The document discusses enterprise mobility and security solutions from Microsoft. It addresses challenges of managing user identities, devices, applications and data across cloud and on-premises environments. The key solutions discussed are identity-driven security to protect access to resources, managed mobile productivity to encourage secure mobile work habits, and a comprehensive solution that integrates capabilities to offer advanced security while saving costs.
Venez découvrir au travers de démos les fonctionnalités innovantes de Windows Anniversary Update en matière de sécurité avec notamment Windows Defender Advanced Threat Protection (WDATP) qui détecte et prévient les cyber-menaces. Mais également comment implémenter Windows Information Protection (ex-EDP) qui vous permet de séparer vos données personnelles de vos données professionnelles. Et il sera aussi question de Windows Hello pour protéger vos identités et en finir avec les mots de passe.
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
Introduzione agli scenari di autenticazione per i servizi informativi nei contesti lavorativi moderni. Panoramica delle soluzioni offerte dalla soluzione Enterprise Mobility and Security per la messa in sicurezza delle identità e delle informazioni nel loro completo ciclo di vita. Prevenzione, rilevamento, contenimento e risposta a minacce di tipo avanzato con riferimenti alla cyber kill chain (focus su Endpoint, Identità, servizi di produttività e cloud app).
Venez découvrir au travers de démos les fonctionnalités innovantes de Windows Anniversary Update en matière de sécurité avec notamment Windows Defender Advanced Threat Protection (WDATP) qui détecte et prévient les cyber-menaces. Mais également comment implémenter Windows Information Protection (ex-EDP) qui vous permet de séparer vos données personnelles de vos données professionnelles. Et il sera aussi question de Windows Hello pour protéger vos identités et en finir avec les mots de passe.
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
Introduzione agli scenari di autenticazione per i servizi informativi nei contesti lavorativi moderni. Panoramica delle soluzioni offerte dalla soluzione Enterprise Mobility and Security per la messa in sicurezza delle identità e delle informazioni nel loro completo ciclo di vita. Prevenzione, rilevamento, contenimento e risposta a minacce di tipo avanzato con riferimenti alla cyber kill chain (focus su Endpoint, Identità, servizi di produttività e cloud app).
Acronis Cyber Backup Cloud protects more than 20 platforms and incorporates the backup industry’s most advanced anti-ransomware technology, safeguarding data and systems in any environment physical or virtualized, on-premises or in the cloud.
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
End-User Case Study: Five Best and Five Worst Practices for SIEM
Implementing SIEM sounds straightforward, but reality sometimes begs to differ. In this session, Dr.
Anton Chuvakin will share the five best and worst practices for implementing SIEM as part of security
monitoring and intelligence. Understanding how to avoid pitfalls and create a successful SIEM
implementation will help maximize security and compliance value, and avoid costly obstacles,
inefficiencies, and risks
Securing Governing and Protecting Your Office 365 InvestmentsChris Bortlik
Microsoft continues to invest in services and capabilities to help you protect, detect, and respond to a variety of emerging security and compliance needs for Office 365. Come to this session for an interactive scenario based whiteboard and demonstration of how you can implement comprehensive controls based on a variety of dimensions across the identity of the user; their location and device; and the application, service, and content they are accessing.
Can Cloud Solutions Transform Network SecurityEC-Council
Cloud computing today has become an integral part of network security. In fact, cloud computing has benefited businesses in many ways. Read more on 7 Ways Cloud Computing Transforms Network Security.
https://www.eccouncil.org/programs/certified-network-security-course/
#cloudcomputing #networksecurity #cybersecurity #eccouncil
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
Securing Servers in Public and Hybrid CloudsRightScale
RightScale Webinar: Security and compliance remain major challenges to adoption of public cloud infrastructure hosting. Technical differences in public cloud environments render many established security models and controls inoperable. Understanding these differences and the options available to you are key to running a secure cloud environment.
Join Carson Sweet, co-founder and CEO of CloudPassage and Uri Budnik, Director, ISV Partner Program of RightScale for a free webinar where industry experts discuss why security and compliance are different in the cloud, outline a model for securing cloud-based hosting environments, and explain best practices for implementing a secure cloud infrastructure.
We will discuss:
- What's different about security in the cloud
- Shared responsibility
- Architectural challenges
- Key features to secure your cloud servers
- Secure deployment via RightScripts
Don't miss out on this opportunity to find out about all you need to secure your cloud servers!
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
Our enterprise-grade security
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
We’re more integrated and flexible
Architecture matters. That’s why our solutions run in the cloud and work seamlessly with your on-premises investments—taking the worry out of scale, maintenance, and updates.
Our cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for costly and complicated integration efforts across point capabilities. It’s the fastest and most cost-effective way to meet new business challenges and accommodate new devices, new apps, and new hires.
Nobody manages Office better
Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest IT challenges. Other vendors solve it with apps that compromise user experience and put the brakes on productivity.
Microsoft enterprise mobility solutions integrate deeply with Microsoft Office, the gold standard of productivity. We’re the only solution that brings managed mobile productivity with Microsoft Office across devices.
Acronis Cyber Backup Cloud protects more than 20 platforms and incorporates the backup industry’s most advanced anti-ransomware technology, safeguarding data and systems in any environment physical or virtualized, on-premises or in the cloud.
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
End-User Case Study: Five Best and Five Worst Practices for SIEM
Implementing SIEM sounds straightforward, but reality sometimes begs to differ. In this session, Dr.
Anton Chuvakin will share the five best and worst practices for implementing SIEM as part of security
monitoring and intelligence. Understanding how to avoid pitfalls and create a successful SIEM
implementation will help maximize security and compliance value, and avoid costly obstacles,
inefficiencies, and risks
Securing Governing and Protecting Your Office 365 InvestmentsChris Bortlik
Microsoft continues to invest in services and capabilities to help you protect, detect, and respond to a variety of emerging security and compliance needs for Office 365. Come to this session for an interactive scenario based whiteboard and demonstration of how you can implement comprehensive controls based on a variety of dimensions across the identity of the user; their location and device; and the application, service, and content they are accessing.
Can Cloud Solutions Transform Network SecurityEC-Council
Cloud computing today has become an integral part of network security. In fact, cloud computing has benefited businesses in many ways. Read more on 7 Ways Cloud Computing Transforms Network Security.
https://www.eccouncil.org/programs/certified-network-security-course/
#cloudcomputing #networksecurity #cybersecurity #eccouncil
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
Securing Servers in Public and Hybrid CloudsRightScale
RightScale Webinar: Security and compliance remain major challenges to adoption of public cloud infrastructure hosting. Technical differences in public cloud environments render many established security models and controls inoperable. Understanding these differences and the options available to you are key to running a secure cloud environment.
Join Carson Sweet, co-founder and CEO of CloudPassage and Uri Budnik, Director, ISV Partner Program of RightScale for a free webinar where industry experts discuss why security and compliance are different in the cloud, outline a model for securing cloud-based hosting environments, and explain best practices for implementing a secure cloud infrastructure.
We will discuss:
- What's different about security in the cloud
- Shared responsibility
- Architectural challenges
- Key features to secure your cloud servers
- Secure deployment via RightScripts
Don't miss out on this opportunity to find out about all you need to secure your cloud servers!
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
Our enterprise-grade security
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
We’re more integrated and flexible
Architecture matters. That’s why our solutions run in the cloud and work seamlessly with your on-premises investments—taking the worry out of scale, maintenance, and updates.
Our cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for costly and complicated integration efforts across point capabilities. It’s the fastest and most cost-effective way to meet new business challenges and accommodate new devices, new apps, and new hires.
Nobody manages Office better
Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest IT challenges. Other vendors solve it with apps that compromise user experience and put the brakes on productivity.
Microsoft enterprise mobility solutions integrate deeply with Microsoft Office, the gold standard of productivity. We’re the only solution that brings managed mobile productivity with Microsoft Office across devices.
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
Gestiona todos tus dispositivos corporativos Windows 10 desde Microsoft Intune. Entornos híbridos de autenticación, autenticación multi factor y acceso seguro a aplicaciones SaaS. Por Jose María Genzor
Global Azure Bootcamp 2018 completed recently across the world with a huge success, and I had the opportunity to co-organize the event in Chennai, India. Also delivered a session under the IT Pro track on "Securing Your Organization with Microsoft 365. Uploaded the Session Slides here.
Event url: http://chennai-gab2018.azurewebsites.net/
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
Digital transformation with freedom and peace of mind
Holistic, identity-driven protection
Help guard your data from attacks on multiple levels using innovative, identity-driven security techniques.
Productivity without compromise
Preserve the mobile and desktop experiences your workers need to stay working with familiar apps and tools.
Flexible, comprehensive solutions
Do more with less—protect users, devices, apps, and data with intuitive mobile management on a future-ready platform.
microsoft@atidan.com
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
KEY FEATURES
Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away. Focus on what is important using a simple, convenient feed.
Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc. This includes support for multi factor authentication (MFA).
Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
The crown jewels of any IT environment is the valuable information you manage. This session will explore techniques and Microsoft technologies that can ensure documents are well-managed, secured, and only available to approved individuals in your organization. We will also look at advanced ediscovery and data governance approaches and technologies that can support these.
Microsoft Enterprise Mobility + Security
Control identity + access in the cloud
Centrally manage single sign-on across devices, your datacenter, and the cloud.
Get identity-driven security
Comprehensive, intelligent protection against today's advanced attacks.
Manage mobile devices + apps
Securely manage apps and data on iOS, Android, and Windows from one place.
Protect your information
Intelligently safeguard your corporate data and enable secured collaboration.
Virtualize your desktops
Efficiently deliver and manage Windows desktops and apps on all devices.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Platform + Intelligence + Partners
This new understanding has led us to build new solutions for our customers. It informs our entire approach across three critical elements:
Building a platform that looks holistically across all the critical end-points we talked about – building security into our platform as well as providing security tools and technologies to you
Acting on the Intelligence that comes from our security-related signals and insights – helps you and us to detect threats more quickly
Fostering a vibrant ecosystem of partners who help us raise the bar across the industry – we know we’re not your only security vendor, and we want to work with the industry and take a holistic approach to technology
Microsoft 365 provides holistic security that is aligned to these four pillars of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 E5 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Protect users’ identities and control access to valuable resources based on user risk level
Information Protection
Ensure documents and emails are seen only by authorized people
Threat Protection
Protect against advanced threats and recover quickly when attacked
Security Management
Gain visibility and control over security tools
Overgangen fra on-premise til en cloud-baseret løsning er med til at skabe digital transformation, men stiller også nye krav til, hvordan du skal tænke sikkerhed.
Fx skal du i en overgangsfase beskytte og håndtere to arkitekturer på én gang. Denne
session gennemgår sikkerhed og cloud strategi for Microsoft Office 365, Azure, og andre cloud services. Vi præsenterer også kort, hvordan Microsoft Consulting kan assistere med håndteringen af dette nye paradigme.
Anders Brabæk, Enterprise Architect, Microsoft
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
Identity-driven Security
Protect at the front door. Safeguard customers’ resources at the front door with innovative and advanced risk-based conditional access and multi-factor authentication.
Protect data against user mistakes. Gain deep visibility into user, device, and data activity on-premises and in the cloud—including high-risk usage of cloud apps and abnormal behavior.
Detect attacks before they cause damage. Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics.
Enabling Technologies
Azure AD Identity Protection
Azure AD Privileged Identity Management
Azure Active Directory Premium P1/P2
Cloud App Security
Advanced Threat Protection
Advanced Threat Analytics
19.10.2016 klo 9.30 järjestimme webinaarin, jossa kävimme teknisen tietoturvan keskeiset osa-alueet lävitse ja kerromme, mitkä ovat kunkin osa-alueen asiat, jotka vähintään pitää olla kunnossa, jotta voi yöllä nukkua rauhallisin mielin. Asiantuntijavieraana webinaarissa on Microsoftin Partner Technology Strategist, Ari Auvinen, joka osaltaan kertoi, millaisia teknisiä ratkaisuja tietoturva-asioiden kunnostamiseen on olemassa.
R y Python con Power BI, la ciencia y el análisis de datos, juntosPlain Concepts
R y Python son lenguajes muy populares hoy en día especialmente para científicos de datos, que los utilizan para prospección, tratamiento y minería de datos y, Power BI es una de las herramientas que más está creciendo en cuanto a utilización y aceptación en el sector de inteligencia de negocios y análisis de datos. La sesión cubre, a través de demos, los puntos en los que ambos enfoques se combinan para sacar mejor partido a los datos con los que contamos. Según sea el caso, vamos a preferir gestionar nuestras tareas desde el mundo de estadísticas y gráficos ofrecido por lenguajes R y Python, el mundo más encaminado al análisis de negocio gestionado con Power BI, o ambos mundos.
Video kills the radio star: e-mail is crap and needed disruptionPlain Concepts
¿Has recibido un e-mail con publicidad? ¿Muchos? ¿Te han suscrito a listas de distribución sin tu consentimiento? ¿Recibes preguntas insoportables? ¿Alguien te ha intentado hacer un phishing? ¿O te ha llamado un familiar porque se ha infectado con un ransomware que le entró por e-mail? ¿Ocultas como un poseso tu dirección de e-mail y número de teléfono para que no te machaquen? Bien, a mí también me ha pasado. Por eso hemos decidido que el e-mail debía sufrir una disrupción definitivamente.
De la misma manera que la llegada del software ha transformado todo tipo de empresas e industrias a lo largo de los últimos 20 años, la Inteligencia Artificial está empezando a redefinir todo tipo de escenarios empresariales. Descubre en esta charla los conceptos básicos de la Inteligencia artificial y descubre los casos de uso más apropiados para tu tipo de empresa. Aprende a realizar el cambio organizacional y cultural necesario para potenciar tu negocio mediante IA.
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelinesPlain Concepts
Rare genetic diseases are very challenging to diagnose, with the average child waiting for diagnosis for 5 years. Next generation genetic sequencing data may hold the key to diagnosis, however analysis can become a paramount task with multiple factors affecting conclusions. Dx29, an AI-assisted platform facilitates this task, allowing the physician to drive the analysis. Dx29 is a free platform developed by Foudation29, in close collaboration with academic groups.
¿Qué es real? Cuando la IA intenta engañar al ojo humanoPlain Concepts
Hoy en día es difícil no hablar de la Inteligencia Artificial y pensar en cómo se ha aplicado para resolver tareas difíciles y repetitivas para el ser humano. Pero en los últimos años, gracias a la llegada de las Redes Generativas Adversariales (GANs), la IA adoptó capacidades creativas que le permiten generar información artificial. Es la era de los Deepfakes, en la que puedes poner tu cara al actor de tu película favorita o ser felicitado por el presidente de los Estados Unidos. En esta charla, veremos gran parte de estas capacidades adquiridas por la IA, algunos ejemplos, y pondremos a prueba nuestro ojo para comprobar si estamos preparados para detectar que es real y que no.
Inteligencia artificial para detectar el cáncer de mamaPlain Concepts
El cáncer de mama es el tipo de cáncer más común entre mujeres y el segundo tipo de cáncer más común, siendo uno de las principales causas de muerte de las mujeres a nivel global. Sin embargo, la probabilidad de curación cuando éste es detectado en estados iniciales, es prácticamente del 100%. La Inteligencia Artificial (IA) puede ser una gran aliada para agilizar el diagnóstico reduciendo eficazmente tanto los tiempos de espera como el número de biopsias necesarias, aumentando de esta forma las probabilidades de curación. En esta charla veremos cómo. ¿Te lo vas a perder?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?Plain Concepts
¿Conoces el impacto real que la IA está teniendo en las empresas y cuáles son los retos a los que se han enfrentado para implementarla con éxito? En esta charla veremos cómo la IA impacta en las diferentes industrias y el retorno de la inversión obtenido. También veremos cuáles son los principales retos a los que se han enfrentado las empresas para incorporar la IA como factor estratégico y las diferentes formas de abordarlos para obtener una implantación firme y estable que acelere el retorno de la inversión.
Gracias a los Cognitive Services ahora podemos añadir inteligencia a nuestras apps de una manera sencilla. La combinación de estos servicios abren un mundo nuevo de posibilidades, por lo que durante esta charla veremos una breve introducción a los distintos servicios para pasar directamente a verlos en acción en aplicaciones y situaciones reales. Se trata de una charla introductoria en la que haremos demos y veremos cómo podemos utilizar estos servicios en nuestro código.
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...Plain Concepts
La guerra por los datos de las familias en los hogares acaba de arrancar, altavoces inteligentes, luces conectadas, etc. En esta sesión veremos como simples datos agregados pueden convertirse en hábitos de gran valor a través de los algoritmos.
AI is the new buzzword, everybody is talking about it and how it will change and influence our lives. When we talk about AI we talk about machines learning from data, exactly like a child is learning from his/her family or the experiences he/she makes. Humans though, while they grow up, can develop biases. Could this happen to an AI too? Starting from a real story, what would happen if a machine learning algorithm learns from a toys catalog?
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...Plain Concepts
En lo sitios web de eCommerce, la recomendación de productos es clave para poder exponer el catálogo completo al usuario. Una estrategia de recomendación sin datos de usuario es la llamada Recomendación basada en contenidos. En ésta se tienen en cuenta las características de los productos para buscar similitudes. En esta charla veremos diferentes formas de calcular la similitud de unos productos concretos, recetas, basadas en Deep Learning y cómo hemos implementado estos algoritmos en Azure. Finalmente, veremos qué problemas hemos detectado y cómo los estamos solucionando.
Revolucionando la experiencia de cliente con Big Data e IAPlain Concepts
La experiencia de cliente continúa siendo el principal desafío al que se enfrentan las empresas en la era digital. La explosión del Big Data y la Inteligencia Artificial permite profundizar en el conocimiento del cliente y facilita la personalización de productos y servicios, estableciendo vínculos más fuertes y duraderos. A través de varios casos de uso reales, mostraremos cómo esta transformación está ya ocurriendo permitiendo a las empresas pioneras cambiar las reglas del juego en sus sectores.
La idea de iniciar un primer proyecto de IA puede ser considerada a priori como una meta imposible, pero el grado de madurez actual de las tecnologías y los equipos permiten iniciarse sin mucha dificultad en un mundo que parece muy complejo. La experiencia de InfoJobs, dejando de banda los detalles mas técnicos, ilustra un caso de éxito tanto en el plano estratégico como de producto.
Recuperación de información para solicitantes de empleoPlain Concepts
Tratar de encontrar ofertas de trabajo que se ajusten a las habilidades de un buscador de empleo se ha convertido en un dolor de cabeza. La recuperación de información ha sido el método utilizado últimamente para ayudar en esta tarea. Con la inclusión de los algoritmos de aprendizaje profundo, la recuperación de información es ahora más poderosa que nunca. Permite el análisis de grandes conjuntos de documentos, haciendo que la predicción sea más precisa, incluso superando las capacidades humanas. En la presente ponencia presentamos las técnicas más avanzadas para la recuperación de información con un aprendizaje profundo y las aplicamos a la tarea de emparejar los currículums de los demandantes de empleo o a búsquedas específicas con las ofertas de empleo existentes más adecuadas.
La nueva revolución Industrial: Inteligencia Artificial & IoT EdgePlain Concepts
¿Te has preguntado alguna vez que podríamos hacer con toda la telemetría que se recoge en fábricas y empresas? Durante esta sesión veremos como aplicar distintas técnicas de Inteligencia Artificial en el sector industrial para mejorar la seguridad y el rendimiento de nuestras instalaciones. Además, veremos una demo en vivo donde podremos observar como nuestro dispositivo IoT puede analizar los datos que recibe y ser capaz de predecir posibles fallos futuros en distintos componentes.
¿Conoces TypeScript? ¿Estás trabajando con Vue? ¡Vamos a por el siguiente nivel! En esta charla vas a aprender como crear aplicaciones reales y escalables utilizando lo mejor de TypeScript y Vue, con super herramientas como Nuxt, Inversify, Vuex etc. Estar continuamente actualizando a tu equipo puede ayudar a tu producto, al mismo equipo y a los proyectos en los que trabajáis.
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...Plain Concepts
En esta charla veremos como podemos utilizar nuestros dispositivos (Raspberry PI) para adelantarnos a posibles fallos que puedan ocurrir en un motor de un avión. Explicaremos como se ha realizado el proceso de entrenamiento y como podemos ejecutar las predicciones en nuestro dispositivo utilizando IoT Edge.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Gestión de identidad
1. Go mobile.
Stay in control.
Speaker Name
Title
Enterprise Mobility + Security
2. Mobile-first, cloud-first reality
Data breaches
63% of confirmed data breaches
involve weak, default, or stolen
passwords.
63% 0.6%
IT Budget growth
Gartner predicts global IT spend
will grow only 0.6% in 2016.
Shadow IT
More than 80 percent of employees
admit to using non-approved
software as a service (SaaS)
applications in their jobs.
80%
3. Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
4. Is it possible to keep up?
Employees Business partners Customers
The Microsoft vision
Secure and protect against new threats
Maximum productivity experience
Comprehensive and integrated
Apps
Devices
Data
Users
5. User freedomSecure against new threats Do more with less
Customers need
Identity – driven security Productivity without
compromise
Comprehensive
solutions
Microsoft solution
ENTERPRISE MOBILITY + SECURITY
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
8. Identity is the foundation for enterprise mobility
IDENTITY – DRIVEN SECURITY
Single sign-onSelf-service
Simple connection
On-premises
Other
directories
Windows Server
Active Directory
SaaS
Azure
Public
cloud
CloudMicrosoft Azure Active Directory
9. 1000s of apps,
1 identity
Provide one persona to the
workforce for SSO to 1000s of
cloud and on-premises apps with
multifactor authentication.
Manage access
at scale
Manage identities and
access at scale in the cloud
and on-premises
Enable business
without borders
Stay productive with universal
access to every app and
collaboration capability and self
service capabilities to save money
Identity at the core of your business
IDENTITY – DRIVEN SECURITY
10. Shadow
IT
Data breach
IDENTITY – DRIVEN SECURITY
Employees
Partners
Customers
Cloud apps
Identity Devices Apps & Data
Transition to
cloud & mobility
New attack
landscape
Current defenses
not sufficient
Identity breach On-premises apps
SaaS
Azure
11. IntelligentInnovativeHolistic Identity-driven
Addresses security
challenges across users
(identities), devices, data,
apps, and
platforms―on-premises
and in the cloud
Offers one protected
common identity for
secure access to all
corporate resources, on-
premises and in the
cloud, with risk-based
conditional access
Protects your data from
new and changing
cybersecurity attacks
Enhances threat and
anomaly detection with
the Microsoft Intelligent
Security Graph driven by
a vast amount of
datasets and machine
learning in the cloud.
IDENTITY – DRIVEN SECURITY
12. IDENTITY – DRIVEN SECURITY
1. Protect at the front door
Safeguard your resources at the front door with innovative
and advanced risk-based conditional accesses
2. Protect your data against user mistakes
Gain deep visibility into user, device, and data activity on-
premises and in the cloud.
3. Detect attacks before they cause damage
Uncover suspicious activity and pinpoint threats with deep
visibility and ongoing behavioral analytics.
14. IDENTITY – DRIVEN SECURITY
Azure Information Protection
Classify & Label
Protect
How do I control data
on-premises and in
the cloud
Monitor and Respond
Microsoft Intune
How do I prevent data
leakage from my
mobile apps?
LOB app protection
DLP for Office 365 mobile apps
Optional device management
Cloud App Security
Risk scoring
Shadow IT Discovery
Policies for data control
How do I gain visibility
and control of my
cloud apps?
15. IDENTITY – DRIVEN SECURITY
Microsoft Advanced Threat Analytics (ATA)
Behavioral Analytics
Detection of known malicious attacks
Detection of known security issues
On-premises detection
Cloud App Security + Azure Active Directory Premium
Behavioral analytics
Detection in the cloud
Anomaly detection
Security reporting and monitoring
16. Enterprise Mobility +Security
IDENTITY - DRIVEN SECURITY
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory
Premium
24. MANAGED MOBILE PRODUCTIVITY
STRICTLY CONFIDENTIAL
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
FINANCE
CONFIDENTIAL
Add persistent labels defining sensitivity to filesClassify data according to policies – automatically or by user
25. Manage your account, apps and
groups
Company branded, personalized
application Access Panel:
http://myapps.microsoft.com
+ iOS and Android Mobile Apps
Self-service password reset
Application access requests
Integrated Office 365 app launching
MANAGED MOBILE PRODUCTIVITY
30. COMPREHENSIVE SOLUTION
Employees Business partners Customers
Secure and protect against new threats
Maximum productivity experience
Comprehensive and integrated
Apps DevicesDataUsers
31. Always
up to date
• Real-time updates
• Keep up with new
apps and devices
Works with
what you have
• Support multiple platforms
• Use existing investments
Simple to set
up and connect
• Easy, secure connections
• Simplified management
COMPREHENSIVE SOLUTION
32. Simple set up with FastTrack
FastTrack will:
Retain control of sensitive documents locally and
over email
Automatically protect mail containing privileged
information
Ensure files stored in SharePoint are rights
protected
Envision
Azure Rights Management
FastTrack will:
Setup and deploy mobile app management
policies to help prevent Office 365 data leakage
Setup and deploy device security policies like pin
or device encryption
Integrate on-premises System Center
Configuration Manager with Intune
Enable conditional access and compliance
policies to control access to data
FastTrack will:
Get organizational identities to the cloud
Set up single sign-on for test apps (including
Azure Active Directory Application Proxy apps)
Configure self-service options like password
reset and Azure Multi-Factor Authentication in
the MyApps site
Azure Active Directory
Premium
Microsoft Intune
Onboard Drive Value
FastTrack is included with EMS to accelerate your deployments
COMPREHENSIVE SOLUTION
33. $15
Information protection
User and Entity Behavioral Analysis
Cloud Access Security Broker
Identity and access management
Mobile device and application management
Total cost (per user/month)
COMPREHENSIVE SOLUTION
For the cost of Identity & Access Management and MDM/ MAM from other vendors, EMS provides advanced
security capabilities to protect users, devices, apps and data.
1. Individual pricing not currently available. 2. Okta Enterprise Edition as of 3/1/2015. 3. AirWatch Orange Management Suite Cloud as of 3/1/2015.
Included with
Microsoft EMS E5
$8
2
$18+
Available separately
from other vendors
$$
1
$10
2
35. ENTERPRISE MOBILITY + SECURITY
Holistic, intelligent,
innovative security to keep
up with new threats.
Identity-driven
security
Secure your enterprise fast –
while keeping what you have
and saving money.
Comprehensive
solution
Encourage secure work habits
by providing the best apps
with built-in security.
Managed mobile
productivity
36. Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection Premium P2
Intelligent classification and
encryption for files shared
inside and outside your
organization
(includes all capabilities in P1)
Azure Information
Protection Premium P1
Encryption for all files and
storage locations
Cloud-based file tracking
Microsoft Cloud
App Security
Enterprise-grade visibility,
control, and protection for
your cloud applications
Microsoft Advanced
Threat Analytics
Protection from advanced
targeted attacks leveraging
user and entity behavioral
analytics
Microsoft Intune
Mobile device and app
management to protect
corporate apps and data on
any device
Azure Active Directory
Premium P2
Identity and access
management with advanced
protection for users and
privileged identities
(includes all capabilities in P1)
Azure Active Directory
Premium P1
Secure single sign-on to
cloud and on-premises apps
MFA, conditional access, and
advanced security reporting
EMS
E3
EMS
E5
39. Enterprise
Mobility
+ Security
Basic identity mgmt.
via Azure AD for O365:
• Single sign-on for O365
• Basic multi-factor
authentication (MFA) for O365
Basic mobile device
management
via MDM for O365
• Device settings management
• Selective wipe
• Built into O365 management
console
RMS protection
via RMS for O365
• Protection for content stored in
Office (on-premises or O365)
• Access to RMS SDK
• Bring your own key
Azure AD for O365+
• Advanced security reports
• Single sign-on for all apps
• Advanced MFA
• Self-service group management
& password reset & write back
to on-premises,
• Dynamic Groups, Group based
licensing assignment
MDM for O365+
• PC management
• Mobile app management
(prevent cut/copy/paste/save as
from corporate apps to
personal apps)
• Secure content viewers
• Certificate provisioning
• System Center integration
RMS for O365+
• Automated intelligent
classification and labeling of
data
• Tracking and notifications for
shared documents
• Protection for on-premises
Windows Server file shares
Advanced Security
Management
• Insights into suspicious activity in
Office 365
Cloud App Security
• Visibility and control for all cloud
apps
Advanced Threat Analytics
• Identify advanced threats in on
premises identities
Azure AD Premium P2
• Risk based conditional access
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
40. Windows
10
Enterprise
Mobility
+Security
• Single sign-on for business
cloud apps
• Device setup and registration
for Windows devices
• Windows Store for Business
• Traditional domain join
manageability
• Manageability via MDM and
MAM
• Encryption for data at rest and
generated on device
• Encryption for data included in
roaming settings
• Conditional access policies for
secure single sign-on
• MDM auto-enrollment
• Self-Service Bitlocker recovery
• Password reset with write back
to on-premises
• Cloud-based advanced security
reports and monitoring
• Enterprise State-Roaming
• Mobile device management
• Mobile app management
• Secure content viewer
• Certificate, Wi-Fi, VPN, email
profile provisioning
• Agent-based management of
Windows devices (domain-
joined via ConfigMgr and
internet-based via Intune)
• Automated intelligent
classification and labeling of
data
• Tracking and notifications for
shared documents
• Protection for content stored in
Office and Office 365 &
Windows Server on premises
Windows Defender Advanced
Threat Protection
• Identify advanced threats focused
on Windows 10 behavioral sensors
Cloud App Security
• Visibility and control for all cloud
apps
Advanced Threat Analytics
• Behavioral analytics for advanced
threat detection
Azure AD Premium
• Risk based conditional access
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Editor's Notes
63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report)
70% of the 10 most commonly used devices have serious vulnerabilities (HP 2014)
More than 80% of employees admit using non-approved SaaS apps for work purposes (Stratecast, December 2013)
33% of user breaches come from user error (VansonBourne February 2014)
88% organizations who are no longer confident in their ability to detect and prevent threats to their sensitive files and emails
0.6% http://www.gartner.com/newsroom/id/3186517
IT cannot afford to live in the past. Successful businesses of today (and tomorrow) realize the power of mobility to support employee productivity and collaboration. You need to prepare to mitigate the risks of providing freedom and space to your employees. You need to meet compliance and regulatory standards, maintain company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience, so that they’re motivated to follow protocol. You need an enterprise mobility partner that can help you achieve all of this, so that everyone is a winner, and your business stays out of the headlines.
Microsoft’s vision includes management and protection across four key layers: users, device, app, and data – for both your employees, business partners, and customers.
Our strategy is to ensure management across these layers while ensuring your employees, business partners, and customers by providing access to everything they need from everything; protecting corporate data across email and collaboration apps all while integrating these new capabilities with what customers already have like Active Directory and System Center.
Mobility tools are often point solutions that address specific security needs, but even multiple point solutions are still disconnected from one another, leaving cracks. Microsoft believes you should have an integrated mobility solution that provides security across multiple layers. You should have a comprehensive set of tolls that use identity as a control plane, provide the visibility and insights required to quickly pinpoint and resolve issues or threats, and simplify mobile device and application management.
Identity-driven security. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity-based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues. 200+ days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline.
Managed mobile productivity. Encourage your workers to use secure applications for work — even on personal devices — by providing the Office tools they know and love. Management capabilities built into Office make it easier for IT to protect company information. Conditional access policies restrict actions such as copy, paste, edit, and save —ensuring that workers only access corporate files through approved, managed apps and not personal workarounds where information can be corrupted or leaked. Nobody manages Office better than Microsoft. Sharing is a mainstay of collaboration for the mobile workforce, but poses a serious challenge to security. Microsoft gives you another integrated approach to information protection with a layer of security at the file level. Encryption, rights management, and authorization policies can be applied to any file type and remain with the data, wherever it goes and even in motion. Only authorized users can access protected files, and only on the sender’s terms.
Comprehensive Solution: Meet new business challenges with the flexibility of a cloud-first mobility solution. Microsoft cloud services are designed to work seamlessly with your on-premises infrastructure and existing investments. Stay ahead of your BYOD workers with rapid release cycles to support the latest devices and apps. Scale quickly to onboard new hires, devices, apps, and more. It’s fast, it’s cost-effective, and it’s always up-to-date. Manage across multiple OS types (iOS, Android, Windows) and thousands of cloud apps.
Identity-driven security. Identity is the new control plane for security and management in the mobile-first, cloud-first world. Microsoft simplifies identity management by creating a single set of credentials for each worker, making it easier for IT to apply identity-based security measures, including conditional access policies and multi-factor authentication. Identity based security reporting, auditing, and alerting offer greater visibility so you can spot potential issues.
63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report)
200+ days. That’s the average amount of time that attackers reside within your network until they are detected, gathering classified data and information, waiting to strike at just the right moment. Microsoft helps you identify breaches and threats using behavioral analysis and provides a clear, actionable report on a simple attack timeline.
Microsoft has a solution for this
[Click] Traditional identity and access management solutions providing sing-sign on to on-premises applications and directory services such as Active Directory and others are used from the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world.
[Click] Now, as we have discussed, there are new pressing requirements to provide the same experience to cloud applications hosted in any public cloud.
[Click] Azure Active Directory can be the solution to this new challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way.
[Click] In order to do that, one simple connection is needed from on-premises directories to Azure AD.
[Click] and everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises
[Click] And we don’t forget the users. Azure AD provides Self-service capabilities and easy access to all the application, consumer or business, they need.
in the cloud but on-premises too (Application Proxy)
Safeguard your resources at the front door. Our solution calculates risk severity for every user and sign-in attempt, so risk-based conditional access rules can be applied to protect against suspicious logins.
Protect your data against users mistakes: Gain deeper visibility into user, device, and data activity on-premises and in the cloud to create more effective, granular-level policies. Classify and label files at creation, track their usage, and change permissions when necessary.
Detect attacks before they cause damage: Identify attackers in your organization using innovative behavioral analytics and anomaly detection technologies – all driven by vast amounts of Microsoft threat intelligence and security research data.
Microsoft’s enterprise & security solutions provide a holistic framework to protect your corporate assets across, on prem, cloud and mobile devices
Advanced Threat Analytics helps IT detect threats early and provide forensic investigation to keep cybercriminals out
Azure Active Directory Premium security reports help identify risky log ins. That paired with Azure Active Directory Identity Protection gives IT the ability to automatically block access to apps based on real time risk scoring of identities and log ins.
Microsoft Cloud App Security provides deep visibility and control of data inside cloud applications
Microsoft Intune manages and secures corporate data on mobile devices and collaborated within corporate apps.
Azure Information Protection helps keep data secure and encrypted throughout a customers environment and extends security when data is shared outside the organization.
Enterprise Mobility Suite (EMS) helps to provide employees with secure and seamless access to corporate email and documents as well as familiar email and productivity experiences with Office mobile apps such, as Outlook, Word, Excel, and PowerPoint. EMS helps protect corporate data on the device itself and beyond with four layers of protection—all without affecting the personal data on the device. IT can even manage these apps without requiring the device to be enrolled for management.
Unsecured apps pose a serious risk for IT. EMS can ensure that you provide your end users great apps that are secure and manageable.
More than 80% of employees admit to using non-approved software as a service (SaaS) applications in their jobs.
http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
Protect your Office Mobile apps without compromising your Office experience: EMS is the only solution built with and for Microsoft Office. This means that email and other Office files can be secured without compromising the Office experience – the gold standard of productivity.
Enable easy access to resources: Sign in once for secure access to all corporate resources, on-premises and in the cloud, from any device. This includes pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
Enable users to protect and control data: Employees can encrypt virtually any type of file, set granular permissions, and track usage. With Office files, encryption can be applied with just one click. The encryption stays with the file where it goes, enabling more secure file sharing, internally and externally.
Empower users with self-service capabilities: Users can update passwords and join and manage groups via a single portal to help save your IT helpdesk time and money. This applies across all iOS, Android, and Windows devices in your mobile ecosystem.
If we take a closer look at our user’s newly enrolled device which is now compliant and ready to go, we can see that she is still able to maintain a personal experience on her device. She has organized her applications the way she wants, with all of her apps available on one screen.
She has her managed corporate apps—the Office mobile apps she knows and loves and personal apps that she uses outside of work and may even consider using these personal apps to try to boost her productivity at work. Even though our user has all of her apps at hand on her personal device, IT is able to enjoy unparalleled management of the Office mobile apps, so that with Microsoft Intune, our IT pro has a different perspective on the organization of our user’s personal device. With the new multi-identity management feature, you an enable users to access both their personal and work accounts using the same Office mobile apps while only applying the MAM policies to their work account – providing a seamless experience while employees are on-the-go.
For our IT pro, there is still a clear separation of the managed corporate apps and our user’s personal apps. But, this doesn’t affect the user’s access to apps. By applying policy at the app level, our IT pro can support mobile productivity while maintaining user preferences, and still have the ability to protect corporate data and resources with the Intune-managed Office mobile apps.
The Intune App Wrapping Tool also allows IT to apply similar policies to your existing line-of-business applications so that these resources are equally protected through the organization’s proprietary apps. You can enable users to securely view content on devices within your managed app ecosystem using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps for Intune as well.
Let’s now take a closer look at how app-level policies can help keep company data and information secure. Our user receives a work email through her managed Outlook account with an attached Excel spreadsheet containing information she needs for a report. Our user opens the attachment in her Excel mobile application to find the information she needs. She then wants to copy the info to add to her report.
But when she tries to paste it into her personal notepad, it doesn’t work—the personal notepad is not a managed app and our IT pro has applied policies that restrict copy, paste, and cut functions to only apps that are part of the managed app ecosystem (for Intune enrolled devices). So our user opens her Microsoft Word mobile app which is managed by Intune and she is successfully able to paste her information. Now our user wants to save the working copy of her report to her personal OneDrive account so that she can access it from her home computer.
Because her personal OneDrive account is not one of the managed applications, she’s unable to save it here. IT has applied policies restricting the ability to save to only apps that are part of the managed app ecosystem.
So our user must save her working copy to her managed OneDrive for Business account, which means when she does want to work on this report from another device, this device will have to be an enrolled for management . By using the mobile application management capabilities of Intune, the IT pro can help prevent leakage of important company data and make sure that this information doesn’t get into the wrong hands.
With Microsoft Azure Information Protection, you can:
Provide persistent protection
Data itself carries the protection. This ensures data is always protected – regardless of where its stored or with whom its shared
Enable safe sharing
Access to shared data is identity driven. This enables safe sharing with internal employees as well as customers and partners.
Empower users
Deep integration with Office 365 enables users to apply protection easily without interrupting your employees normal course of work.
In product notifications empower users to make right decisions and tools such as document tracking help them gain visibility into use of shared data
Maintain control
Different key management and deployment options are available to fit your requirements. IT can use powerful logging and reporting to monitor, analyze and reason over data.
Classify your data based on sensitivity
Policies classify and label data at time of creation or modification based on source, context, and content. Classification can be fully automatic, driven by users, or based on recommendation.
Protect your data at all times
Embed classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with.
Add visibility and control
Users can track activities on shared files and revoke access if they encounter unexpected activities. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data.
0.6% http://www.gartner.com/newsroom/id/3186517
IT is continually being asked to do “more with less”. As business embraces a mobile first cloud first world IT budgets aren’t increasing. Finding a vendor that offers a comprehensive, cost effective, integrated solution is key to maximizing limited budgets.
Microsoft’s vision for Enterprise Mobility expands the boundaries of current thinking. Managing devices with MDM or Identities with IAM is not enough. Microsoft EMS protects holistically across users, devices, apps, and data with a comprehensive solution that no other vendor provides.