Azure information protection
Enterprise Mobility + Security
The Microsoft vision
Identity Driven Security
Managed Mobile Productivity
Comprehensive Solution
AppsDevices DataUsers
Azure Information
Protection
Protect your data,
everywhere
Microsoft Cloud App Security
Azure Active Directory
Detect threats early
with visibility and
threat analytics
Advanced
Threat Analytics
Extend enterprise-grade
security to your cloud
and SaaS apps
Intune
Protect your users,
devices, and apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Enterprise Mobility +Security
The Microsoft solution
Azure Information
Protection
Unregulated,
unknown
Managed mobile
environment
How much control
do YOU have?
On-premises
Perimeter
protection
Identity, device
management protection
Hybrid data = new normal
It is harder to protect
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
Respond
LABELINGCLASSIFICATION
Classify &
Label
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Azure Information
Protection DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
Respond
LABELINGCLASSIFICATION
Classify &
Label
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
Classification
+ Automation + Protection + Reporting + Collaboration
Azure information protection
Confidential
Restricted
Internal
Public
IT admin sets policies,
templates, and rules
Personal
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
ReclassificationAutomatic Recommended Manual
FINANCE
CONFIDENTIAL
Persistent labels that travel with the document
Labels are metadata written to
documents
Labels are in clear text so that other
systems such as a DLP engine can read
Labels travel with the document,
regardless of location
Azure information protection
VIEW EDIT COPY PASTE
Email
attachment
FILE
Protect data needing protection by:
Encrypting data
Including authentication requirement and a
definition of use rights (permissions) to the data
Providing protection that is persistent and travels
with the data
Personal apps
Corporate apps
aEZQAR]ibr{qU@M]
BXNoHp9nMDAtnBfr
fC;jx+Tg@XL2,Jzu
()&(*7812(*:
Use rights +
Secret cola formula
Water
Sugar
Brown #16
PROTECT
Usage rights and symmetric
key stored in file as “license”
Each file is protected by
a unique AES symmetric
License protected
by customer-owned
RSA key
Water
Sugar
Brown #16
UNPROTECT
Use rights
+
Azure RMS never
sees the file content,
only the license
Apps protected with
RMS enforce rights
SDK
Apps use the SDK to
communicate with the
RMS service/servers
File content is never sent
to the RMS server/service
aEZQAR]ibr{qU@M]B
XNoHp9nMDAtnBfrfC
;jx+Tg@XL2,Jzu
()&(*7812(*:
Use rights
+
LOCAL PROCESSING ON PCS/DEVICES
Azure information protection
Azure information protection
Monitor use, control and block abuse
Sue
Joe blocked in Ukraine
Jane accessed from France
Bob accessed from North America
MAP VIEW
Jane
Competitors
Jane access is revoked
Sue
Bob
Jane
Logs & Reporting
More
Soon
Azure information protection
Share internally, with business partners, and customers
Bob
Jane
Internal user
*******
External user
*******
Any device/
any platform
Sue
File share
SharePoint
Email
LoB
Azure Active Directory
On-premises organizations
doing full sync
On-premises organizations
doing partial sync
Organizations completely in cloud
…and all of these organizations
can interact with each other.
Organizations created
through ad-hoc signup
ADFS
Using Azure AD for authentication
Azure information protection
Authentication & collaboration
RMS connector
Authorization
requests via
federation
(optional)
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
AAD Connect
ADFS
Service supplied Key BYOK
Authentication & collaboration
RMS connector
Authorization
requests via
federation
(optional)
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
Hold your key on premises
AAD Connect
ADFS
HYOK
Service supplied Key BYOK
for
Regulated Environments
Classification only Understand your data classification needs, enable the service
and define a default policy so all documents are labelled.
+ Automation
+ Protection
+ Reporting
+ Collaboration
Define content based actions to automatically classify and label
documents or make recommendations to users to confirm.
For sensitive information, define protection policies that require
authentication and enforce use rights.
Gain insights into the types of information you have, users that
work with different sensitivity levels and trends in data
creation.
Securely share documents and email with internal and external
recipients.
Check out more sessions:
Tuesday:
BRK2127 Adopt a comprehensive identity-driven solution for protecting
and sharing data securely – 9am
THR2107 Collaborate securely using Azure Information Protection – 12:05
pm
Wednesday:
THR2108 Ensure comprehensive protection of your data with Azure
Information Protection – 11:05 am
BRK3095 Learn how classification, labeling, and protection delivers
persistent data protection – 12:30 pm
BRK2128 Protect and share data with anyone securely using Azure
Information Protection – 4 pm
Friday:
BRK3323 Meet Azure Information Protection customers and learn about
their success stories – 9:15 am (General Motors)
Try Enterprise Mobility + Security for free, today:
www.microsoft.com/en-us/cloud-platform/enterprise-mobility-trial
See Microsoft Cloud App Security in action
https://www.microsoft.com/en-us/cloud-platform/cloud-app-security-trial
Evaluate and try Microsoft Advanced Threat Analytics now
www.microsoft.com/en-us/evalcenter/evaluate-microsoft-advanced-threat-analytics
Explore Identity + Access Management
www.microsoft.com/en-us/cloud-platform/identity-management
Learn more about Azure Information Protection
www.microsoft.com/en-us/cloud-platform/information-protection
Discover new MDM and MAM solutions with Microsoft Intune
www.microsoft.com/en-us/cloud-platform/mobile-device-managementlink
Check out new Desktop virtualization capabilities
www.microsoft.com/en-us/cloud-platform/desktop-virtualization
From your PC or Tablet visit MyIgnite at
http://myignite.microsoft.com
From your phone download and use the Ignite
Mobile App by scanning the QR code above or
visiting https://aka.ms/ignite.mobileapp
Please evaluate this session
Your feedback is important to us!
Azure information protection

More Related Content

PDF
Overview of Data Loss Prevention Policies in Office 365
PDF
Microsoft Zero Trust
PDF
Microsoft 365 Compliance and Security Overview
PDF
Azure Information Protection
PPTX
Microsoft Azure Information Protection
PPTX
2 Modern Security - Microsoft Information Protection
PDF
Microsoft 365 Compliance
PDF
Microsoft 365 Security and Compliance
Overview of Data Loss Prevention Policies in Office 365
Microsoft Zero Trust
Microsoft 365 Compliance and Security Overview
Azure Information Protection
Microsoft Azure Information Protection
2 Modern Security - Microsoft Information Protection
Microsoft 365 Compliance
Microsoft 365 Security and Compliance

What's hot (20)

PPTX
Microsoft Information Protection.pptx
PDF
Microsoft Office 365 Security and Compliance
PDF
March 2023 CIAOPS Need to Know Webinar
PPTX
Microsoft Defender for Endpoint
PPTX
Microsoft Information Protection: Your Security and Compliance Framework
PPTX
Microsoft Purview
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
PPTX
Data Loss Prevention in Office 365
PDF
Understanding Azure AD
PPTX
Labelling in Microsoft 365 - Retention & Sensitivity
PDF
An introduction to Defender for Business
PDF
Microsoft 365 eEnterprise E5 Overview
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PDF
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
PPTX
Overview of Microsoft Teams and Data Loss Prevention(DLP)
PPTX
Breakdown of Microsoft Purview Solutions
PPTX
Data Loss Prevention
PPTX
Overview of Microsoft Exchange Online
PPTX
Microsoft Defender for Endpoint Overview.pptx
PPTX
Microsoft Purview Information Barriers and Communication Compliance and Micro...
Microsoft Information Protection.pptx
Microsoft Office 365 Security and Compliance
March 2023 CIAOPS Need to Know Webinar
Microsoft Defender for Endpoint
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Purview
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Data Loss Prevention in Office 365
Understanding Azure AD
Labelling in Microsoft 365 - Retention & Sensitivity
An introduction to Defender for Business
Microsoft 365 eEnterprise E5 Overview
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Breakdown of Microsoft Purview Solutions
Data Loss Prevention
Overview of Microsoft Exchange Online
Microsoft Defender for Endpoint Overview.pptx
Microsoft Purview Information Barriers and Communication Compliance and Micro...
Ad

Similar to Azure information protection (20)

PPTX
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
PDF
Protect your data in / with the Cloud
PDF
Microsoft Azure Rights Management
PPTX
Como o Azure Information Protection pode manter seus dados seguros
PPTX
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
05-Empowering-Enterprise-Mobility-FR.pptx
PDF
Information protection & classification
PDF
Techorama - Shadow IT with Cloud Apps
PDF
Microsoft Enterprise Mobility and Security EMS
PPTX
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
PDF
Power Saturday 2019 E1 - Office 365 security
PPTX
Gestión de identidad
PDF
June 2020 Microsoft 365 Need to Know Webinar
PPTX
In t trustm365ems_v3
PDF
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
PDF
From classification to protection of your data, secure your business with azu...
PDF
Azure Information Protection
PDF
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
Protect your data in / with the Cloud
Microsoft Azure Rights Management
Como o Azure Information Protection pode manter seus dados seguros
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
05-Empowering-Enterprise-Mobility-FR.pptx
Information protection & classification
Techorama - Shadow IT with Cloud Apps
Microsoft Enterprise Mobility and Security EMS
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
Power Saturday 2019 E1 - Office 365 security
Gestión de identidad
June 2020 Microsoft 365 Need to Know Webinar
In t trustm365ems_v3
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
From classification to protection of your data, secure your business with azu...
Azure Information Protection
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Intune y Gestión de Identidad Corporativa
Ad

Recently uploaded (20)

PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
Rapid Prototyping: A lecture on prototyping techniques for interface design
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
giants, standing on the shoulders of - by Daniel Stenberg
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Co-training pseudo-labeling for text classification with support vector machi...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Training Program for knowledge in solar cell and solar industry
Enhancing plagiarism detection using data pre-processing and machine learning...

Azure information protection

  • 2. Enterprise Mobility + Security The Microsoft vision Identity Driven Security Managed Mobile Productivity Comprehensive Solution AppsDevices DataUsers
  • 3. Azure Information Protection Protect your data, everywhere Microsoft Cloud App Security Azure Active Directory Detect threats early with visibility and threat analytics Advanced Threat Analytics Extend enterprise-grade security to your cloud and SaaS apps Intune Protect your users, devices, and apps Manage identity with hybrid integration to protect application access from identity attacks Enterprise Mobility +Security The Microsoft solution
  • 5. Unregulated, unknown Managed mobile environment How much control do YOU have? On-premises Perimeter protection Identity, device management protection Hybrid data = new normal It is harder to protect
  • 7. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & Respond LABELINGCLASSIFICATION Classify & Label ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle
  • 8. Classification + Automation + Protection + Reporting + Collaboration
  • 10. Confidential Restricted Internal Public IT admin sets policies, templates, and rules Personal Classify data based on sensitivity Start with the data that is most sensitive IT can set automatic rules; users can complement it Associate actions such as visual markings and protection
  • 12. FINANCE CONFIDENTIAL Persistent labels that travel with the document Labels are metadata written to documents Labels are in clear text so that other systems such as a DLP engine can read Labels travel with the document, regardless of location
  • 14. VIEW EDIT COPY PASTE Email attachment FILE Protect data needing protection by: Encrypting data Including authentication requirement and a definition of use rights (permissions) to the data Providing protection that is persistent and travels with the data Personal apps Corporate apps
  • 15. aEZQAR]ibr{qU@M] BXNoHp9nMDAtnBfr fC;jx+Tg@XL2,Jzu ()&(*7812(*: Use rights + Secret cola formula Water Sugar Brown #16 PROTECT Usage rights and symmetric key stored in file as “license” Each file is protected by a unique AES symmetric License protected by customer-owned RSA key Water Sugar Brown #16 UNPROTECT
  • 16. Use rights + Azure RMS never sees the file content, only the license Apps protected with RMS enforce rights SDK Apps use the SDK to communicate with the RMS service/servers File content is never sent to the RMS server/service aEZQAR]ibr{qU@M]B XNoHp9nMDAtnBfrfC ;jx+Tg@XL2,Jzu ()&(*7812(*: Use rights + LOCAL PROCESSING ON PCS/DEVICES
  • 19. Monitor use, control and block abuse Sue Joe blocked in Ukraine Jane accessed from France Bob accessed from North America MAP VIEW Jane Competitors Jane access is revoked Sue Bob Jane
  • 22. Share internally, with business partners, and customers Bob Jane Internal user ******* External user ******* Any device/ any platform Sue File share SharePoint Email LoB
  • 23. Azure Active Directory On-premises organizations doing full sync On-premises organizations doing partial sync Organizations completely in cloud …and all of these organizations can interact with each other. Organizations created through ad-hoc signup ADFS Using Azure AD for authentication
  • 25. Authentication & collaboration RMS connector Authorization requests via federation (optional) Data protection for organizations at different stages of cloud adoption Ensures security because sensitive data is never sent to the RMS server Integration with on-premises assets with minimal effort AAD Connect ADFS Service supplied Key BYOK
  • 26. Authentication & collaboration RMS connector Authorization requests via federation (optional) Data protection for organizations at different stages of cloud adoption Ensures security because sensitive data is never sent to the RMS server Integration with on-premises assets with minimal effort Hold your key on premises AAD Connect ADFS HYOK Service supplied Key BYOK for Regulated Environments
  • 27. Classification only Understand your data classification needs, enable the service and define a default policy so all documents are labelled. + Automation + Protection + Reporting + Collaboration Define content based actions to automatically classify and label documents or make recommendations to users to confirm. For sensitive information, define protection policies that require authentication and enforce use rights. Gain insights into the types of information you have, users that work with different sensitivity levels and trends in data creation. Securely share documents and email with internal and external recipients.
  • 28. Check out more sessions: Tuesday: BRK2127 Adopt a comprehensive identity-driven solution for protecting and sharing data securely – 9am THR2107 Collaborate securely using Azure Information Protection – 12:05 pm Wednesday: THR2108 Ensure comprehensive protection of your data with Azure Information Protection – 11:05 am BRK3095 Learn how classification, labeling, and protection delivers persistent data protection – 12:30 pm BRK2128 Protect and share data with anyone securely using Azure Information Protection – 4 pm Friday: BRK3323 Meet Azure Information Protection customers and learn about their success stories – 9:15 am (General Motors)
  • 29. Try Enterprise Mobility + Security for free, today: www.microsoft.com/en-us/cloud-platform/enterprise-mobility-trial See Microsoft Cloud App Security in action https://www.microsoft.com/en-us/cloud-platform/cloud-app-security-trial Evaluate and try Microsoft Advanced Threat Analytics now www.microsoft.com/en-us/evalcenter/evaluate-microsoft-advanced-threat-analytics Explore Identity + Access Management www.microsoft.com/en-us/cloud-platform/identity-management Learn more about Azure Information Protection www.microsoft.com/en-us/cloud-platform/information-protection Discover new MDM and MAM solutions with Microsoft Intune www.microsoft.com/en-us/cloud-platform/mobile-device-managementlink Check out new Desktop virtualization capabilities www.microsoft.com/en-us/cloud-platform/desktop-virtualization
  • 30. From your PC or Tablet visit MyIgnite at http://myignite.microsoft.com From your phone download and use the Ignite Mobile App by scanning the QR code above or visiting https://aka.ms/ignite.mobileapp Please evaluate this session Your feedback is important to us!