Documente Academic
Documente Profesional
Documente Cultură
Security Overview
Rani Lofstrom
05/01/18
title
Microsoft Secure
Ensuring security to enable your digital
transformation through a comprehensive
platform, unique intelligence, and broad
partnerships
title
OUR UNIQUE APPROACH
Enterprise Bing
security for
90% of 18B+ Bing
web pages
Fortune 500
450B
scanned
750M+ Xbox Live
Azure user monthly
accounts authentications
How Microsoft 365
Realities of digital
Enterprise E5 Fits In transformation
Microsoft Secure
global security vision
2020
Global Mobile Workforce Forecast Update 2017-2023, “The State of GDPR Readiness: GDPR Readiness Progress
Strategy Analytics es, But Strategies Depend Too Heavily on IT” Forrester, J
anuary, 2018
How to eliminate enterprise shadow IT, Gartner, April 11,
2017
REALITIES OF DIGITAL TRANSFORMATION
$1.37M 1.87M 70
Security
from
35
Security
products vendors
On average that an
organization spends annually in
Global cybersecurity Is the average for companies
time wasted responding to
workforce shortage by 2022 with over 1,000 employees
erroneous malware alerts Global Information Security Workforce Study 2017 Nick McQuire, VP Enterprise Research CCS Insight.
“The Cost of Insecure Endpoints” Ponemon Institute© Research Report, June 2017
REALITIES OF DIGITAL TRANSFORMATION
Lack of specific Too much time spent managing Too many alerts to investigate
recommendations on how to security vendors
improve security posture
title
Threat
Protection
Security
Management
Information
Protection
Data is your most Security starts with great Correlate threat information Optimize with security insights
important company asset user authentication and automatically respond and configuration tools
SECURING THE ENTERPRISE WITH MICROSOFT 365 E5
For enterprise
customers that
embrace the Microsoft
productivity suite,
significant gains can be
realized in security
SECURING THE ENTERPRISE WITH MICROSOFT 365 E5
Holistic security capabilities Individual components are Because security is built-in, Security tools are fed by
that can reduce the number purpose-built to integrate, deployment and on-going trillions of signals to
of vendors you manage which decreases TCO management is simplified provide insights across the
global Microsoft ecosystem
Recognize users and devices and dynamically Control access to sensitive Discover shadow IT so it can be
change what level of access is allowed and data, even when its shared secured and managed, reducing
how users authenticate based on parameters outside of your organization your exposure to data leakage
such as location, device risk, user risk or or accessed via a 3rd party through inappropriate sharing
document confidentiality level application and unsecured storage
Security automation detects potential threats Because users log in with a single
and correlates alerts to identify a specific user ID to any application from
attack vector, investigates and remediates any device from any location, you
threats, reauthenticates high-risk users, and have the context to detect and
takes action to limit access to data investigate suspicious activities
Identity and Access Management
Protect users’ identities and control access to valuable resources based on user risk
If a user’s identity or device Alert me when a user's Discover 3rd party cloud apps
becomes compromised, credentials are for sale on the that are in use and assess their
automatically block or limit dark web and elevate their risk risk level, so you can sanction or
access, or require MFA level block them
Discover, restrict, and monitor A single solution that can protect Eliminate passwords by using
privileged identities and their identity across on premises and biometrics or pins
access to resources cloud directories
Information Protection
Protect sensitive information wherever it lives or travels
Automatically apply data security Identify potentially sensitive Protect sensitive data when it
policies if a user's access to that information, like credit card travels outside of your
data changes, the user becomes numbers or bank routing numbers, organization via email, USB, or a
compromised or the data reaches and automatically apply a label 3rd party SaaS app
a certain age. and protection to the file
Detect attacks from both Endpoint monitoring with Advanced email protection Automatically investigate
on premises and cloud the ability to quarantine against phishing attempts, endpoint alerts and
signals the endpoint for and unknown (zero day) remediate threats,
investigation and wipe the threats removing them from all
device, if compromised impacted machines
A quantifiable measurement Benchmark your security score Recommended actions you can
of your security posture against companies in your take to improve your security
industry or of similar size posture
Detailed reports on the latest Teach users to guard against Incident and event
threats, so you can answer email phishing by simulating an forensic reporting
questions, like "How well am I attack in a safe environment
protected against the latest
threats?"
Addressing the risks inherent in a
title growing shadow IT environment
Bryan Ackermann
Chief Information Officer
Korn Ferry, United States
title
In just a few months, Yara deployed
Azure Information Protection for
14,000 users and 10,000 devices.
CONOR O’HALLORAN
Head of Identity Management
Merck KGaA, Darmstadt,
Germany
title
EDWIN IDEMA
IT Manager, EMEA
Asics
Microsoft 365 Enterprise E5
security products
MICROSOFT 365 E5 SECURITY PRODUCT SUITE
Azure Active Directory Azure Information Protection Azure Advanced Threat Protection Microsoft Security & Compliance Center
Microsoft Cloud App Security Office 365 Data Loss Prevention Windows Defender Windows Defender Security Center
Advanced Threat Protection
Windows Hello Microsoft Cloud App Security Microsoft Secure Score
Office 365 Advanced Threat Protection
Windows Credential Guard Windows Information Protection
Office 365 Threat Intelligence
Microsoft Intune
Microsoft Cloud App Security
BitLocker
Identity & Access Information Threat Security
title Management Protection Protection Management
• Single Sign-on • Data Loss Prevention (DLP) • Secure Email Gateway • Security Scoring
• Multi-Factor Authentication • Data Encryption • Endpoint Detection and Response • Reporting
• Access Control • Information Protection (EDR)
• Cloud-based Management
• Privileged Access Management • Data Classification • Endpoint Protection (EPP)
(PAM) • Data Governance • Anti-malware/phishing • Asset Discovery
• Cloud Access Security Broker (CASB) • Anti-spyware • Pen Testing/ Risk Assessment
• Secrets Management • Key Management • Antivirus Software • Vulnerability Assessment
• Mobile Application Management • User and Entity Behavior Analytics • Web Application Testing
• Database Security (UEBA) • Managed detection and response
• Encrypted Cloud Storage • Anomaly Detection (MDR)
• Back Up • Threat Intelligence Feeds • SOC
• Disaster Recovery • Remote Browser • Security training
• Intrusion Detection System (IDS)
• Virtual Private Networks (VPN) • SIEM (SIM/ SEM/ Log management)
• Intrusion Prevention System (IPS)
• IoT Protection
• Cloud Workload Protection
• DDoS Protection
Security categories M365 Enterprise E5 covers • Incident Response Services
• Cross-platform endpoint protection
Security categories other Microsoft solutions cover • Incident Ticket System
• Firewall/ Network
What Microsoft Services/ MSSPs cover • Mobile Threat Detection tools
• Host intrusion prevention system
What Microsoft integrates with (HIPS)
• Network traffic analysis (NTA)
• Container Security
What Microsoft doesn’t do • Anti-subversion software
• Anti-tamper software
• Deception
E3 vs E5 E3 E5
Information
Azure Information Protection P1
Azure Information Protection P2
Office 365 Data Loss Prevention
Protection
Microsoft Cloud App Security
Windows Information Protection
Office 365 Cloud App Security
BitLocker
365
Office 365 Advanced Threat Protection
Protection
Windows Defender Antivirus
Office 365 Threat Intelligence
Device Guard
Enterprise Azure Advanced Threat Protection
E5
Security Secure Score
Management
Microsoft security and compliance center (additional management reports and capabilities)
(includes E3 solutions) Windows Security Center
Compliance eDiscovery
Advanced eDiscovery, Customer Lockbox,
Advanced Data Governance
Office Applications
Productivity, Creativity Outlook/ Exchange Skype Audio Conferencing
and Teamwork solutions Microsoft Teams Phone System
Skype for Business
MICROSOFT 365 E5 SECURITY PRODUCT SUITE
title
E5 Security
Microsoft Cloud
App Security
Discovers cloud app being used in your
Windows Defender
Advanced Threat Protection
A unified endpoint security platform
Office 365 Advanced
Threat Protection
Protects your email, files and online
enterprise, identifies and combats that protects against advanced attacks
storage against unknown and
cyberthreats and enables you to control and automatically investigates and
sophisticated attacks
how your data travels remediates evolving threats
I need to be compliant with data protection How do I find and manage shadow IT and
regulations, like GDPR. How can Microsoft help rogue devices, and put in place policies to
me discover, classify and protect my sensitive data? ensure we remain compliant and secure?
I have solutions from many vendors in my How can Microsoft help me understand my
enterprise IT environment, how can Microsoft help current security posture and get
me secure our entire digital landscape? recommendations on how to improve it?
Eventually, we will experience a breach. How If a user becomes compromised, how can I
can Microsoft help me detect and respond configure security policies that automatically
to a breach fast? enforce additional layers of authentication to
keep my organization safe?
Thank you.
As many as 2 million payment cards we Personal information was found on a An unauthorized party acquired data fr Hackers stole 5 million credit and debit
re stolen and sold on the dark web n unsecure cloud storage server. om 150 million cloud app users cards and sold them on the dark web.
.