Cloud Computing markedet er præget af både mange myter og mange forskellige definitioner – i sessionen gives et indblik i de overordnede elementer set fra Microsofts vinkel. Hvordan håndterer Microsoft cyberkriminalitet, beskyttelse af privacy, overholdelse af gældende lovgivning, internationale standarder etc. Der gives også gode råd om, hvad man bør overveje i sin vurdering af hvad Cloud evt kan hjælpe virksomheden med og ikke mindst hvordan man i mange tilfælde kan opnå et markant højere sikkerhedsniveau gennem implementeringen af rene eller hybride cloud løsninger.
Kravene er høje til både værktøjer og det fysiske kontor på den moderne arbejdsplads. Hør hvilke muligheder Det Nye Office skaber for medarbejderne i forhold til samarbejde, mobilitet og sikkerhed. Vi tager dig igennem det nyeste inden for Office - og hvordan det er med til at sikre både produktivitet og høj it-sikkerhed.
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
This document discusses cloud computing and Microsoft's cloud services. It provides an overview of the benefits of cloud computing such as reduced management costs, increased productivity, and access from anywhere. It then summarizes some of Microsoft's cloud services for business apps, collaboration, databases, and productivity. Finally, it shares some customer examples that have adopted Microsoft's cloud services to reduce costs and improve collaboration.
Citrix XenMobile is a mobile device management solution that allows organizations to securely manage mobile apps, devices, and data. It offers features such as device management, policy configuration, security and compliance controls, and mobile application management. It provides these capabilities across major mobile platforms through three editions - XenMobile MDM Edition, XenMobile App Edition, and XenMobile Enterprise Edition. The Enterprise Edition includes additional capabilities such as delivery of Windows apps, ShareFile Enterprise features and email attachment encryption.
Markus Stückler (Hewlett Packard Enterprise)Praxistage
The document discusses the challenges of digital transformation. It outlines how IT must become value creators and bridge traditional and new systems. This requires transforming to a hybrid infrastructure, enabling workplace productivity, protecting the digital enterprise, and empowering the data-driven organization. It emphasizes that the digital workplace is now everywhere and users expect personal, contextual, and secure experiences anywhere, anytime, and on any device.
The document discusses cloud computing and cybersecurity trends in Industry 4.0. It notes that cloud computing is increasingly being used for digital business and agile solutions, and that cloud providers have done a better job at security than traditional data centers. By 2020, public cloud infrastructure will suffer 60% fewer security incidents than traditional data centers, with 95% of cloud security failures being the customer's fault. The rest of the document provides an overview of Datacomm Cloud Business, its philosophy of being enterprise, secure, and local, its cloud products and services, certifications, and data center locations and support services.
Kravene er høje til både værktøjer og det fysiske kontor på den moderne arbejdsplads. Hør hvilke muligheder Det Nye Office skaber for medarbejderne i forhold til samarbejde, mobilitet og sikkerhed. Vi tager dig igennem det nyeste inden for Office - og hvordan det er med til at sikre både produktivitet og høj it-sikkerhed.
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
This document discusses cloud computing and Microsoft's cloud services. It provides an overview of the benefits of cloud computing such as reduced management costs, increased productivity, and access from anywhere. It then summarizes some of Microsoft's cloud services for business apps, collaboration, databases, and productivity. Finally, it shares some customer examples that have adopted Microsoft's cloud services to reduce costs and improve collaboration.
Citrix XenMobile is a mobile device management solution that allows organizations to securely manage mobile apps, devices, and data. It offers features such as device management, policy configuration, security and compliance controls, and mobile application management. It provides these capabilities across major mobile platforms through three editions - XenMobile MDM Edition, XenMobile App Edition, and XenMobile Enterprise Edition. The Enterprise Edition includes additional capabilities such as delivery of Windows apps, ShareFile Enterprise features and email attachment encryption.
Markus Stückler (Hewlett Packard Enterprise)Praxistage
The document discusses the challenges of digital transformation. It outlines how IT must become value creators and bridge traditional and new systems. This requires transforming to a hybrid infrastructure, enabling workplace productivity, protecting the digital enterprise, and empowering the data-driven organization. It emphasizes that the digital workplace is now everywhere and users expect personal, contextual, and secure experiences anywhere, anytime, and on any device.
The document discusses cloud computing and cybersecurity trends in Industry 4.0. It notes that cloud computing is increasingly being used for digital business and agile solutions, and that cloud providers have done a better job at security than traditional data centers. By 2020, public cloud infrastructure will suffer 60% fewer security incidents than traditional data centers, with 95% of cloud security failures being the customer's fault. The rest of the document provides an overview of Datacomm Cloud Business, its philosophy of being enterprise, secure, and local, its cloud products and services, certifications, and data center locations and support services.
The document describes Oracle Documents Cloud Service, an enterprise file sync and share service available in Oracle Cloud. It provides secure access to files from any device through a web browser, desktop sync, or mobile apps. Key features include security through encryption and access controls, integration with other Oracle services, and management tools for IT. The service aims to replace consumer file sharing options with an enterprise-grade solution that allows secure access to files anywhere.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It delivers applications through web browsers and allows for dynamic scaling of resources. Some benefits include reduced costs, increased storage and flexibility compared to traditional computing methods. However, security, privacy and compliance are important challenges to address with cloud computing.
CipherCloud is a leading cloud security company that delivers a comprehensive multi-cloud security platform. It has over 150 customers across 15 industries in more than 26 countries. CipherCloud's platform provides advanced data protection, content control and monitoring, cloud discovery and risk analysis. It enables enterprises to adopt the cloud while ensuring data protection, compliance and control. CipherCloud has received several awards and has over 400 employees worldwide.
Digitalkonferansen 2012 cloud, consumerization, cloud and all the rest-morg...Digin
The document discusses key concepts related to cloud computing, consumerization, and collaboration. It defines the cloud as delivering IT as a service using pooled, elastic resources. Consumerization refers to new technologies emerging first in consumer markets and spreading to businesses. Collaboration technologies facilitate linking humans to work together using tools like email, messaging, and social media. The document outlines various cloud services and delivery models, challenges of consumerization like BYOD, and ensuring collaboration works across devices and services.
The document discusses OpenText Core, a cloud-based content management and file sharing platform. It notes that organizations are increasingly moving business data and processes to the cloud. OpenText Core provides secure file storage, collaboration features like desktop editing, and administrative controls for file access management. The platform aims to simplify content management and sharing across devices through an intuitive interface in the OpenText cloud.
Cloud Managed Services: Cloud InfrastructureThe TNS Group
The TNS Group will collaborate, design and architect a cloud infrastructure to maximize your business and cost management capabilities. You will capitalize on the scalability and agility of the cloud while maintaining a high level of accessibility, infrastructure control and data security.
Google Apps is a suite of cloud-based productivity and collaboration tools including Gmail, Talk, Calendar, and Docs. It allows users to access emails, documents and calendars from anywhere while reducing IT costs and complexity compared to on-premise solutions. Google Apps offers features like 25GB of email storage per user, spam filtering, video sharing, and real-time collaboration on documents. It aims to help businesses be more productive by saving employees time spent searching for information and making intellectual property more accessible.
This document provides an overview of cloud computing, including definitions of cloud computing models and service delivery models. It discusses the business case for cloud computing and provides guidance on security best practices and selecting a cloud service provider. It also presents a case study on conducting e-discovery from the cloud and discusses considerations around records and information management in the cloud.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
Elevate Your Digital Experiences with Cloud Content Management on Boxrivetlogic
The Enterprise Content Management landscape is ever evolving. As more businesses undergo digital transformation, they need modern and agile ECM technology that can keep up with the changing pace.
Successful companies are rethinking the workplace, processes and IT infrastructure, making the journey from legacy IT to modernized, future-ready IT that gives your business the agility to innovate.
Box is a cloud content management platform for the digital age, combining centralized, cloud-native content services with advanced security and governance.
And with Box Platform, businesses can create custom digital experience solutions that leverage and extend the core functionality of Box, without having to build the underlying infrastructure.
This presentation discusses the following:
- Where the ECM landscape is headed
- Benefits of cloud content management
- Why businesses are turning to Box and common use cases
- How businesses are building custom digital experience solutions leveraging Box Platform
- Solution Highlight: Document Center on Box
An Introduction to Neo4j Aura Enterprise and the Key Features Designed to Mee...Neo4j
Kurt Freytag introduces Neo4j Aura, a fully automated graph database platform that provides simplicity, flexibility, and reliability. It offers fully managed backups, self-healing always on architecture, and 99.95% availability. Neo4j Aura Professional allows for automated global deployment in minutes with always on availability, end-to-end encryption, on-demand elasticity, and simple predictable pricing.
Shared Drives and Content Sprawl—What To DoZia Consulting
There are two common approaches to shared drives. One is considered day forward with people, processes, and technology that align with a company’s content strategy. The second, is a backfile, or the approach we take to cleaning up issues seen in our content management.
As the largest collection of documents in your organization, removing shared drives suggests massive change management and expense. However, if approached correctly, it doesn’t have to be complex, expensive, or disruptive—and you can continue to provide a file system. Through proper methodologies, content is not duplicated and an alternative user interface is applied to the DMS. User adoption is also increased by leveraging the simple shared drive, and efficiency is increased by offering tools that automate common tasks.
We will review the methods for classifying information, what you are able to accomplish with policy evolution, and the technologies and methods available to limit the sprawl of content.
Big Data is all about extracting 4Vs
Cloud focuses on On-Demand, Elastic, Scalable, Pay-Per use Self Service models
“Big data is not a stand-alone technology; rather, it is a combination of the last 50 years of technology evolution”
Wave 1: Creating manageable data structures
Wave 2: Web and content management
Wave 3: Managing big data
2016, A new era of OS and Cloud SecurityTudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
Cybersecurity Legos - We're all part of something biggerBen Boyd
Presentation by Ben Boyd during the 2018 Northwest Arkansas Community College Cyber Security Awareness Symposium.
Building a Cyber Security program is more than just technology or architecture. Managing Cyber Risk is the duty of anyone with a digital asset.
IMS and Azure Offerings by Godrej InfotechAjay Mathew
This document provides information on IMS business offerings from Godrej Infotech Limited including Azure, Remote Infrastructure Management, Office 365, and IT as a service. It discusses that GITL can offer a cost effective and scalable application hosting solution on Azure including infrastructure management services, Office 365, disaster recovery, backups and other services. It also covers the benefits of cloud computing such as cost savings, scalability, and focusing on core business by outsourcing IT operations to experts.
Hvordan kommer vi til at arbejde i fremtiden? Hvad skal der til for at rekruttere, fastholde og motivere fremtidens medarbejder? Hvordan bliver fremtidens virksomhedsorganisation? Morten Bay er ikke i tvivl: Udviklingen henover de næste ti år kommer til at ændre voldsomt på den måde, vi roller og lederskab på, fordi teknologien lige nu tager syvmileskridt, der rækker dybt ind i vores hverdag. Med baggrund i sine tre bøger om netværkssamfundet, inklusive den kommende Velkommen til Computopia, giver Morten Bay et hæsblæsende indblik i de forandringer der kommer over de næste 10 år. De forandringer, vi skal forberede os på for at være helt fremme i skoene, når fremtidens medarbejder melder sig på jobbet for første gang. Morten Bay, Forfatter, Jounalist og Internet-forsker
Windows 10 – en platform på tværs af devicesMicrosoft
Bedre sikkerhed, styring, produktivitet og nye devices er på agendaen hos de fleste organisationer. Alt dette understøttes i højere grad med vores nye styresystem Windows 10. Få en præsentation af Windows 10, og hør hvordan du kan spare penge ved at opgradere til Windows 10.
The document describes Oracle Documents Cloud Service, an enterprise file sync and share service available in Oracle Cloud. It provides secure access to files from any device through a web browser, desktop sync, or mobile apps. Key features include security through encryption and access controls, integration with other Oracle services, and management tools for IT. The service aims to replace consumer file sharing options with an enterprise-grade solution that allows secure access to files anywhere.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It delivers applications through web browsers and allows for dynamic scaling of resources. Some benefits include reduced costs, increased storage and flexibility compared to traditional computing methods. However, security, privacy and compliance are important challenges to address with cloud computing.
CipherCloud is a leading cloud security company that delivers a comprehensive multi-cloud security platform. It has over 150 customers across 15 industries in more than 26 countries. CipherCloud's platform provides advanced data protection, content control and monitoring, cloud discovery and risk analysis. It enables enterprises to adopt the cloud while ensuring data protection, compliance and control. CipherCloud has received several awards and has over 400 employees worldwide.
Digitalkonferansen 2012 cloud, consumerization, cloud and all the rest-morg...Digin
The document discusses key concepts related to cloud computing, consumerization, and collaboration. It defines the cloud as delivering IT as a service using pooled, elastic resources. Consumerization refers to new technologies emerging first in consumer markets and spreading to businesses. Collaboration technologies facilitate linking humans to work together using tools like email, messaging, and social media. The document outlines various cloud services and delivery models, challenges of consumerization like BYOD, and ensuring collaboration works across devices and services.
The document discusses OpenText Core, a cloud-based content management and file sharing platform. It notes that organizations are increasingly moving business data and processes to the cloud. OpenText Core provides secure file storage, collaboration features like desktop editing, and administrative controls for file access management. The platform aims to simplify content management and sharing across devices through an intuitive interface in the OpenText cloud.
Cloud Managed Services: Cloud InfrastructureThe TNS Group
The TNS Group will collaborate, design and architect a cloud infrastructure to maximize your business and cost management capabilities. You will capitalize on the scalability and agility of the cloud while maintaining a high level of accessibility, infrastructure control and data security.
Google Apps is a suite of cloud-based productivity and collaboration tools including Gmail, Talk, Calendar, and Docs. It allows users to access emails, documents and calendars from anywhere while reducing IT costs and complexity compared to on-premise solutions. Google Apps offers features like 25GB of email storage per user, spam filtering, video sharing, and real-time collaboration on documents. It aims to help businesses be more productive by saving employees time spent searching for information and making intellectual property more accessible.
This document provides an overview of cloud computing, including definitions of cloud computing models and service delivery models. It discusses the business case for cloud computing and provides guidance on security best practices and selecting a cloud service provider. It also presents a case study on conducting e-discovery from the cloud and discusses considerations around records and information management in the cloud.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
Elevate Your Digital Experiences with Cloud Content Management on Boxrivetlogic
The Enterprise Content Management landscape is ever evolving. As more businesses undergo digital transformation, they need modern and agile ECM technology that can keep up with the changing pace.
Successful companies are rethinking the workplace, processes and IT infrastructure, making the journey from legacy IT to modernized, future-ready IT that gives your business the agility to innovate.
Box is a cloud content management platform for the digital age, combining centralized, cloud-native content services with advanced security and governance.
And with Box Platform, businesses can create custom digital experience solutions that leverage and extend the core functionality of Box, without having to build the underlying infrastructure.
This presentation discusses the following:
- Where the ECM landscape is headed
- Benefits of cloud content management
- Why businesses are turning to Box and common use cases
- How businesses are building custom digital experience solutions leveraging Box Platform
- Solution Highlight: Document Center on Box
An Introduction to Neo4j Aura Enterprise and the Key Features Designed to Mee...Neo4j
Kurt Freytag introduces Neo4j Aura, a fully automated graph database platform that provides simplicity, flexibility, and reliability. It offers fully managed backups, self-healing always on architecture, and 99.95% availability. Neo4j Aura Professional allows for automated global deployment in minutes with always on availability, end-to-end encryption, on-demand elasticity, and simple predictable pricing.
Shared Drives and Content Sprawl—What To DoZia Consulting
There are two common approaches to shared drives. One is considered day forward with people, processes, and technology that align with a company’s content strategy. The second, is a backfile, or the approach we take to cleaning up issues seen in our content management.
As the largest collection of documents in your organization, removing shared drives suggests massive change management and expense. However, if approached correctly, it doesn’t have to be complex, expensive, or disruptive—and you can continue to provide a file system. Through proper methodologies, content is not duplicated and an alternative user interface is applied to the DMS. User adoption is also increased by leveraging the simple shared drive, and efficiency is increased by offering tools that automate common tasks.
We will review the methods for classifying information, what you are able to accomplish with policy evolution, and the technologies and methods available to limit the sprawl of content.
Big Data is all about extracting 4Vs
Cloud focuses on On-Demand, Elastic, Scalable, Pay-Per use Self Service models
“Big data is not a stand-alone technology; rather, it is a combination of the last 50 years of technology evolution”
Wave 1: Creating manageable data structures
Wave 2: Web and content management
Wave 3: Managing big data
2016, A new era of OS and Cloud SecurityTudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
Cybersecurity Legos - We're all part of something biggerBen Boyd
Presentation by Ben Boyd during the 2018 Northwest Arkansas Community College Cyber Security Awareness Symposium.
Building a Cyber Security program is more than just technology or architecture. Managing Cyber Risk is the duty of anyone with a digital asset.
IMS and Azure Offerings by Godrej InfotechAjay Mathew
This document provides information on IMS business offerings from Godrej Infotech Limited including Azure, Remote Infrastructure Management, Office 365, and IT as a service. It discusses that GITL can offer a cost effective and scalable application hosting solution on Azure including infrastructure management services, Office 365, disaster recovery, backups and other services. It also covers the benefits of cloud computing such as cost savings, scalability, and focusing on core business by outsourcing IT operations to experts.
Hvordan kommer vi til at arbejde i fremtiden? Hvad skal der til for at rekruttere, fastholde og motivere fremtidens medarbejder? Hvordan bliver fremtidens virksomhedsorganisation? Morten Bay er ikke i tvivl: Udviklingen henover de næste ti år kommer til at ændre voldsomt på den måde, vi roller og lederskab på, fordi teknologien lige nu tager syvmileskridt, der rækker dybt ind i vores hverdag. Med baggrund i sine tre bøger om netværkssamfundet, inklusive den kommende Velkommen til Computopia, giver Morten Bay et hæsblæsende indblik i de forandringer der kommer over de næste 10 år. De forandringer, vi skal forberede os på for at være helt fremme i skoene, når fremtidens medarbejder melder sig på jobbet for første gang. Morten Bay, Forfatter, Jounalist og Internet-forsker
Windows 10 – en platform på tværs af devicesMicrosoft
Bedre sikkerhed, styring, produktivitet og nye devices er på agendaen hos de fleste organisationer. Alt dette understøttes i højere grad med vores nye styresystem Windows 10. Få en præsentation af Windows 10, og hør hvordan du kan spare penge ved at opgradere til Windows 10.
Teknologien udvikler sig hurtigere end nogensinde før og har ført til, at alverdens brancher står overfor de mest drastiske forandringer i over 100 år. Vinderne i denne nye virkelighed bliver de virksomheder, der formår at inddrage medarbejderne og kunderne i forretningen gennem teknologi. Dem der blot får sat strøm til processerne, kommer med al sandsynlighed til at stå alene tilbage på perronen. Jacob Bøtter har samlet cases fra nær og fjern på, hvordan forandringerne rammer, og hvad du kan gøre.
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...Microsoft
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fleksibilitet og sikker drift med azure, v. Claus Andersen, CIO, Kopenhagen Fur
The document is a production log for a student named Alex Ballantyne completing a unit on digital graphics for computer games. Over several dates, Alex describes progress on a project creating a character image in Photoshop and Illustrator. Alex first created the base image in Photoshop and then imported it into Illustrator to refine it. Subsequent entries describe adding and refining background elements, the character's bike, crossbow, jacket color, facial details and eyes to add depth and realism, and finally adding a face mask and framing the completed image.
Her finder du præsentation fra Microsoft Danmarks advokat Anne Ermose: ’Databeskyttelse og sikker drift i skyen’ samt et dokument med oversigt over ’Nyttige links fra Microsoft vedr Cloud og Jura’
This document provides an assignment brief for a student to complete tasks involving sound design and programming for a computer game. The student must select sound effects and music they have produced, document the process of programming these sounds into their game, and create a video demonstrating the gameplay and soundtrack. The tasks are mapped to learning outcomes that assess sound design principles, asset creation following industry standards, and applying sounds to a game. The student will blog about their sounds, document the programming process with screenshots, and upload a gameplay video to be evaluated based on criteria for the relevant diploma qualifications and units.
This document summarizes what was learned in 16 video tutorials about creating a basic space shooter game. It describes learning how to create sprites, collision masks, player and enemy movement, backgrounds, shooting, spawning enemies, collision detection, health systems, scoring, and particle effects. The goal was to build out the mechanics and visuals needed for a functional prototype space shooter game.
Microsoft Next 2014 - Insights session 4 - Fra erfaringsbaseret til videns ba...Microsoft
Microsoft Next 2014 - Insights session 4 - Fra erfaringsbaseret til videns baseret produktion, salg og udvikling, v. Adam Brun, Funktionsleder, AffaldVarme Aarhus, Århus Kommune
Indian aviation has experienced rapid growth in recent years, driven by factors such as liberalization policies, economic reforms, and the entry of low-cost carriers. Passenger traffic has grown at a compound annual rate of over 14% internationally and 22% domestically between 2000-2008. Cargo traffic has also increased substantially. However, infrastructure development has not kept pace with demand. The government has initiated reforms and projects to develop airports and boost sectors like manufacturing, maintenance, and air cargo to sustain growth and make India a leader in global aviation.
Jakob Scharf har med sin mangeårige erfaring i sikkerhedsbranchen et unikt perspektiv, som han vil øse af i denne session.
Han vil give et overblik over markedet som han og hans virksomhed CERTA Intelligence ser det i dag, de risici man skal håndtere og endelig give nogle gode råd til, hvordan man kan angribe opgaven med at gennemføre en relevant risikovurdering i 2016 og dermed have et godt fundament for at få glæde af mulighederne i den teknologiske udvikling.
Uden sikkerhed og compliance - ingen digital transformationMicrosoft
Skal du udnytte potentialet i den digitale transformation, er du nødt til at have begrundet tillid til den eller de platforme, virksomheder og produkter, du vælger til rejsen. Digitaliseringen rummer store muligheder, men bringer også nye trusler og faldgruber med sig, når det gælder datasikkerhed og compliance. Sessionen introducerer konceptet Microsoft Secure og beskriver, hvordan du skaber et sikkert grundlag for jeres digitale transformation.
Ole Kjeldsen, National Technology Officer, Microsoft
This document discusses Microsoft Cloud Deutschland and how it aims to provide a secure cloud solution for German customers that complies with German data protection laws. It begins with an introduction and overview of current privacy and security issues. It then discusses Microsoft Cloud Deutschland in more detail, describing its security features and certifications. It also discusses how Microsoft is preparing customers for the upcoming GDPR regulations through solutions in Azure, Azure AD, and Enterprise Mobility + Security.
SMBs are fast at adapting to innovation and change, cloud computing has grabbed the spotlight for safer business with data security solutions. Know how today's business can reap and adopt cloud security features for public cloud.
The document discusses adopting a Zero Trust approach to IT security. It outlines some of the key principles of Zero Trust, including explicitly verifying identities rather than assuming trust, treating identities as the new perimeter, and basing access decisions on attributes like user, device, app, location, and risk. The document provides an overview of Microsoft's Zero Trust framework and reference architecture. It also shares a maturity model to help organizations assess their Zero Trust progress and prioritize next steps.
Jacob Saunders is the CTO of 10th Magnitude, a leading Microsoft Azure partner. He has 20 years of experience in both consulting and client roles focusing on Microsoft technologies. As CTO, Jacob guides clients towards a holistic approach to cloud adoption, with a team that specializes in data center transformation, cloud applications, DevOps, analytics, and IoT. Prior to 10th Magnitude, Jacob held leadership roles at several consulting firms.
Identity— Help protect against identity compromise and identify potential breaches before they cause damage
Devices—Enhance device security while enabling mobile work and BYOD
Apps and Data—Boost productivity with cloud access while keeping information protected
Infrastructure—Take a new approach to security across your hybrid environment
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
Practical Advice for Cloud Data Security for Oracle
Learn about critical security issues in the Cloud in relation to databases
Learn about Cloud data security guidance and standards
Learn Cloud data security technologies, models and Cloud security in context to the enterprise
The rapid rise of cloud databases, storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned.
In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of usability, database indexing, database searches, separation of duties, key management, tokenization, compliance, privacy and security in the cloud environment.
This document discusses security risks associated with cloud computing and databases. The main security risks are data breaches, data loss, and service hijacking that can occur when sensitive data is stored in cloud databases. Two examples of past data breaches at large companies, Home Depot and Target, are described along with the steps they took to strengthen security and regain customer trust. Methods to overcome security challenges in cloud computing discussed are encrypting data, implementing strong key management practices, and giving users control over their encryption keys.
Microsoft Azure Rights Management provides a comprehensive policy-based enterprise solution to help protect your valuable information, no matter whom you share it with. For $2.00 per user per month, you get Information Rights Management capabilities such as Do Not Forward and Company Confidential, as well as Office 365 Message Encryption, which allows you send encrypted emails to anyone!
Easily enforce policies to improve data security
Both Information Rights Management and Office 365 Message Encryption are policy based and designed to work with the Exchange transport rule engine. That means Microsoft Azure Rights Management allows you to set up complex policy restrictions easily, with just a single action.
Simple and convenient communication management
Information Rights Management is built to work across multiple workloads such as Exchange, SharePoint, and Office documents, and it makes it easier to set restrictions and provide permissions. Office 365 Message Encryption comes with a modern user interface that makes it easy to use.
RapidScale recognizes the need for compliance with the various laws and regulations across different industries. We have established our data encryption, protocols, and procedures to follow the top compliances and ensure that customer data remains secure and confidential.
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...Peter de Haas
This document discusses how cloud computing impacts supply chain management. It begins with an agenda and introduction to Peter de Haas and Abecon group. It then covers trends in industry and Gartner hype cycles. Microsoft cloud services and computing history are reviewed. The role of the CIO is evolving with business context, product leadership, customer intimacy, and operational excellence. Cloud improves supply chain management across areas like eInvoicing, eCommerce, integration, and infrastructure. Social, customer insight, and connecting business are key for Breinwave. Privacy and security are priorities in cloud services.
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
Watch full webinar here: https://bit.ly/3xWXuSN
Malgré le besoin croissant d'agilité, les entreprises restent réticientes à héberger leur données sensibles dans le Cloud pour des raisons de sécurité. Par ailleurs, le chiffrement basique ne suffit plus, car masquer la donnée ou la fournir de façon partielle empêche son utilisation.
La cryptographie avancée associée à la Logical Data Fabric constitue un duo gagnant pour intensifier l’utilisation de ces données sensibles dans le Cloud tout en garantissant le maximum de sécurité et de confidentialité. D’une part, la Logical Data Fabric permet aux organisations ayant un écosystème hybride d’accéder à l’ensemble de leur patrimoine data en temps réel tout en étalissant des politiques de sécurité, alors que la cryptographie avancée permet de stocker les données chiffrées dans le cloud, même pendant son utilisation, tout en y incluant des droits d’accès.
Rejoignez ce webinar pour découvrir :
- Les enjeux d’accès et de partage des données dans les environnements hybrides et multiclouds.
- Comment la Logical Data Fabric de Denodo simplifie l’adoption du Cloud grâce à un point unique d’accès à la donnée tout en fournissant une couche de sécurité et de gouvernance.
- Comment les fonctionnalités avancées de la cryptographie de Cosmian se différencient des approches traditionnelles de chiffrement.
- Une démo live sur comment la cryptographie applicative permet de créer des politiques de sécurité et d’accès aux données dans des environnements zéro trust.
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
This document discusses privacy and security considerations for financial institutions using cloud services. It begins with an introduction of the speaker, Ulf Mattsson, and his background working with standards bodies. The rest of the document discusses opportunities and challenges around analytics, machine learning, and complying with privacy laws in the cloud. It provides examples of how techniques like homomorphic encryption, differential privacy, and secure multi-party computation can be applied to use cases in areas like payments, risk assessment, and secondary data usage. The document concludes with a discussion of hybrid cloud environments and maintaining consistent security policies across on-premises and cloud platforms.
The document discusses Datacomm Cloud Business, a division of PT. Datacomm Diangraha focusing on cloud opportunities in Indonesia, with over 28 years of experience and 500 employees. It outlines their cloud and security products and services, including infrastructure, data, and network services provided with local data center support and international certifications. The remainder of the document discusses architectural approaches, availability, security, and performance-related topics like scalability, disaster recovery, and content delivery networks.
The document discusses Microsoft's offerings and expertise to help organizations achieve compliance with the General Data Protection Regulation (GDPR). The GDPR imposes new rules for handling personal data and increases penalties for non-compliance. Microsoft is committed to GDPR compliance across its cloud services and helping customers meet requirements related to privacy controls, security, and transparency. It provides solutions to help organizations discover, manage, protect, and report on personal data throughout the compliance process.
In the UK alone, cyber-attacks cost businesses £34 billion each year. Globally, cyber-crime is expected to cause over $2 trillion in damage by 2019. As the amount of data we collect from an increasing number of sources keeps growing, the risk of that data falling into the wrong hands grows exponentially as well.
While the role of cyber security used to be solely an IT function, the stakes are too high for it to only be an IT issue. In short, Cyber security is everyone’s business.
Find out more - https://www.microsoft.com/en-gb/about/ent/cyber-security/default.aspx
Speaker: Eddie Hui, Principal Sales Consultant, Informatica
These Informatica Cloud offerings are pre-built packages for quick time-to-value for customers looking to fast-track cloud data management initiatives. For example, customers can quickly kick start a new Amazon Redshift data warehouse project and use Informatica Cloud Connector for Amazon Redshift to load it with meaningful connected data from cloud sources such as Salesforce.com or on-premises sources such as relational databases -- all within hours, not months.
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
18. Cybersikkerhed & overvågning – Microsoft ….
giver ikke blanco adgang til hverken
egne eller kunders data
udleverer ikke krypteringsnøgler og
assisterer ikke myndigheder med at
bryde krypteringer
udleverer ikke data på baggrund af
‘bulk’ forespørgsler
bruger ikke & tillader ikke bagdøre i
vores software eller software vi
anvender
er ikke en del af nogen form for
overvågnings- eller efterretnings-
netværk i USA eller andre lande
Øger konstant kryptering af data både i transport og i lagring
& driver derudover alle vores Datacentre med bl.a. ISO27001
certificering og tjenester i overensstemmelse med ISO27018
Fortsætter juridisk arbejde. Udfordrer
bl.a.lovligheden i forespørgsler med såkaldte ‘gag
orders’ og brud på data suverænitet
Fortsætter lovligt & reguleret
efterforskningssamarbejde rettet mod pirateri,
pædofili, ID tyveri etc.
Øger gennemsigtigheden ved at
• involvere ejeren af data som myndighed eftersp
• oprette flere code Review Centers
• udgive Law Enforcement Request Reports
• dele guidance baseret på sikker drift udviklingserfaringer
Tager initiativ til industrisamarbejde på området for
at sikre bedst muligt fundament for ‘Cloud Trust’
19.
20. Hvad Microsoft gør:
• vore datacentre er udstyret med
‘state-of-the-art’ fysiske sikkerheds-
tiltag.
• vi opererer med 24x7 incident
response team for at mitigere trusler
og angreb.
• vi krypterer data overførsler på alle
niveauer både i transport og i hvile.
• vi beskytter dine data med
indbyggede værktøjer og giver
adgang for kunder til yderligere
krypteringsmuligheder hvis ønsket.
Kunden kan med
rette forvente:
• dine data vil være
beskyttet med ‘state-of-
the industry’ sikkerheds-
teknologi og processer.
• dine data vil være
krypterede i transit og I
hvile.
Microsoft investerer i kundens sikkerhed
21. Via personlige
enheder
24 x 7
samarbejde
På ‘vejene’
På kontoret
Hjemme
gennem
social media
Offentlige Data
Interne Data
Konfidentielle Data
On Premise
Cloud
Applikationer
Netværk
Enheder
‘Ting’
Infrastruktur
22. Offentlige Data
Interne Data
Konfidentielle Data
On-premise
Cloud
Applikationer
Netværk
Enheder
‘Ting’
Infrastruktur
Via personlige
enheder
24 x 7
samarbejde
På ‘vejene’
På kontoret
Hjemme
gennem
social media
24. Cloud drevet med operationel excellence
Investeringer
$15mia+ investeret til dato i cloud Infrastruktur
State-of-the-art datacentre
Eet af de største netværk globalt
Geo-replikerede kunde data – med geo-
location @rest
HR siden
2,000+ medarbejdere i cloud infrastruktur
30,000+ software udviklere og supportere
involverede i Cloud-baserede aktiviteter
Sepererer fx. HW & SW support for at fjerne
‘2-man collaborations’ trussel
Office 365
Windows Azure
Intune & CRM
SIKKERHED
25. Lockbox procedure
Microsoft Engineer Microsoft Manager
Microsoft
Approval
Microsoft EngineerLockbox system
Submits
request
Revisionslogs for al adgang
Just-in-time adgang med begrænset varighed
Fastsat Scope, ‘least privileged’ adgang
26. Customer Lockbox
Nu udvider vi Lockbox godkendelsen til kunden for at kontrollere adgang
til kundens data
Microsoft Engineer Microsoft Manager
Microsoft
Approved
Lockbox system
Submits
request
100101
011010
100011
Kunde
godkendt
Kunde
Kunden kontrollerer autorisation af Microsoft personales adgang
27. Microsoft beskytter kunders data privacy
Hvad Microsoft gør:
• giver fleksibilitet, valgfrihed og
transparens omkring hvor data lagres.
• vi bruger ikke kundens data til salg af
reklame eller andre kommercielle
formål.
• Vi vil ikke dele kundens data med 3.
part uden kundens accept eller når
påkrævet af loven.
• Vi stiller en række værktøjer til data
adgang til rådighed for kunden.
• Vi sletter data <180 dage efter at
kundens abonnement afsluttes.
Kunden kan med
rette forvente:
• At have kontrol med hvem
der har adgang til dine data.
• Lock box controller kræver
kundens godkendelse for at
Microsoft personale og evt,
underleverandører kan tilgå.
• at kunne slette og/eller tage
sine data med I tilfælde af at
man forlader tjenesten.
28. “Many of our customers have
serious concerns about
government surveillance of the
Internet. We share their
concerns. That’s why we are
taking steps to ensure
governments use legal process
rather than technological brute
force to access customer data.”
Brad Smith
General Counsel, EVP Legal and Corporate Affairs
Microsoft
30. Vi er & VIL være på forkant med compliance
Hvad Microsoft gør:
• Vi er ledende i industrien I at
forfølge compliance med de
seneste standarder for data privacy
og security, som fx. ISO 27018.
• Vi gennemgår uafhængige audits
for at certificere vores compliance.
• Vi arbejder med kunder og
regulators for at hjælpe dem med
at overholde deres compliance krav.
Kunden kan med
rette forvente:
• At vi muliggør deres
compliance ved at
implementere og overholde
relevante internationale
standarder, certificeringer og
relevant regulering.
• At man kan få adgang til
certification beviser for hver
Microsoft service.
32. Fuld gennemsigtighed
Hvad Microsoft gør:
• Vi stiller læsbare, forståelige og
strenge policy for hvad vi gør— og
IKKE gør—med jeres data.
• Når vi håndterer ‘law enforcement’
forespørgsler, sker det under hensyn
til dine rettigheder og generel
privacybeskyttelse og vi sikrer at
process følger retsikkerheds-
principper.
• For hver af vore services, giver vi dig
information om hvor dine data
lagres og behandles.
Kunden kan med
rette forvente:
• At man har en klar, plain-
language forklaring af
hvordan Microsoft håndterer
og beskytter din
organisation’s data.
• At Microsoft vil være
transparente omkring law
enforcement forespørgsler.
35. Country Cloud Service Provider
Cloud
Regional Cloud Unique CloudCustomer Cloud
Deployed på resource hos
kunden selv, med Microsoft
produkter og teknologier
Kunden selv Microsoft Partner
Deployed på Microsoft public
cloud ressourcer på lande-
specifike lokationer for at
tilfredsstille lokale krav om
data tilhør/lagring
Deployed på dedikerede
ressourcer hosted og
drevet af en Microsoft
partner; tilbyder en højere
grad af mulig customisering
for at imødekomme
specifikke krav
Deployed på Microsoft’s
globale/regionale
ressourcer, muliggør
hurtig skallering,
automatiseret software
updateringer, og forbrugs-
baseret afregning.
Sjældnere, ikke-standard
deployment af Microsoft
cloud ressourcer som
overholder unikke krav i
enkelte markeder.
Deployed i meget
begrænsede tilfælde
Holland (Middenmeer)
og Irland (Dublin)
Microsoft Cloud leveret fra
Datacentre i UK
Microsoft Cloud med en
Tysk Data Trustee
(Deutsche Telecom)
Microsoft Cloud platform tilbyder flere valgmuligheder
Adresserer unikke nationale, geografiske, industri og kundespecifikke muligheder.
Microsoft Confidential
38. DCU Botnet Takedowns og Malware Disruption
b49
Waledac
February 2010
First MS takedown
operation, proving the
model of industry-led
efforts
Disconnected70,000-
90,000 infected
devices from the
botnet
Botnet Worm sending
SPAM (1,5B )
b107
Rustock
March 2011
Supported by
stakeholders across
industry sectors
Involved US and Dutch
law enforcement, and
CN-CERT
SPAM, in average 192 spam
messages per compromised
machine per minute
b79
Kelihos
September 2011
Partnership between
Microsoft and security
software vendors
First operation with
named defendant
SPAM, Bitcoin
Mining, Distributed
Denial of Service
Attacks
b71
Zeus
March 2012
Cross-sector partnership
with financial services
Focused on disruption
because of technical
complexity
Identity Theft / Financial
Fraud
b70
Nitol
b58
Bamital
b54
Citadel
September 2012
Nitol was introduced in
the supply chain relied
on by Chinese
consumers
Settled with operator
of malicious domain
Malware Spreading,
Distributed Denial of
Service Attacks
February 2013
Bamital hijacked people’s
search results, took
victims to dangerous
sites
Takedown in
collaboration with
Symantec, proactive
notification and cleanup
process
Advertising Click Fraud
June 2013
Citadel committed
online financial fraud
responsible for more
than $500Min losses
Coordinated disruption
with public-private
sector
Identity Theft /
Financial Fraud
b68
ZeroAccess
December 2013
ZeroAccess hijacked
search results, taking
victims to dangerous
sites
It cost online
advertisers upwards of
$2.7 million each month
Advertising Click
Fraud
b157
Game over
Zeus
June 2014
Malware using Dynamic
DNS for command. It
involved password and
identity theft, webcam,
etc.
Over 200 different types
of malware impacted.
Identity Theft /
Financial Fraud /
Privacy Invasion
b106
Bladabindi & Jenxcus
June 2014
GameoverZeus (GOZ)
was a banking Trojan
Worked in partnership
with LE providing
Technical Remediation
Identity Theft /
Financial Fraud
b93
Caphaw
July 2014
Caphaw was focused on
online financial fraud
responsible for more
than $250M in losses
Coordinated disruption
with public-private
sector
Identity Theft /
Financial Fraud
Conficker
February 2010
Microsoft-lead model of
industry-wide efforts to
counter the threat
Botnet Worm sending
SPAM andattempting to
steal confidential data and
passwords
b75
Ramnit
February 2015
Module-based
malware, stealing
credential information
from banking websites.
Configured to hide
itself.
Credential
Information
Theft/Disable Security
Defenses
b46
Simda
April 2015
Theft of personal details,
including banking
passwords, as well as to
install and spread other
malicious malware.
Theft personal
data/Install and spread
other malware
39.
40. Microsoft PhotoDNA
• Skaber digital signatur af de værste
kendte børnepornografiske billeder
• Kan digitalt lokalisere disse billeder
mellem millioner online
• Deles med myndigheder og gratis
licensieret til over 50 organisationer
• Industri standard – bruges fx af
Facebook, Twitter, Google
45. Overvejelser man bør have ……
ved valg af cloud løsning & leverandør
Afkræv
gennemsigtighed
i sikkerheds-policy
og driftsprocedurer
Sikre en klar
forståelse for
sikkerheds, privacy
og compliance-
roller og ansvar
for de leverede
tjenester
Sikre at data og
den enkelte
tjeneste kan
bringes
tilbage in-house
om nødvendigt
Kend klassifikation
af dine data,
processer og de
sikkerheds og
compliance krav
som de er
underlagt
Overvej
leverandørens
mulighed for
håndtering af
fremtidige
ændringer i
sikkerheds- og
compliance krav
Kræve at
leverandør har
3.parts
certificeringer og
revision, fx.,
ISO/IEC
27001:2005
46. 10 gode skridt til vurdering af & udnyttelse af cloud:
Fem interne ….
1. Kend dine data, deres klassifikation og gennemfør (simpel) Privacy Impact Assessment og
risikoanalyse?
2. Start så med et simplere workload – backup, arkiv, CRM, Office, Disaster Recovery etc.
3. Se derefter på din kerneforretning og overvej en strategi for at cloud kan hjælpe med at gøre det
billigere, hurtigere, mere fleksibelt, bedre?
4. Se endelig på dine vækstplaner og hvordan CC kan hjælpe dig nå nye markeder o.lign.?
5. Har du processer eller transaktioner som matcher nogle af de klassiske forbrugsmønstre?
Og fem eksterne rettet mod din cloud service provider
6. Er din CSP transparent omkring drift, certificeringer, kontraktuelle forpligtelser etc.
7. Hvordan håndterer din CSP incidents og henvendelser fra myndigheder?
8. Hvordan behandles personfølsomme data?
9. Hvordan ser økosystemet omkring din CSP ud – er der et (stort nok) udbud af partnere som kan
hjælpe med implementering, videreudvikling og optimering
10. Gå all-in! CC er fremtiden og tilbyder dig både top & bund-linie fordele, samt et mere
omstillingsparat IT miljø. Kan din CSP hjælpe dig med at gøre det, før dine (nye) konkurrenter det?
47. Microsoft
Trusted Cloud
Ufravigelige principper
Sikkerhed by Design
Privacy by Design
Compliance
Gennemsigtighed
På tværs af platforme
Vi er tilstede på alle platforme
Kundecases
25år+ erfaring med globale
intensive cloud tjenester
Private & offentlige cases
indenfor alle ‘domæner’ og i
alle geografier
24x7
Udvikler konstant på vores anvendelse
af krypteringsteknologier, processer etc.
for at imødegå trusler
Red Teaming
Operational Excellence @Scale
Digital Crimes Unit
Compliance &
Gennemsigtighed
ALTID fuldt på højde med nyeste
standarder og strengeste lovgivning
OG vi udfordrer myndigheder
Globalt!
OPSUMMERING
48. Ekstra ressourcer http://aka.ms/danmark-skyen
Microsoft Datacenters
Web Site & Team Blogs
microsoft.com/datacenters
Data Governance:
http://bit.ly/MSDataGovernance
CSAMatrix: http://bit.ly/CSAMatrix
Windows Azure Trust Center
windowsazure.com/trustcenter
Office 365 Trust Center
trustoffice365.com/
Cloud Jura Overblik
http://bit.ly/CloudJuraOverblik
Online Academy
http://bit.ly/w10_sikkerhed
49. MICROSOFT ER FULDT ENGAGERET
I DATA PRIVACY & SIKKERHED
Cybersikkerhed
Privacy
Compliance
Gennemsigtighed
Samfundsansvar
Risikostyring
Governance
OPSUMMERING
50.
51. Overførsel af persondata ud af EU/EEA
http://export.gov/safeharbor/
Overførsel af PII kun
til lande der sikrer
tilstrækkelig data
beskyttelse ifht loven
under data
beskyttelsesdirektivet A model agreement to be agreed between a data controller in
EU/EEA and a data processor outside of EU/EEA
No Danish law requirement to notify to the DPA
http://www.datatilsynet.dk/nyheder/seneste-nyheder/artikel/naermere-orientering-fra-datatilsynet-om-safe-harbor-dommen/
http://blogs.microsoft.com/on-the-issues/2015/10/06/a-message-to-our-customers-about-eu-us-safe-harbor/
http://europa.eu/rapid/press-release_IP-16-216_en.htm?utm_content=buffer32bdb&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
52. THE COURT (GRAND CHAMBER) HEREBY RULES:
1. Article 25(6) of Directive 95/46/EC of the European Parliament and of the Council of
24 October 1995 on the protection of individuals with regard to the processing of
personal data and on the free movement of such data as amended by Regulation
(EC) No 1882/2003 of the European Parliament and of the Council of 29 September
2003, read in the light of Articles 7, 8 and 47 of the Charter of Fundamental Rights of
the European Union, must be interpreted as meaning that a decision adopted
pursuant to that provision, such as Commission Decision 2000/520/EC of 26 July
2000 pursuant to Directive 95/46 on the adequacy of the protection provided by the
safe harbour privacy principles and related frequently asked questions issued by the
US Department of Commerce, by which the European Commission finds that a third
country ensures an adequate level of protection, does not prevent a supervisory
authority of a Member State, within the meaning of Article 28 of that directive as
amended, from examining the claim of a person concerning the protection of his
rights and freedoms in regard to the processing of personal data relating to him
which has been transferred from a Member State to that third country when that
person contends that the law and practices in force in the third country do not
ensure an adequate level of protection.
2. Decision 2000/520 is invalid.
SOURCE: INFOCURIA - JURISPRUDENTIE VAN HET HOF VAN JUSTITIE; HTTP://CURIA.EUROPA.EU/JURIS/DOCUMENTS.JSF?NUM=C-362/14
53. Om dataoverførsler mens Safe Harbour aftalen
er erklæret ugyldig:
“In the meantime, transatlantic data flows
between companies CAN CONTINUE USING
OTHER MECHANISMS for international
transfers of personal data available under EU
data protection law.”
EU
First Vice-President Timmermans
Commissioner Jourová
57. Sikkerhedsdesign og drift
Microsoft fastholder sikkerhed som en prioritet
i hvert skridt fra design, over udvikling
& drift, frem til incident håndtering.
Security Development
Lifecycle (SDL)
Company-wide, mandatory
development process that
embeds security into every
phase of development process.
Assume breach
simulation
Dedicated security expert “red
team” that simulate real-world
attacks at network, platform,
and application layers, testing
the ability of Azure to detect,
protect against, and recover
from breaches.
Global, 24x7 incident response
service that works to mitigate
the effects of attacks and
malicious activity.
Incident
response
58 SIKKERHED
58. Data protection
Microsoft Cloud provides customers with strong data protections – both by
default and as customer options
59
Data isolation
Logical isolation segregates each customer’s
data from that of others is enabled by default.
In-transit data protection
Industry-standard protocols encrypt data in
transit to/from outside components, as well as
data in transit internally by default.
Data redundancy
Customers have multiple options for
replicating data, including number of copies
and number and location of replication data
centers.
At-rest data protection
Customers can implement a range of
encryption options for virtual machines and
storage.
Encryption
Data encryption in storage or in transit can be
deployed by the customer to align with best
practices for ensuring confidentiality and
integrity of data.
Data destruction
Strict standards for overwriting storage
resources before reuse and the physical
destruction of decommissioned hardware are
by default.
59. Adgangskontroler verificeres af uafhængig revision og certificering.
Restriktioner på dataadgang
60
Kundedata tilgåes kun når nødvendigt for at gennemfør kundeinitieret support
på tjenesten, eller hvis krævet af lovgivning.
Når adgang gives, sker det kontrolleret og med fuldt logningsspor som
er tilgængeligt for dataejeren.
Stærk authentication, inclusive MFA, hjælper med at begrænse
adgangen til ‘kun’ at være for det autoriserede personale.
Adgang tildeles fra ‘Zero-Standing’ og fjernes så
snart den ikke længere er nødvendig – INGEN
stående admin adgang udenfor kundens kontrol.
PRIVACY
60. ISO/IEC 27018
Prevents use of customer data for
purposes unrelated to providing the
cloud service.
Prohibits use of customer data for
advertising and marketing purposes
without customer’s express consent.
Microsoft is the first
major cloud provider
to adopt the first
international code of
practice for
governing the
processing of
personal information
by cloud service
providers.
61
66. Hardware based security for better malware protection.
Secure Boot
Enterprise credential protection via hardware-based isolation
Secure corporate identity to protect against
modern threats.
Microsoft Passport
Windows Hello
Protect your corporate data, wherever the data is.
Enterprise data protection
Eliminate malware on your devices.
Device Guard
More secure per-app connection for mobile workers.
Secure Remote Connection
68. A familiar user experience that
adapts to your device.
Start menu
Continuum
Continuum for Phone
Apps that can run on any Windows device.
Windows Universal Apps
The best productivity experience
across all Windows devices.
Office for Windows
Modernize your web experience, stay compatible.
Microsoft Edge
Internet Explorer 11
70. Latest Windows innovations
on your existing PC fleet.
Great mouse & keyboard support
Hardware compatibility
Granular UX Control
Choose from the range of
innovative Windows devices.
Broad industry innovation
2-in-1 devices
Surface
Lumia
Redefine productivity with
revolutionary Windows devices.
Surface Hub
HoloLens
71. Private, secure social network for your business
Inline social experiences across Office makes
posting updates, docs, and emails easy
SharePoint-based file storage provides a single
place to manage your content
INTEGRATED SOCIAL
NETWORKING
72. Groups help users collaborate more effectively
by providing a shared inbox, calendar, document
library, site, and Yammer feed
Public Groups enable users to discover new
information and meet new people within their
organization
Membership for Groups is integrated across
Exchange, SharePoint, and Yammer to deliver a
unified collaboration experience
GROUPS
73. Collaborate on Office documents in real time
Get started with file, sync and share in the cloud
quickly and easily
Securely store, sync, and share work files from
any device or platform
ONE DRIVE FOR
BUSINESS
74. Create, manage, and subscribe to various
channels
Secure cloud based video
upload, storage and optimized playback
Capture, share, and discover videos from any
device
OFFICE 365 VIDEO
76. Apps designed specifically for touch-first use on
tablets and phones
Familiar, consistent experience across phone,
tablet, and desktop
On-the-go document review, creation, and
collaboration
Document fidelity remains priority
OFFICE
ACROSS DEVICES
77. Seamless integration with Office 365, OneDrive
and SharePoint
Similar look & feel of Office on Windows
New & improved features for easy collaboration
OFFICE
FOR THE MAC
79. Discover new information tailored to you from
your network
Stay connected and informed on topics that
matter the most
A natural new way to navigate, discover, and
search across your organization
OFFICE GRAPH
80. Insights derived from each users behavior, their
relationships to content, topics and one-another.
Smart connections between people, content and
conversations across Office
An extensible intelligence fabric that delivers a
new era of information experiences
DELVE
81. Search and connectivity to public and corporate
data all within Excel
Filter, shape, and merge queries from multiple
data sources
BI FOR EVERYONE
82. Add predictive analytics to your reports for
forecasting and population plotting
Interactively visualize data to uncover insights &
share in the cloud
Access touch-first reports across devices,
anywhere for Mobile BI
VISUALIZATION &
MOBILITY
84. Improved Compliance Customer controls
expanding these technologies across various
services (Archiving, Auditing, Data Loss
Prevention, E-discovery)
Authenticated customer-specific Customer Trust
Center
TRUST CENTER
Access to Office 365 compliance controls and
customer dashboard for compliance
View customer-relevant reports – ISO, SOC Audit
reports, notifications about updates, regulatory
changes, etc.
85. Advanced encryption with RMS helps to improve
security
Office 365 provides built-in capabilities and
customer controls
CONTROL ON YOUR
TERMS
86. All compliance tasks in one place
Built into Exchange and SharePoint in the cloud
or on-premises
COMPLIANCE CENTER
87. In-Place Hold: protect content in-place in real
time
Query: find up to date and relevant content
quickly
Export: transfer content for review and
production
eDISCOVERY
Across: SharePoint, Exchange, Lync, and file
shares on-premises and Office 365
88. New security features like DLP Policy Tips
Greatly enhanced security capabilities
DATA LOSS
PREVENTION
89. S/MIME Encryption (Q1 CY 2014) Uses client
side encryption keys
Office 365 Messaging Encryption;
send secure, encrypted emails to anyone!
ENCRYPTION
Strengthening encryption to protect your data;
data encrypted at rest and in motion
Security Risk Scenarios Risk Mitigation Technology
Rogue Admin RMS, BitLocker
Data Loss Prevention (DLP) DLP Policies
Stolen/Lost Laptop BitLocker
Stolen/Lost Mobile Device BitLocker, Mobile Device Management
Send encrypted email outside the
organization
Office 365 Message Encryption
B2B S/MIME