Today, security is so much more than just a firewall. As we saw in our recent webinar, co-hosted with Microsoft to discuss their new Enterprise Mobility + Security Suite (EMS), breaches are resulting from weak end-user passwords or error, as well as a lax attitude toward SaaS and third party "Shadow IT." Add to that infrastructure complexity brought on by cloud and hybrid environments and everything you knew about security is changing.
3. AGENDA
• Understanding mobility, beyond just the device
• Demonstrating how EM+S can help you protect,
detect, and respond to modern threats
• Enterprise Mobility + Security product overview
• Azure Active Directory
• Cloud App Security
• Azure Information Protection
• Intune
• Advanced Threat Analytics
5. Data breaches
63% of confirmed data breaches
involve weak, default, or stolen
passwords.
63% 0.6%
IT Budget growth
Gartner predicts global IT spend will
grow only 0.6% in 2016.
Shadow IT
More than 80 percent of employees
admit to using non-approved
software as a service (SaaS)
applications in their jobs.
80%
MOBILE-FIRST,
CLOUD-FIRST REALITY
6. YOUR
SECURITY POSTURE
!
DETECT
using targeted signals, behavioral
monitoring, and machine learning
RESPOND
closing the gap between discovery and action
PROTECT
across all endpoints, from
sensors to the datacenter
8. ENTERPRISE MOBILITY + SECURITY
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory
Premium
29. ENTERPRISE MOBILITY +SECURITY
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory
Premium
30. Please let us know how Softchoice can help you:
1. I am interested in learning more about EM + S by speaking to a Softchoice
Solution’s Architect
2. I would like to learn more about my options with Azure Active Directory
3. I already own EM + S but need help in getting it implemented
4. I have other questions I’d like to discuss and would like a follow-up call
NEXT STEPS: POLL
31. 1. Contact your account representative at Softchoice
2. Contact Luke Black at Luke.Black@Softchoice.com if you are
unsure of who your Account Representative is
3. Or call 1 800-268-7638
CONTACT US
Mark tells wifi story
Work from anywhere
Distributed applications in the cloud
Data accessible anywhere
Risk…
Nick Talks
63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report)
70% of the 10 most commonly used devices have serious vulnerabilities (HP 2014)
More than 80% of employees admit using non-approved SaaS apps for work purposes (Stratecast, December 2013)
33% of user breaches come from user error (VansonBourne February 2014)
88% organizations who are no longer confident in their ability to detect and prevent threats to their sensitive files and emails
0.6% http://www.gartner.com/newsroom/id/3186517
Nick Talks
When you think about the platform, think about four things. Identity, Device, Apps and Data, and Infrastructure.
I want to spend a minute on Identity, both Windows Active Directory and Azure AD. Identity is the key. Why?
When you look at the anatomy of a typical breach, compromised credentials, or identity are the key. We’ve found that that a single set of compromised “normal” user credentials can be used to access a network and then hunt around for additional sets of credentials with greater permissions. Typically less than 48 hours after the breach starts, a hacker can be moving through a network with admin-level credentials undetected.
You might say, well, we force users to reset their passwords via group policy, isn’t that enough? No, think about the number of websites and apps that require usernames and passwords used for business every day. Does your password policy apply to all those sites? And what happens if a user uses the same password on personal site (none of us have ever done that, right)?
What it comes down to is a deep need to have user identities (think credentials), be protected and flexible at the same time. This is why we’re making such a significant investment in Azure AD.
Ok, the other three pieces of the platform that I mentioned:
Devices. Devices are everywhere, we need to enable users to use the devices they can be most productive with personally and secure them for corporate use as well.
Apps and Data. Apps are everywhere and data grows daily. We want to enable customers to protect their Apps and Data without hindering the end-user experience. And I want to stress that here. Everything we do needs to be easy on the end user. Because if it blocks them, they will seek ways to work around it, opening up additional security risks.
And lastly, Infrastructure. So what does that look like today? <click>
Nick intros slide, mark builds out product names
Microsoft’s enterprise & security solutions provide a holistic framework to protect your corporate assets across, on prem, cloud and mobile devices
Advanced Threat Analytics helps IT detect threats early and provide forensic investigation to keep cybercriminals out
Azure Active Directory Premium security reports help identify risky log ins. That paired with Azure Active Directory Identity Protection gives IT the ability to automatically block access to apps based on real time risk scoring of identities and log ins.
Microsoft Cloud App Security provides deep visibility and control of data inside cloud applications
Microsoft Intune manages and secures corporate data on mobile devices and collaborated within corporate apps.
Azure Information Protection helps keep data secure and encrypted throughout a customers environment and extends security when data is shared outside the organization.