Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Proteccion de datos contra pérdida de los mismos con MS365
1.
2. Protecting information in a mobile world
88 %
Organizations unable to prevent loss
of sensitive data without automatic
protection
Employees say mobile business apps
change how they work
41%
85 %
Enterprise organizations keep
sensitive information in the cloud
50 % Growth in data volume year over year
58 %
Have accidentally sent sensitive
information to the wrong person
4. DETECT
PROTECT
CLASSIFY
MONITOR
MICROSOFT’S
INFORMATION
PROTECTION
SOLUTIONS
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices and
prevent work data from traveling to non-work locations
OFFICE 365 ADVANCED SECURITY MANAGEMENT
Visibility into Office 365 app usage and potential
data abuse
MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone –
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity,
machine configuration, geo location
OFFICE APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-prem & hybrid
OFFICE 365 DLP
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business
ISV APPLICATIONS
Enable ISV partners to consume labels, apply protection
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
SHAREPOINT & GROUPS
Protect files in libraries and lists
MICROSOFT’S INFORMATION PROTECTION SOLUTIONS
5. IT Admins
Enterprise protection that I can
configure according to my
company policy.
Information Workers
Protection doesn’t get in the way
of my productivity.
Compliance/Security Officers
Analyst recommended protection
that is a great ROI. I don’t have to
worry about betting on the cloud,
and get a complete solution
Target
Roles
Empowering and educating end-users
Insights driven protection for your data
Sophisticated built-in protection across Office 365
workloads, and extensible by partners
Investment
Areas
Who We Build DLP For & Where We Focus
7. Detect
Scan & detect sensitive
data based on policy
Classify
Classify sensitive data
Classify Protect
Apply protection actions
and access restrictions
Protect
Audit, report, alert,
remediate
Monitor
8. Tailor the detection to your needs
Detect + Classify
NEW Custom sensitive information types across O365
NEW HIPAA template + large dictionary support
NEW Grouping, binary operators, and unique matches
9. Deep Content Analysis
Built-in and custom sensitive type definitions
Multiple matching techniques and heuristics:
• Regular expressions
• Internal functions (e.g., checksums, dates, etc.)
• Other evidence in proximity
• Large keyword dictionaries
• M of N keyword matches
• Uniqueness
• Grouping & logical operators
• Negative evidence
• Document fingerprints
Fully extensible to support custom types
Extend built-in types with additional criteria, or
create custom types from scratch
10.
11. NEW Automatic DLP policies for new tenants
NEW Policy tips in SharePoint & OneDrive during sharing
NEW Email scoping controls & not-matches
NEW Streamlined management experience
Protect
13. Powerful protection that’s easy to turn on
Centralized location to manage policies, protection
insights, and investigate matches
Policies configured once and applied across Office
365 services and client end-points
Define the data you want to protect using custom
sensitive types
Consistent policies and experiences across other
compliance capabilities
16. Quick and easy to get started
Intent driven configuration with guided
step-by-step wizards
Surface most common capabilities with
full control just a click away
17. Conditions & Exceptions describe what the
content looks like (or doesn’t look like), and
what events to look for.
Actions define what type of automatic
remediation you want to take when the
conditions match
User notifications & overrides define what
the user sees, and if they have the ability to
override with a business justification
Incident reports trigger email notifications or
Alerts based upon severity of event
24. Unified
Auditing
Pipeline
Compliance Center
Office 365 Activity Report
PowerShell cmdlet
Long-term
Auditing Storage
in O365
Azure AD
SharePoint Online
Exchange Online
OneDrive for Business
Office 365 Activity API
Third party application
Management
Activity API