SlideShare a Scribd company logo
© 2014 SecureAuth All Rights Reserved
Office 365 Security
Everything You Need to Know
July 10, 2014
www.secureauth.com www.avanade.com www.microsoft.com
Welcome to the Webinar
• All attendee audio lines are muted
• Questions will be answered at the end of the session
• Submit brief questions on the Q&A panel
• Send longer questions or off-line topics via email to
webinar@secureauth.com
© 2014 SecureAuth All Rights Reserved
Presented by Microsoft, Avanade, and SecureAuth Corporation
David Brandt, Microsoft
Principal Program Manager, Office 365
Tim Arvanites, SecureAuth Corporation
Director of Technical Sales
Jimmy Soto, Avanade
Infrastructure Solutions Architect
AGENDA
© 2014 SecureAuth All Rights Reserved
Microsoft Office 365
Identity Management
SecureAuth IdP “Advanced” Security Options for Office 365
2-Factor Authentication and SSO
Deployment Tips and Tricks
The Avanade Experience
Q & A
Trends / Issues of Modern Mobile Enterprise
© 2014 SecureAuth All Rights Reserved
Issues Facing the
Modern Mobile Enterprise
Rapid Movement to the Cloud and High Usage of Cloud
Applications
Pressures of Mobility – BYOD and Secured Mobile Devices
for Convenient User Experience
Line of Business Driving Organizations to the Cloud, but
without Proper Security Measures
No one wants to be that headline
User
Microsoft Account
Ex: alice@outlook.com
User
Organizational Account
Ex: alice@contoso.com
Microsoft Account Microsoft Azure Active Directory
WS-Federation
WS-Trust
SAML 2.0
Metadata
Shibboleth
Graph API
http://aka.ms/ssoproviders
*For representative purposes only.
Pilot complete Deploy Complete Adopt new features
Deploy EnhancePilot
© 2014 SecureAuth All Rights Reserved
SecureAuth IdP
for Microsoft Office 365
Advanced Security Options
© 2014 SecureAuth All Rights Reserved
What is an IdP?
An IdP (Identity Provider) establishes a circle of trust between
the User and the Service Provider (applications like Office 365).
Definition
• A system that creates, maintains, and manages
identity information
• Provides principal authentication to other service
providers (applications) within a federation or
distributed network
• Sends an attribute assertion containing trusted
information about the user to the Service
Provider (SP)
1. User Directed to IdP
2. IdP Authenticates User
3. User Redirected to SP with Token
© 2014 SecureAuth All Rights Reserved
Benefits of an Identity Provider
Improved User Experience
Increased Security
Complex Environments Simplified
Flexible Access Control Workflows
© 2014 SecureAuth All Rights Reserved
IdP - Improved User Experience
Single Sign-on (SSO):
• Users access their applications with a
single authentication
• Flexible authentication workflows based
on user, device, and location
• Custom and third-party enterprise web
applications (SharePoint)
• Cloud applications, like Office 365,
Google Apps, Salesforce, and more
Users access their applications with a single authentication
© 2014 SecureAuth All Rights Reserved
IdP – Increased Security
• Avoid Password Sync / Sprawl
• Single Access Control Point for ALL
User’s Applications
• Immediate Disable of Access
• Auditing of All Application Access
Compiled in Single Location
• Enforce Client Sign-in Restrictions by
Device, Login History, Network Location,
Work Hours, and more
• Utilize Enterprise Multi-factor
Authentication
Web Apps Network
Apps
Cloud
Apps
Mobile Apps
© 2014 SecureAuth All Rights Reserved
IdP – Complex Environments Solved
Combine Multiple, Disparate Directory Stores
Active Directory, SQL, Novell eDirectory, Sun One, etc.
Create Unified Access Policies Limiting Access to Resources
based on:
Defined Authentication Workflows, User Access State (enabled/disabled),
Network Location, Group Membership, Devices, etc.
On-premises, Cloud-based, or Hybrid Scenario
© 2014 SecureAuth All Rights Reserved
IdP – Flexible Access Control Workflows
Define Virtually any Authentication
Workflow for Users
Integrated Windows Authentication (no
password) for Internal Users
Username/Password + Second Factor
(optional) for External Users
Enforce Client Sign-in Restrictions by
Device, Login History, Network
Location, Work Hours, and more
Utilize Enterprise Multi-factor
Authentication
© 2014 SecureAuth All Rights Reserved
SecureAuth IdP – Office 365
Use Case
Enterprise customer with 24 AD domains utilizing browser access to Office 365 and Office
applications Word, Excel, Outlook, Lync, and PowerPoint
External users – 2-Factor Authentication with SMS / Telephony / E-mail registration and 90
day device credential used for subsequent multi-factor authentications
Internal users – Windows Integrated Authentication for true Desktop SSO to Office 365
Single Sign-on experience for user to reach their other enterprise applications
Office 365 Client Access Controls limiting Outlook access to only internal network devices
Avanade’s Notes From The Field
Transformation to Office 365
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Messaging Transformation Credentials
–
• Innovative toolset
• Strategic Alliance with
Global
Delivery
Network
Our
Assets,
Tools &
Methods
Our
Expertise
Our
Experience
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Why take the journey with Avanade
• Our Health and Value Assessment offering efficiently
guides customers to achieving their goals
• Monthly meetings with Microsoft Office 365
Engineering teams as part of High Touch Partner
initiative
•
•
•
•
•
•
•
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Consideration Description
Know Requirements Ahead of Time
Know What Is Provided, And What Is Not
Remember, It Is A Shared Environment, Not A
Dedicated Hosted Environment
Evaluate Customer Readiness
Documentation May Be Dynamic And Is Improving
Considerations Prior To Office 365 Decision
23
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Consideration Description
It Is Still A Transformational Event
Plan For Realistic Timeline and Milestones
Keep The End User Experience In Mind
Stay On Course, Don’t Deviate
Plan for Operational Excellence
Implementation Planning Considerations
24
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Conclusion
• Implementation and migration to Office 365 is often simplified with an
emphasis of quick onboarding rather than averting risk
• Customers must realize that they need to adapt to Office 365; it does
not adapt to the customer
• Consideration must be given for safeguarding the end user experience
• Operational excellence and support must be planned prior to migrating
production resources to Office 365
• Customers benefit from the experience Avanade can provide when
planning and executing an Office 365 implementation and migration
25
© 2014 SecureAuth All Rights Reserved
Questions & Answers
Avanade, Microsoft, and
SecureAuth Corporation
© 2014 SecureAuth All Rights Reserved
Thank you
www.secureauth.com
Contacts
www.avanade.com
www.microsoft.com
David Brandt
Tim Arvanites
Jimmy Soto
SecureAuth Sales
Principal Program
Manager
Director of Technical
Sales
Infrastructure
Solutions Architect
Sales
david.brandt@microsoft.com
tarvanites@secureauth.com
jimmy.soto@avanade.com
sales@secureauth.com
+1-425-705-1352
+1-312-985-1997
+1-732-277-4960
+1-949-777-6959
Introduction to Microsoft Office 365 Identity Management
http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/OFC-
B222#fbid=

More Related Content

More from SecureAuth

Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
SecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
SecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
SecureAuth
 

More from SecureAuth (20)

Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 

Office 365 Security: Everything You Need to Know

  • 1. © 2014 SecureAuth All Rights Reserved Office 365 Security Everything You Need to Know July 10, 2014 www.secureauth.com www.avanade.com www.microsoft.com
  • 2. Welcome to the Webinar • All attendee audio lines are muted • Questions will be answered at the end of the session • Submit brief questions on the Q&A panel • Send longer questions or off-line topics via email to webinar@secureauth.com © 2014 SecureAuth All Rights Reserved Presented by Microsoft, Avanade, and SecureAuth Corporation David Brandt, Microsoft Principal Program Manager, Office 365 Tim Arvanites, SecureAuth Corporation Director of Technical Sales Jimmy Soto, Avanade Infrastructure Solutions Architect
  • 3. AGENDA © 2014 SecureAuth All Rights Reserved Microsoft Office 365 Identity Management SecureAuth IdP “Advanced” Security Options for Office 365 2-Factor Authentication and SSO Deployment Tips and Tricks The Avanade Experience Q & A Trends / Issues of Modern Mobile Enterprise
  • 4. © 2014 SecureAuth All Rights Reserved Issues Facing the Modern Mobile Enterprise Rapid Movement to the Cloud and High Usage of Cloud Applications Pressures of Mobility – BYOD and Secured Mobile Devices for Convenient User Experience Line of Business Driving Organizations to the Cloud, but without Proper Security Measures No one wants to be that headline
  • 5.
  • 6. User Microsoft Account Ex: alice@outlook.com User Organizational Account Ex: alice@contoso.com Microsoft Account Microsoft Azure Active Directory
  • 7.
  • 9.
  • 11. Pilot complete Deploy Complete Adopt new features Deploy EnhancePilot
  • 12. © 2014 SecureAuth All Rights Reserved SecureAuth IdP for Microsoft Office 365 Advanced Security Options
  • 13. © 2014 SecureAuth All Rights Reserved What is an IdP? An IdP (Identity Provider) establishes a circle of trust between the User and the Service Provider (applications like Office 365). Definition • A system that creates, maintains, and manages identity information • Provides principal authentication to other service providers (applications) within a federation or distributed network • Sends an attribute assertion containing trusted information about the user to the Service Provider (SP) 1. User Directed to IdP 2. IdP Authenticates User 3. User Redirected to SP with Token
  • 14. © 2014 SecureAuth All Rights Reserved Benefits of an Identity Provider Improved User Experience Increased Security Complex Environments Simplified Flexible Access Control Workflows
  • 15. © 2014 SecureAuth All Rights Reserved IdP - Improved User Experience Single Sign-on (SSO): • Users access their applications with a single authentication • Flexible authentication workflows based on user, device, and location • Custom and third-party enterprise web applications (SharePoint) • Cloud applications, like Office 365, Google Apps, Salesforce, and more Users access their applications with a single authentication
  • 16. © 2014 SecureAuth All Rights Reserved IdP – Increased Security • Avoid Password Sync / Sprawl • Single Access Control Point for ALL User’s Applications • Immediate Disable of Access • Auditing of All Application Access Compiled in Single Location • Enforce Client Sign-in Restrictions by Device, Login History, Network Location, Work Hours, and more • Utilize Enterprise Multi-factor Authentication Web Apps Network Apps Cloud Apps Mobile Apps
  • 17. © 2014 SecureAuth All Rights Reserved IdP – Complex Environments Solved Combine Multiple, Disparate Directory Stores Active Directory, SQL, Novell eDirectory, Sun One, etc. Create Unified Access Policies Limiting Access to Resources based on: Defined Authentication Workflows, User Access State (enabled/disabled), Network Location, Group Membership, Devices, etc. On-premises, Cloud-based, or Hybrid Scenario
  • 18. © 2014 SecureAuth All Rights Reserved IdP – Flexible Access Control Workflows Define Virtually any Authentication Workflow for Users Integrated Windows Authentication (no password) for Internal Users Username/Password + Second Factor (optional) for External Users Enforce Client Sign-in Restrictions by Device, Login History, Network Location, Work Hours, and more Utilize Enterprise Multi-factor Authentication
  • 19. © 2014 SecureAuth All Rights Reserved SecureAuth IdP – Office 365 Use Case Enterprise customer with 24 AD domains utilizing browser access to Office 365 and Office applications Word, Excel, Outlook, Lync, and PowerPoint External users – 2-Factor Authentication with SMS / Telephony / E-mail registration and 90 day device credential used for subsequent multi-factor authentications Internal users – Windows Integrated Authentication for true Desktop SSO to Office 365 Single Sign-on experience for user to reach their other enterprise applications Office 365 Client Access Controls limiting Outlook access to only internal network devices
  • 20. Avanade’s Notes From The Field Transformation to Office 365 Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved.
  • 21. Messaging Transformation Credentials – • Innovative toolset • Strategic Alliance with Global Delivery Network Our Assets, Tools & Methods Our Expertise Our Experience
  • 22. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Why take the journey with Avanade • Our Health and Value Assessment offering efficiently guides customers to achieving their goals • Monthly meetings with Microsoft Office 365 Engineering teams as part of High Touch Partner initiative • • • • • • •
  • 23. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Consideration Description Know Requirements Ahead of Time Know What Is Provided, And What Is Not Remember, It Is A Shared Environment, Not A Dedicated Hosted Environment Evaluate Customer Readiness Documentation May Be Dynamic And Is Improving Considerations Prior To Office 365 Decision 23
  • 24. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Consideration Description It Is Still A Transformational Event Plan For Realistic Timeline and Milestones Keep The End User Experience In Mind Stay On Course, Don’t Deviate Plan for Operational Excellence Implementation Planning Considerations 24
  • 25. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Conclusion • Implementation and migration to Office 365 is often simplified with an emphasis of quick onboarding rather than averting risk • Customers must realize that they need to adapt to Office 365; it does not adapt to the customer • Consideration must be given for safeguarding the end user experience • Operational excellence and support must be planned prior to migrating production resources to Office 365 • Customers benefit from the experience Avanade can provide when planning and executing an Office 365 implementation and migration 25
  • 26. © 2014 SecureAuth All Rights Reserved Questions & Answers Avanade, Microsoft, and SecureAuth Corporation
  • 27. © 2014 SecureAuth All Rights Reserved Thank you www.secureauth.com Contacts www.avanade.com www.microsoft.com David Brandt Tim Arvanites Jimmy Soto SecureAuth Sales Principal Program Manager Director of Technical Sales Infrastructure Solutions Architect Sales david.brandt@microsoft.com tarvanites@secureauth.com jimmy.soto@avanade.com sales@secureauth.com +1-425-705-1352 +1-312-985-1997 +1-732-277-4960 +1-949-777-6959 Introduction to Microsoft Office 365 Identity Management http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/OFC- B222#fbid=

Editor's Notes

  1. Title “Why take the journey with Avanade” Slide purpose: Further messaging to show Avanade experience and specialty