SlideShare a Scribd company logo
1 of 34
Sensitivity: Internal
Sensitivity: Internal
http://windowstechpro.com
Sensitivity: Internal
The challenges we face today in
keeping users productive while
protecting company information
Sensitivity: Internal
Mobility is the new normal
52% of information workers
across 17 countries report
using three or more devices
for work*
52%
90% of enterprises will have
two or more mobile operating
systems
90%
>80% of employees admit to
using non-approved software-
as-a-service (SaaS)
applications in their jobs***
>80%
Sensitivity: Internal
Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
Sensitivity: Internal
Rich PC management will continue to be an on-premises workload
Enterprise Mobility Management will be delivered as a Cloud service
IT Pros and end users want consistent and integrated experiences
Organizations will begin to shift to MDM-like management for their PCs
Hybrid Identity is the new control plane for the enterprise
Data must become self-protecting
The user is the final authority on their personal devices
IT is the final authority on corporate assets on any device
Sensitivity: Internal
User freedomSecure against new threats Do more with less
Customers need
Identity – driven security Productivity without
compromise
Comprehensive
solutions
Microsoft solution
ENTERPRISE MOBILITY + SECURITY
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
Sensitivity: Internal
What's Driving Change?
Devices Apps Data
Sensitivity: Internal
1. Protect at the front door
Safeguard your resources at the front door with innovative and advanced risk-based
conditional accesses
2. Protect your data against user mistakes
Gain deep visibility into user, device, and data
activity on-premises and in the cloud.
3. Detect attacks before they cause damage
Uncover suspicious activity and pinpoint threats with deep visibility and
ongoing behavioral analytics.
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
What is the Enterprise Mobility & Security?
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
Sensitivity: Internal
One User. One Identity. Everywhere.
Desktop
Virtualization
Access &
Information
Protection
Mobile Device &
Application
Management
Hybrid
Identity
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
Sensitivity: Internal
Public Identity as the control point
Active Directory
Sensitivity: Internal
Identity is the foundation for enterprise
Sensitivity: Internal
Sensitivity: Internal
Hybrid Identity
Unify your environment
Create a centralized identity
across on-premises and cloud
Use identity federation to
maintain centralized
authentication and securely share
and collaborate with external
users and businesses
Enable users
Provide users with self-service
experiences to keep them
productive
Enable single sign-on for users
across all the resources they need
access to
Protect your data
Enforce strong authentication when
users access resources and apply
conditional access controls to
sensitive company information
Configure single sign-on across all
company applications
Ensure compliance with governance,
attestation and reporting
Protect your dataEnable users
User
Unify your environment
User
Sensitivity: Internal
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
What is the Enterprise Mobility & Security?
Sensitivity: Internal
Device choice. Simplified management.
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Consistent user experience
Simplified device enrollment and registration
Single console to manage devices
Application management for Office and LOB
Sensitivity: Internal
Office365andIntuneprotectdataonmobiledevices
withoutsacrificinguserproductivity
Secure Collaboration
• IT can set and manage policy around how data is shared with
managed and non-managed apps
• In addition to Office mobile apps for iOS and Android, Intune will
support management of LOB iOS and Android apps
Rich Office Experience
• Give users familiar, full-featured Office applications
• Maintain document formatting across platforms
• Securely store, sync, and share content via OneDrive for Business
Managing Office Mobile Apps with Intune
Personal
Corporate
Sensitivity: Internal
Sensitivity: Internal
User and Device Management
Protect your data
Protect corporate information by
selectively wiping apps and data
from retired/lost devices
A common identity for accessing
resources on-premises and in the
cloud
Identify which mobile devices have
been compromised
Enable users
Access to company resources
consistently across devices
Simplified registration and enrollment of
devices
Synchronized corporate data
User
Unify your environment
On-premises and cloud-based
management of devices within a single
console.
Simplified, user-centric application
management across devices
Comprehensive settings management
across platforms, including certificates,
VPNs, and wireless network profiles
User
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
What is the Enterprise Mobility & Security?
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
Sensitivity: Internal
Right info. Right person. Right device.
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Dynamic Access Control
Rights management
Secure access to work files
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
STRICTLY CONFIDENTIAL
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
FINANCE
CONFIDENTIAL
Add persistent labels defining sensitivity to filesClassify data according to policies– automatically or by user
Sensitivity: Internal
Sensitivity: Internal
Employees Business partners Customers
Secure and protect against new threats
Maximum productivity experience
Comprehensive and integrated
Apps DevicesDataUsers
Sensitivity: Internal
Enterprise Mobility +Security
Sensitivity: Internal
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection Premium P2
Intelligent classification and
encryption for files shared
inside and outside your
organization
1)(includes all capabilities in P
Azure Information
Protection Premium P1
Encryption for all files and
storage locations
Cloud-based file tracking
Microsoft Cloud
App Security
Enterprise-grade visibility,
control, and protection for
your cloud applications
Microsoft Advanced
Threat Analytics
Protection from advanced
targeted attacks leveraging
user and entity behavioral
analytics
Microsoft Intune
Mobile device and app
management to protect
corporate apps and data on
any device
Azure Active Directory
Premium P2
Identity and access
management with advanced
protection for users and
privileged identities
1)includes all capabilities in P(
Azure Active Directory
Premium P1
Secure single sign-on to
cloud and on-premises apps
MFA, conditional access, and
advanced security reporting
EMS
E3
EMS
E5
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
Softkrishnan@gmail.com
Softkrishnan@outlook.com

More Related Content

What's hot

Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 

What's hot (20)

Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 

Similar to Overview of Microsoft Enterprise Mobility & Security(EMS)

05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 

Similar to Overview of Microsoft Enterprise Mobility & Security(EMS) (20)

Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Overview of Microsoft Enterprise Mobility & Security(EMS)

  • 3. Sensitivity: Internal The challenges we face today in keeping users productive while protecting company information
  • 4. Sensitivity: Internal Mobility is the new normal 52% of information workers across 17 countries report using three or more devices for work* 52% 90% of enterprises will have two or more mobile operating systems 90% >80% of employees admit to using non-approved software- as-a-service (SaaS) applications in their jobs*** >80%
  • 5. Sensitivity: Internal Is it possible to keep up? Employees Business partners Customers Is it possible to stay secure? Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 6. Sensitivity: Internal Rich PC management will continue to be an on-premises workload Enterprise Mobility Management will be delivered as a Cloud service IT Pros and end users want consistent and integrated experiences Organizations will begin to shift to MDM-like management for their PCs Hybrid Identity is the new control plane for the enterprise Data must become self-protecting The user is the final authority on their personal devices IT is the final authority on corporate assets on any device
  • 7. Sensitivity: Internal User freedomSecure against new threats Do more with less Customers need Identity – driven security Productivity without compromise Comprehensive solutions Microsoft solution ENTERPRISE MOBILITY + SECURITY Identity-driven security Comprehensive solution Managed mobile productivity
  • 8. Sensitivity: Internal What's Driving Change? Devices Apps Data
  • 9. Sensitivity: Internal 1. Protect at the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Protect your data against user mistakes Gain deep visibility into user, device, and data activity on-premises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics.
  • 10. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory What is the Enterprise Mobility & Security? Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key
  • 11. Sensitivity: Internal One User. One Identity. Everywhere. Desktop Virtualization Access & Information Protection Mobile Device & Application Management Hybrid Identity Single sign-on Self-service experiences Common identity Conditional access SaaS applications
  • 12. Sensitivity: Internal Public Identity as the control point Active Directory
  • 13. Sensitivity: Internal Identity is the foundation for enterprise
  • 15. Sensitivity: Internal Hybrid Identity Unify your environment Create a centralized identity across on-premises and cloud Use identity federation to maintain centralized authentication and securely share and collaborate with external users and businesses Enable users Provide users with self-service experiences to keep them productive Enable single sign-on for users across all the resources they need access to Protect your data Enforce strong authentication when users access resources and apply conditional access controls to sensitive company information Configure single sign-on across all company applications Ensure compliance with governance, attestation and reporting Protect your dataEnable users User Unify your environment User
  • 17. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key What is the Enterprise Mobility & Security?
  • 18. Sensitivity: Internal Device choice. Simplified management. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Consistent user experience Simplified device enrollment and registration Single console to manage devices Application management for Office and LOB
  • 19. Sensitivity: Internal Office365andIntuneprotectdataonmobiledevices withoutsacrificinguserproductivity Secure Collaboration • IT can set and manage policy around how data is shared with managed and non-managed apps • In addition to Office mobile apps for iOS and Android, Intune will support management of LOB iOS and Android apps Rich Office Experience • Give users familiar, full-featured Office applications • Maintain document formatting across platforms • Securely store, sync, and share content via OneDrive for Business Managing Office Mobile Apps with Intune Personal Corporate
  • 21. Sensitivity: Internal User and Device Management Protect your data Protect corporate information by selectively wiping apps and data from retired/lost devices A common identity for accessing resources on-premises and in the cloud Identify which mobile devices have been compromised Enable users Access to company resources consistently across devices Simplified registration and enrollment of devices Synchronized corporate data User Unify your environment On-premises and cloud-based management of devices within a single console. Simplified, user-centric application management across devices Comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles User
  • 22. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory What is the Enterprise Mobility & Security? Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key
  • 23. Sensitivity: Internal Right info. Right person. Right device. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Dynamic Access Control Rights management Secure access to work files
  • 26. Sensitivity: Internal STRICTLY CONFIDENTIAL CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules FINANCE CONFIDENTIAL Add persistent labels defining sensitivity to filesClassify data according to policies– automatically or by user
  • 28. Sensitivity: Internal Employees Business partners Customers Secure and protect against new threats Maximum productivity experience Comprehensive and integrated Apps DevicesDataUsers
  • 30. Sensitivity: Internal Information protection Identity-driven security Managed mobile productivity Identity and access management Azure Information Protection Premium P2 Intelligent classification and encryption for files shared inside and outside your organization 1)(includes all capabilities in P Azure Information Protection Premium P1 Encryption for all files and storage locations Cloud-based file tracking Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities 1)includes all capabilities in P( Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting EMS E3 EMS E5