SlideShare a Scribd company logo
1 of 21
Exchange Server 2010
Information Protection and Control

Name
Title
Microsoft Corporation
The High Cost of Data Leakage
   “Public-relations firm faces PR nightmare
   after unintentionally e-mailing journalists
   about one of its clients.”




“College staff member accidentally e-
mails attachment containing personal
information of 15,794 graduates.”


                               “Secret Service agent sends
                               unencrypted e-mail revealing details of
                               vice presidential tour.”
Information Protection and Control (IPC)
 Exchange Server 2010 helps prevent the unauthorized transmission of
 sensitive information with tools that can automatically:

 MONITOR e-mail for specific content, recipients and other attributes
 CONTROL distribution with automated, granular polices
 PROTECT       access to data wherever it travels using rights management

 PREVENT
  •   Violations of corporate policy and best practices
  •   Non-compliance with government and industry regulations
  •   Loss of intellectual property and proprietary information
  •   High-profile leaks of private information and customer records
  •   Damage to corporate brand image and reputation
Benefits of Automated Controls
      Reduce User Error
      • Majority of data loss incidents are accidental
      • Users forget policies or apply incorrect policy



      Enable More Consistent Policy
      • Automation facilitates rapid policy changes across the organization
      • Critical for internal/external governance and compliance


      Improve Efficiency
      • Offload complex data polices from users
      • Enable centralized policy creation, execution and management
Benefits of Granular Controls

                  Alert          Modify          Protect       Redirect
             “Allow delivery “Allow delivery “Allow delivery    “Block
                but add a      but modify      but prevent     delivery
                warning.”       message.”     forwarding.”   and redirect.”


              LESS RESTRICTIVE                                 MORE RESTRICTIVE


                        Classify        Append          Review           Block
                    “Allow delivery “Allow delivery “Block delivery     “Do not
                       but apply       but add a         until          deliver.”
                     classification.” disclaimer.”    reviewed.”




•   Apply the right level of control based on the sensitivity of the data
•   Maximize control and minimize unnecessary user disruptions
MailTips                            Alert


Alert users about potential risks
Transport Rules                                                       <<   >>



Easily enforce granular policies

                 If the message...
                 Is from a member of the group ‘Executives’
                 And is sent to recipients that are 'Outside the
                 organization' And contains the keyword ‘Merger’


                 Do the following...
                 Redirect message to: arleneh@contoso.com

                 Except if the message...
                 Is sent to ‘shanek@contoso.com




 •   Executed on the Hub Transport Server
 •   Structured like Inbox rules
 •   Apply to all messages sent inside and outside the organization
 •   Configured with simple GUI in Exchange Management Console
<<   >>

Conditions
Fine tune rules with detailed criteria

 Specific Users          Detects mail between people, distribution lists

 Specific Content        Inspects subject, header and body for keywords, regular expressions

 Message Properties      Inspect message headers and properties or type

 Classifications         Scans for classifications such as Attorney-Client Privileged

 Attachments             Scans size, name and content (Office documents)

 Classifications         Can now also act on No Classifications

 Message Types           IRM protected, auto-replies, calendaring, voice mail

 Supervision Lists       Allows/Blocks based on listed recipients

 Management Properties   Identifies manager and applies policy

 User Properties         Scans for user attributes (such as department, country)
Actions
                                                                            <<   >>



Apply the appropriate level of control

 Block         Blocks and deletes message and can send non-delivery report

 Classify      Applies classification such as attorney-client privilege

 Modify        Adds disclaimer to body or text to subject line

 Reroute       Adds additional recipients to cc or Bcc line or re-directs

 Append        Applies disclaimer per each user’s specific attributes

 Review        Enables review and approval of e-mail before delivery

 Protect       Applies rights protection to messages, attachments
Dynamic Signatures                             Append



Automatically apply signatures per user attributes
Option of basic text or HTML




   Signatures integrated with
   Active Directory attributes
Moderation                                                Review



Enable review and approval of e-mail before delivery
  Approve or Reject with
  option to send response




Moderate based on           Moderator can be a specific
sender, DL, content         user or sender’s manager
Information Rights Management                                             Protect



Granular protection that travels with the data
           Information Rights Management (IRM) provides
           persistent protection to control who can access,
           forward, print, or copy sensitive data within an e-mail.


•   Persistent protection
    −   Protects your sensitive information no matter where it is sent
    −   Usage rights locked within the document itself
    −   Protects online and offline, inside and outside of the firewall
•   Granular control
    −   Users apply IRM protection directly within an e-mail
    −   Organizations can create custom usage policy templates such as
        "Confidential—Read Only"
    −   Limit file access to only authorized users
Transport Protection Rules                                          Protect



Automatically apply IRM
                                                     Apply RMS
                                                     policies
                                                     automatically
                                                     using Transport
                                                     Rules




                                                 Apply “Do Not
                                                 Forward” or custom
                                                 RMS templates

  •   IRM protection can be triggered based on sender, recipient,
      content and other conditions
  •   Office 2003, 2007, and 2010 attachments also protected
Outlook Protection Rules                                                      Protect



Provide users more IRM protection options
       Adding recipient or distribution list can trigger
       IRM protection automatically before sending




                                                           User can be granted
 IRM protection can still be applied manually
                                                           option to turn off rule
                                                           for non-sensitive e-mail
IRM in Outlook Web App                                                  Protect



  Read and reply to protected messages
Native support for IRM in OWA eliminates need            Access to standard and
for Internet Explorer Rights Management add-on           custom RMS templates




                                                              Office
                                                              documents
                                                              also protected


      •   Cross-browser support enables Firefox and Safari users to
          create and consume IRM-protected messages
Protected Voice Mail                                              Protect



Prevent forwarding of voice mail




                                           “Do Not Forward”
                                           template




•   Integration with AD RMS and Exchange Unified Messaging
•   Permissions designated by sender (by marking the message as
    private) or by administrative policy
IRM Search                                     Protect



  Index and search protected items

Conduct full-text
search of IRM-
protected mail and
attachments in
Outlook (online)
and OWA




                     Multi-mailbox search
                     includes option to search
                     IRM-protected items
IRM Decryption                                    Protect



Enable scanning, filtering, journaling

                                 Infected messages and
                                 spam can be filtered
Protected messages sent
to transport server




                                 Messages are re-encrypted
                                 and delivered

   Messages and attachments
   decrypted to enable content   Journaled messages
   filtering, transport rules    include decrypted clear-
                                 text copy
Protection and Control Scenarios

               Restrict e-mail between        • Transport rules to block mail between specific
Ethical Wall
               analysts and brokers             users or groups
               Manager required to sign-off   • Send to manager for approval
Supervision
               on mail to sensitive partner   • MailTips for moderated recipients
HR Policy      Inappropriate content          • Filter for keywords and block, redirect, modify

               HIPAA (health data)            • Apply MailTips to alerts for external recipients
               GLBA (financial data)          • Apply IRM protection to control access
Privacy
               PIPEDA (Canada)                • Monitor for credit card numbers and other
               PCI (Worldwide)                  personally identifiable information (PII)
                                              • Append disclaimer that includes name, title,
Signatures     EUPD 2003/58/EC
                                                department, etc.
IPC with Exchange Server 2010
     Automatically monitor and control the
     distribution of sensitive information



     Ensure the right level of control is applied to the
     right messages



     Better protect access to data with persistent
     Information Rights Management
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, Outlook, Windows Mobile, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or
 other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to
   changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this
                                presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...Microsoft Private Cloud
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 

What's hot (19)

Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 

Viewers also liked

分会场四服务器安全防护的意义与价值
分会场四服务器安全防护的意义与价值分会场四服务器安全防护的意义与价值
分会场四服务器安全防护的意义与价值ITband
 
Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1eduhost
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
Streaming Data in R
Streaming Data in RStreaming Data in R
Streaming Data in RRory Winston
 
Critical Infrastructure and Protection Technology Capabilities
Critical Infrastructure and Protection Technology Capabilities Critical Infrastructure and Protection Technology Capabilities
Critical Infrastructure and Protection Technology Capabilities Christian L. Kammermann
 
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...Wales Chen
 
Real-TIme Market Data in R
Real-TIme Market Data in RReal-TIme Market Data in R
Real-TIme Market Data in RRory Winston
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec
 
Real time applications using the R Language
Real time applications using the R LanguageReal time applications using the R Language
Real time applications using the R LanguageLou Bajuk
 

Viewers also liked (13)

分会场四服务器安全防护的意义与价值
分会场四服务器安全防护的意义与价值分会场四服务器安全防护的意义与价值
分会场四服务器安全防护的意义与价值
 
Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
Streaming Data in R
Streaming Data in RStreaming Data in R
Streaming Data in R
 
Critical Infrastructure and Protection Technology Capabilities
Critical Infrastructure and Protection Technology Capabilities Critical Infrastructure and Protection Technology Capabilities
Critical Infrastructure and Protection Technology Capabilities
 
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
 
Real-TIme Market Data in R
Real-TIme Market Data in RReal-TIme Market Data in R
Real-TIme Market Data in R
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Real time applications using the R Language
Real time applications using the R LanguageReal time applications using the R Language
Real time applications using the R Language
 

Similar to Microsoft India - Unified Communications Exchange Server 2010 Information Protection and Control (II) Presentation

Microsoft India – Unified Communications Exchange Server 2010 Information Pro...
Microsoft India – Unified Communications Exchange Server 2010 Information Pro...Microsoft India – Unified Communications Exchange Server 2010 Information Pro...
Microsoft India – Unified Communications Exchange Server 2010 Information Pro...Microsoft Private Cloud
 
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...Microsoft Private Cloud
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Smarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanSmarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanDavid J Rosenthal
 
Ds security
Ds securityDs security
Ds securityServium
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Private Cloud
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Chaitanya chandra sekhar
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionKesavan Munuswamy
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Amazon Web Services
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
office365-exchange-online-protection
office365-exchange-online-protection office365-exchange-online-protection
office365-exchange-online-protection Juntarou Doi
 

Similar to Microsoft India - Unified Communications Exchange Server 2010 Information Protection and Control (II) Presentation (20)

Microsoft India – Unified Communications Exchange Server 2010 Information Pro...
Microsoft India – Unified Communications Exchange Server 2010 Information Pro...Microsoft India – Unified Communications Exchange Server 2010 Information Pro...
Microsoft India – Unified Communications Exchange Server 2010 Information Pro...
 
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Smarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by AtidanSmarsh Email Encryption - Presented by Atidan
Smarsh Email Encryption - Presented by Atidan
 
Ds security
Ds securityDs security
Ds security
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Co p
Co pCo p
Co p
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
 
Co p
Co pCo p
Co p
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
office365-exchange-online-protection
office365-exchange-online-protection office365-exchange-online-protection
office365-exchange-online-protection
 

More from Microsoft Private Cloud

Hyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityMicrosoft Private Cloud
 
AcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VMicrosoft Private Cloud
 
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft Private Cloud
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudMicrosoft Private Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyMicrosoft Private Cloud
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingMicrosoft Private Cloud
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyMicrosoft Private Cloud
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...Microsoft Private Cloud
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyMicrosoft Private Cloud
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Microsoft Private Cloud
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Private Cloud
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperMicrosoft Private Cloud
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Microsoft Private Cloud
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Microsoft Private Cloud
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperMicrosoft Private Cloud
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Microsoft Private Cloud
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Microsoft Private Cloud
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftMicrosoft Private Cloud
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteMicrosoft Private Cloud
 

More from Microsoft Private Cloud (20)

Hyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivity
 
AcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper V
 
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO Survey
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth Modeling
 
A Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud PowerA Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud Power
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from Microsoft
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 

Recently uploaded

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Microsoft India - Unified Communications Exchange Server 2010 Information Protection and Control (II) Presentation

  • 1. Exchange Server 2010 Information Protection and Control Name Title Microsoft Corporation
  • 2. The High Cost of Data Leakage “Public-relations firm faces PR nightmare after unintentionally e-mailing journalists about one of its clients.” “College staff member accidentally e- mails attachment containing personal information of 15,794 graduates.” “Secret Service agent sends unencrypted e-mail revealing details of vice presidential tour.”
  • 3. Information Protection and Control (IPC) Exchange Server 2010 helps prevent the unauthorized transmission of sensitive information with tools that can automatically: MONITOR e-mail for specific content, recipients and other attributes CONTROL distribution with automated, granular polices PROTECT access to data wherever it travels using rights management PREVENT • Violations of corporate policy and best practices • Non-compliance with government and industry regulations • Loss of intellectual property and proprietary information • High-profile leaks of private information and customer records • Damage to corporate brand image and reputation
  • 4. Benefits of Automated Controls Reduce User Error • Majority of data loss incidents are accidental • Users forget policies or apply incorrect policy Enable More Consistent Policy • Automation facilitates rapid policy changes across the organization • Critical for internal/external governance and compliance Improve Efficiency • Offload complex data polices from users • Enable centralized policy creation, execution and management
  • 5. Benefits of Granular Controls Alert Modify Protect Redirect “Allow delivery “Allow delivery “Allow delivery “Block but add a but modify but prevent delivery warning.” message.” forwarding.” and redirect.” LESS RESTRICTIVE MORE RESTRICTIVE Classify Append Review Block “Allow delivery “Allow delivery “Block delivery “Do not but apply but add a until deliver.” classification.” disclaimer.” reviewed.” • Apply the right level of control based on the sensitivity of the data • Maximize control and minimize unnecessary user disruptions
  • 6. MailTips Alert Alert users about potential risks
  • 7. Transport Rules << >> Easily enforce granular policies If the message... Is from a member of the group ‘Executives’ And is sent to recipients that are 'Outside the organization' And contains the keyword ‘Merger’ Do the following... Redirect message to: arleneh@contoso.com Except if the message... Is sent to ‘shanek@contoso.com • Executed on the Hub Transport Server • Structured like Inbox rules • Apply to all messages sent inside and outside the organization • Configured with simple GUI in Exchange Management Console
  • 8. << >> Conditions Fine tune rules with detailed criteria Specific Users Detects mail between people, distribution lists Specific Content Inspects subject, header and body for keywords, regular expressions Message Properties Inspect message headers and properties or type Classifications Scans for classifications such as Attorney-Client Privileged Attachments Scans size, name and content (Office documents) Classifications Can now also act on No Classifications Message Types IRM protected, auto-replies, calendaring, voice mail Supervision Lists Allows/Blocks based on listed recipients Management Properties Identifies manager and applies policy User Properties Scans for user attributes (such as department, country)
  • 9. Actions << >> Apply the appropriate level of control Block Blocks and deletes message and can send non-delivery report Classify Applies classification such as attorney-client privilege Modify Adds disclaimer to body or text to subject line Reroute Adds additional recipients to cc or Bcc line or re-directs Append Applies disclaimer per each user’s specific attributes Review Enables review and approval of e-mail before delivery Protect Applies rights protection to messages, attachments
  • 10. Dynamic Signatures Append Automatically apply signatures per user attributes Option of basic text or HTML Signatures integrated with Active Directory attributes
  • 11. Moderation Review Enable review and approval of e-mail before delivery Approve or Reject with option to send response Moderate based on Moderator can be a specific sender, DL, content user or sender’s manager
  • 12. Information Rights Management Protect Granular protection that travels with the data Information Rights Management (IRM) provides persistent protection to control who can access, forward, print, or copy sensitive data within an e-mail. • Persistent protection − Protects your sensitive information no matter where it is sent − Usage rights locked within the document itself − Protects online and offline, inside and outside of the firewall • Granular control − Users apply IRM protection directly within an e-mail − Organizations can create custom usage policy templates such as "Confidential—Read Only" − Limit file access to only authorized users
  • 13. Transport Protection Rules Protect Automatically apply IRM Apply RMS policies automatically using Transport Rules Apply “Do Not Forward” or custom RMS templates • IRM protection can be triggered based on sender, recipient, content and other conditions • Office 2003, 2007, and 2010 attachments also protected
  • 14. Outlook Protection Rules Protect Provide users more IRM protection options Adding recipient or distribution list can trigger IRM protection automatically before sending User can be granted IRM protection can still be applied manually option to turn off rule for non-sensitive e-mail
  • 15. IRM in Outlook Web App Protect Read and reply to protected messages Native support for IRM in OWA eliminates need Access to standard and for Internet Explorer Rights Management add-on custom RMS templates Office documents also protected • Cross-browser support enables Firefox and Safari users to create and consume IRM-protected messages
  • 16. Protected Voice Mail Protect Prevent forwarding of voice mail “Do Not Forward” template • Integration with AD RMS and Exchange Unified Messaging • Permissions designated by sender (by marking the message as private) or by administrative policy
  • 17. IRM Search Protect Index and search protected items Conduct full-text search of IRM- protected mail and attachments in Outlook (online) and OWA Multi-mailbox search includes option to search IRM-protected items
  • 18. IRM Decryption Protect Enable scanning, filtering, journaling Infected messages and spam can be filtered Protected messages sent to transport server Messages are re-encrypted and delivered Messages and attachments decrypted to enable content Journaled messages filtering, transport rules include decrypted clear- text copy
  • 19. Protection and Control Scenarios Restrict e-mail between • Transport rules to block mail between specific Ethical Wall analysts and brokers users or groups Manager required to sign-off • Send to manager for approval Supervision on mail to sensitive partner • MailTips for moderated recipients HR Policy Inappropriate content • Filter for keywords and block, redirect, modify HIPAA (health data) • Apply MailTips to alerts for external recipients GLBA (financial data) • Apply IRM protection to control access Privacy PIPEDA (Canada) • Monitor for credit card numbers and other PCI (Worldwide) personally identifiable information (PII) • Append disclaimer that includes name, title, Signatures EUPD 2003/58/EC department, etc.
  • 20. IPC with Exchange Server 2010 Automatically monitor and control the distribution of sensitive information Ensure the right level of control is applied to the right messages Better protect access to data with persistent Information Rights Management
  • 21. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, Outlook, Windows Mobile, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.