veeam Backup for Microsoft O365 2.0
What's next: Veeam Backup for Microsoft O365 2.0
Lai Yoong Seng
 
Get started With Microsoft Azure Virtual Machine
Get started With Microsoft Azure Virtual MachineGet started With Microsoft Azure Virtual Machine
Get started With Microsoft Azure Virtual Machine
Lai Yoong Seng
 
Disaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureDisaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft Azure
Lai Yoong Seng
 
MAP Toolkit
MAP ToolkitMAP Toolkit
MAP Toolkit
Lai Yoong Seng
 
Common Scenario to Start With
Common Scenario to Start WithCommon Scenario to Start With
Common Scenario to Start With
Lai Yoong Seng
 
How Secure is Azure?
How Secure is Azure?How Secure is Azure?
How Secure is Azure?
Lai Yoong Seng
 
Extending On-Premise Infrastructure To Cloud
Extending On-Premise Infrastructure To CloudExtending On-Premise Infrastructure To Cloud
Extending On-Premise Infrastructure To Cloud
Lai Yoong Seng
 
Managing and Automating Hybrid Cloud Infrastructure
Managing and Automating Hybrid Cloud InfrastructureManaging and Automating Hybrid Cloud Infrastructure
Managing and Automating Hybrid Cloud Infrastructure
Lai Yoong Seng
 
Private Cloud R2: Scaling From Server To Cloud Services
Private Cloud R2: Scaling From Server To Cloud ServicesPrivate Cloud R2: Scaling From Server To Cloud Services
Private Cloud R2: Scaling From Server To Cloud Services
Lai Yoong Seng
 
What's New in windows server 2012 R2 Hyper V?
What's New in windows server 2012 R2 Hyper V?What's New in windows server 2012 R2 Hyper V?
What's New in windows server 2012 R2 Hyper V?
Lai Yoong Seng
 
Storage options in the cloud os
Storage options in the cloud osStorage options in the cloud os
Storage options in the cloud os
Lai Yoong Seng
 
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Why Hyper- V is Your Best Virtualization Cloud OS Platform?Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Lai Yoong Seng
 
Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012
Lai Yoong Seng
 
Configuring and Using the New Virtualization Features in Windows Server 2012
Configuring and Using the New Virtualization Features in Windows Server 2012Configuring and Using the New Virtualization Features in Windows Server 2012
Configuring and Using the New Virtualization Features in Windows Server 2012
Lai Yoong Seng
 
Windows 8 Virtualization
Windows 8 VirtualizationWindows 8 Virtualization
Windows 8 Virtualization
Lai Yoong Seng
 
Building a Virtualized Development and Testing Environments
Building a Virtualized Development and Testing EnvironmentsBuilding a Virtualized Development and Testing Environments
Building a Virtualized Development and Testing Environments
Lai Yoong Seng
 

More from Lai Yoong Seng (20)

Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
 
ISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better TogetherISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better Together
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Visibility With Veeam One
Visibility With Veeam OneVisibility With Veeam One
Visibility With Veeam One
 
What's next: Veeam Backup for Microsoft O365 2.0
What's next: Veeam Backup for Microsoft O365 2.0What's next: Veeam Backup for Microsoft O365 2.0
What's next: Veeam Backup for Microsoft O365 2.0
 
Get started With Microsoft Azure Virtual Machine
Get started With Microsoft Azure Virtual MachineGet started With Microsoft Azure Virtual Machine
Get started With Microsoft Azure Virtual Machine
 
Disaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureDisaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft Azure
 
MAP Toolkit
MAP ToolkitMAP Toolkit
MAP Toolkit
 
Common Scenario to Start With
Common Scenario to Start WithCommon Scenario to Start With
Common Scenario to Start With
 
How Secure is Azure?
How Secure is Azure?How Secure is Azure?
How Secure is Azure?
 
Extending On-Premise Infrastructure To Cloud
Extending On-Premise Infrastructure To CloudExtending On-Premise Infrastructure To Cloud
Extending On-Premise Infrastructure To Cloud
 
Managing and Automating Hybrid Cloud Infrastructure
Managing and Automating Hybrid Cloud InfrastructureManaging and Automating Hybrid Cloud Infrastructure
Managing and Automating Hybrid Cloud Infrastructure
 
Private Cloud R2: Scaling From Server To Cloud Services
Private Cloud R2: Scaling From Server To Cloud ServicesPrivate Cloud R2: Scaling From Server To Cloud Services
Private Cloud R2: Scaling From Server To Cloud Services
 
What's New in windows server 2012 R2 Hyper V?
What's New in windows server 2012 R2 Hyper V?What's New in windows server 2012 R2 Hyper V?
What's New in windows server 2012 R2 Hyper V?
 
Storage options in the cloud os
Storage options in the cloud osStorage options in the cloud os
Storage options in the cloud os
 
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Why Hyper- V is Your Best Virtualization Cloud OS Platform?Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
 
Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012
 
Configuring and Using the New Virtualization Features in Windows Server 2012
Configuring and Using the New Virtualization Features in Windows Server 2012Configuring and Using the New Virtualization Features in Windows Server 2012
Configuring and Using the New Virtualization Features in Windows Server 2012
 
Windows 8 Virtualization
Windows 8 VirtualizationWindows 8 Virtualization
Windows 8 Virtualization
 
Building a Virtualized Development and Testing Environments
Building a Virtualized Development and Testing EnvironmentsBuilding a Virtualized Development and Testing Environments
Building a Virtualized Development and Testing Environments
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Enterprise Mobility Suite- Azure AD Premium

Editor's Notes

  1. On previous slide we saw 3 components Devices Lock down app Lock down of files
  2. Identity is the core components. The best is 1 identity to control access to devices, app & files. In this scenario: AD With federated active directory and sync to Azure AD, we can achieve SSO. Do not require to key in password. In case staff forget password. They can go to portal and perform self service password reset. Which reduce the burden of IT staff. With 1 identify able access to multiple corporate SaaS. When access app, the most common scenario is use user name & app. To enhance security, you can enable additional security called “MFA”.
  3. Technology suppose to assist people and not create a burden and prevent people from using it. Now let into a scenario: A (Jane)busy woman staff which has multiple app that she need to access. 1 app – 1 identity What happen when 30 app and 30 user name and password that she need to access.
  4. Soon or later. She will forget password! If you’re IT, How to solve this issue? Let look into your scenario: Active Directory on-premise. If yes, let start to sync username and password to Azure Active Directory. Password is hash and protected. Read need to rehash Once it is sync to AAD, you can now login with same user name and password exactly on-prem and link to multiple SaaS.
  5. When introduce new app, you do not need to create user name & password
  6. By sync to AAD, you can have 1 common identity to access all password and achieve single sign on (without need to key in password)
  7. That’s not all – if our User forgets a password (and that has happened), she doesn’t need to call the helpdesk – there’s a self-service password reset facility. IT can carry on.
  8. Identify SaaS app. You can use Azure AD Discovery to detect SaaS
  9. Let’s say our User travels a lot and has been known to lose a device or two. Our IT Pro has the peace of mind to know that his Hybrid Identity solution will allow him to spot anomalies in user behavior. Even our User is unlikely to be accessing her expense account from New York at 9am and Bangkok at 10am.
  10. Central console to manage user account, group -configuration Set MFA Change page branding SaaS
  11. Once activated Azure AD Premium, the system will monitor, learn and detect on abnormal behavior Scenario- cannot from 2 different location. Authentication 1st level using user name & password 2nd level – use MFA Use app code Use phone Use sms
  12.  So, in summary – Hybrid Identity as part of the Microsoft solution for Enabling Enterprise Mobility puts your user at the center of the solution and gives IT an integrated identity management solution that reduces risk across the business.