Enterprise Mobility + Security
WEBINAR:
YOUR PRESENTERS
Mark Marra
Solutions Architect
at Softchoice
Nick Johnson
Technology Solutions Professional
at Microsoft
AGENDA
• Understanding mobility, beyond just the device
• Demonstrating how EM+S can help you protect,
detect, and respond to modern threats
• Enterprise Mobility + Security product overview
• Azure Active Directory
• Cloud App Security
• Azure Information Protection
• Intune
• Advanced Threat Analytics
WHAT IS MOBILITY?
Data breaches
63% of confirmed data breaches
involve weak, default, or stolen
passwords.
63% 0.6%
IT Budget growth
Gartner predicts global IT spend will
grow only 0.6% in 2016.
Shadow IT
More than 80 percent of employees
admit to using non-approved
software as a service (SaaS)
applications in their jobs.
80%
MOBILE-FIRST,
CLOUD-FIRST REALITY
YOUR
SECURITY POSTURE
!
DETECT
using targeted signals, behavioral
monitoring, and machine learning
RESPOND
closing the gap between discovery and action
PROTECT
across all endpoints, from
sensors to the datacenter
OUR UNIQUE APPROACH
ENTERPRISE MOBILITY + SECURITY
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory
Premium
Protect users
•
•
Intelligent analysis
•
•
•
AZURE ACTIVE DIRECTORY
Guard apps
•
•
Q&A
Discovery
Data Control
CLOUD APP SECURITY
Threat Protection
Persistent protection
•
•
•
Tracking and compliance
•
•
•
AZURE INFORMATION PROTECTION
Integrated use
•
•
•
Q&A
Access management
•
•
•
Mobile device &and app protection
•
•
INTUNE
Office 365 mobile app integration
•
•
Behavioral Analytics
Detection for known threats
ADVANCED THREAT ANALYTICS
Focus on what’s important
ENTERPRISE MOBILITY +SECURITY
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory
Premium
Please let us know how Softchoice can help you:
1. I am interested in learning more about EM + S by speaking to a Softchoice
Solution’s Architect
2. I would like to learn more about my options with Azure Active Directory
3. I already own EM + S but need help in getting it implemented
4. I have other questions I’d like to discuss and would like a follow-up call
NEXT STEPS: POLL
1. Contact your account representative at Softchoice
2. Contact Luke Black at Luke.Black@Softchoice.com if you are
unsure of who your Account Representative is
3. Or call 1 800-268-7638
CONTACT US
Thank You

Getting secure in a mobile-first world with EMS

  • 1.
    Enterprise Mobility +Security WEBINAR:
  • 2.
    YOUR PRESENTERS Mark Marra SolutionsArchitect at Softchoice Nick Johnson Technology Solutions Professional at Microsoft
  • 3.
    AGENDA • Understanding mobility,beyond just the device • Demonstrating how EM+S can help you protect, detect, and respond to modern threats • Enterprise Mobility + Security product overview • Azure Active Directory • Cloud App Security • Azure Information Protection • Intune • Advanced Threat Analytics
  • 4.
  • 5.
    Data breaches 63% ofconfirmed data breaches involve weak, default, or stolen passwords. 63% 0.6% IT Budget growth Gartner predicts global IT spend will grow only 0.6% in 2016. Shadow IT More than 80 percent of employees admit to using non-approved software as a service (SaaS) applications in their jobs. 80% MOBILE-FIRST, CLOUD-FIRST REALITY
  • 6.
    YOUR SECURITY POSTURE ! DETECT using targetedsignals, behavioral monitoring, and machine learning RESPOND closing the gap between discovery and action PROTECT across all endpoints, from sensors to the datacenter
  • 7.
  • 8.
    ENTERPRISE MOBILITY +SECURITY Microsoft Intune Azure Information Protection Protect your users, devices, and apps Detect threats early with visibility and threat analytics Protect your data, everywhere Extend enterprise-grade security to your cloud and SaaS apps Manage identity with hybrid integration to protect application access from identity attacks Microsoft Advanced Threat Analytics Microsoft Cloud App Security Azure Active Directory Premium
  • 9.
  • 13.
  • 14.
    Discovery Data Control CLOUD APPSECURITY Threat Protection
  • 18.
    Persistent protection • • • Tracking andcompliance • • • AZURE INFORMATION PROTECTION Integrated use • • •
  • 22.
  • 23.
    Access management • • • Mobile device&and app protection • • INTUNE Office 365 mobile app integration • •
  • 27.
    Behavioral Analytics Detection forknown threats ADVANCED THREAT ANALYTICS Focus on what’s important
  • 29.
    ENTERPRISE MOBILITY +SECURITY Microsoft Intune AzureInformation Protection Protect your users, devices, and apps Detect threats early with visibility and threat analytics Protect your data, everywhere Extend enterprise-grade security to your cloud and SaaS apps Manage identity with hybrid integration to protect application access from identity attacks Microsoft Advanced Threat Analytics Microsoft Cloud App Security Azure Active Directory Premium
  • 30.
    Please let usknow how Softchoice can help you: 1. I am interested in learning more about EM + S by speaking to a Softchoice Solution’s Architect 2. I would like to learn more about my options with Azure Active Directory 3. I already own EM + S but need help in getting it implemented 4. I have other questions I’d like to discuss and would like a follow-up call NEXT STEPS: POLL
  • 31.
    1. Contact youraccount representative at Softchoice 2. Contact Luke Black at Luke.Black@Softchoice.com if you are unsure of who your Account Representative is 3. Or call 1 800-268-7638 CONTACT US
  • 32.

Editor's Notes

  • #4 Nick Leads off Agenda
  • #5 Mark tells wifi story Work from anywhere Distributed applications in the cloud Data accessible anywhere Risk…
  • #6 Nick Talks 63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report) 70% of the 10 most commonly used devices have serious vulnerabilities (HP 2014) More than 80% of employees admit using non-approved SaaS apps for work purposes (Stratecast, December 2013) 33% of user breaches come from user error (VansonBourne February 2014) 88% organizations who are no longer confident in their ability to detect and prevent threats to their sensitive files and emails 0.6% http://www.gartner.com/newsroom/id/3186517
  • #8 Nick Talks When you think about the platform, think about four things. Identity, Device, Apps and Data, and Infrastructure. I want to spend a minute on Identity, both Windows Active Directory and Azure AD. Identity is the key. Why? When you look at the anatomy of a typical breach, compromised credentials, or identity are the key. We’ve found that that a single set of compromised “normal” user credentials can be used to access a network and then hunt around for additional sets of credentials with greater permissions. Typically less than 48 hours after the breach starts, a hacker can be moving through a network with admin-level credentials undetected. You might say, well, we force users to reset their passwords via group policy, isn’t that enough? No, think about the number of websites and apps that require usernames and passwords used for business every day. Does your password policy apply to all those sites? And what happens if a user uses the same password on personal site (none of us have ever done that, right)? What it comes down to is a deep need to have user identities (think credentials), be protected and flexible at the same time. This is why we’re making such a significant investment in Azure AD. Ok, the other three pieces of the platform that I mentioned: Devices. Devices are everywhere, we need to enable users to use the devices they can be most productive with personally and secure them for corporate use as well. Apps and Data. Apps are everywhere and data grows daily. We want to enable customers to protect their Apps and Data without hindering the end-user experience. And I want to stress that here. Everything we do needs to be easy on the end user. Because if it blocks them, they will seek ways to work around it, opening up additional security risks. And lastly, Infrastructure. So what does that look like today? <click>
  • #9 Nick intros slide, mark builds out product names Microsoft’s enterprise & security solutions provide a holistic framework to protect your corporate assets across, on prem, cloud and mobile devices Advanced Threat Analytics helps IT detect threats early and provide forensic investigation to keep cybercriminals out Azure Active Directory Premium security reports help identify risky log ins. That paired with Azure Active Directory Identity Protection gives IT the ability to automatically block access to apps based on real time risk scoring of identities and log ins. Microsoft Cloud App Security provides deep visibility and control of data inside cloud applications Microsoft Intune manages and secures corporate data on mobile devices and collaborated within corporate apps. Azure Information Protection helps keep data secure and encrypted throughout a customers environment and extends security when data is shared outside the organization.
  • #10 Nick Talks Mark: Mention Azure AD Webinar
  • #11 Mark Talks
  • #12 Mark Talks
  • #13 Mark Talks
  • #15 Nick Talks
  • #16 Mark Talks
  • #17 Mark Talks
  • #18 Mark Talks
  • #19 Nick Talks
  • #20 Mark Talks
  • #21 Mark Talks
  • #22 Mark Talks
  • #24 Nick Talks
  • #25 Mark Talks
  • #26 Mark Talks
  • #27 Mark Talks
  • #28 Nick Talks
  • #29 Mark Talks
  • #30 Wrap up
  • #31 Wrap up
  • #32 Wrap up