SlideShare a Scribd company logo
Informations Rights Management
ANK Business Services GmbH
Michael Kirst-Neshva
Microsoft MVP Office 365
GWAVACon EMEA 2016
Daten in der / mit der Cloud schützen
2016
Michael Kirst-Neshva
ANK Business Services GmbH
Senior IT-Infrastructure Architect
Microsoft MVP Office 365
Communities:
Office365 CommunityDeutschland (Lead)
UserGroup Office365 Deutschland(Lead)
Azure CommunityDeutschland(Mitglied)
Verband „Voice ofInformation“ (Mitglied)
http://www.voi.de
Competence Center „SharePoint MajorLeague“
http://www.mlsharepoint.de
http://www.ankbs.de
E-Mail:mkn@ankbs.de
E-Mail:b-mikirs@microsoft.com
Twitter: @ankbs
 Blog | http://blog.ugoffice365.ms
Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen
credentials
Is it possible to keep up?
Employees Business partners Customers
The Microsoft vision
Secure and protect against new threats
Maximum productivity experience
Integrate with what you have
Apps
Devices
Data
Users
User freedomSecure against new threats Do more with less
Customers need
Identity – driven security Productivity without
compromise
Comprehensive
solutions
Microsoft solution
ENTERPRISE MOBILITY + SECURITY
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
The current reality
Identity as the core of enterprise mobility
Single sign-onSelf-service
Simple connection
On-premises
Other
directories
Windows Server
Active Directory
SaaSAzure
Public
cloud
CloudMicrosoft Azure Active Directory
1000s of apps,
1 identity
Provide one persona to the
workforce for SSO to 1000s of
cloud and on-premises apps
Manage access
at scale
Manage identities and
access at scale in the cloud
and on-premises
Cloud-powered
protection
Ensure user and admin
accountability with better
security and governance
Enable business
without borders
Stay productive with universal
access to every app and
collaboration capability
Azure Active Directory. Identity at the core of your business
Secure remote access to on-
premises
apps
Single sign
-on to mobile
apps
Support for
lift-and-
shift of
traditional
apps to
the cloud
Provide one persona to the
modern workforce for SSO
to 1000s of cloud and on-
premises applications
Single sign-on
to SaaS apps
1000s of apps,
1 identity
"Azure AD Premium makes life simpler for
the business and for employees. It gives
them access to enterprise applications
from any device with a single sign-on
that is secure and reliable. That is
fundamental in increasing the adoption
of cloud technology.
Bristow is also using Application Proxy,
and Azure AD Connect”
- Kapil Mehta
Productivity & Directory Services Manager,
Bristow Group Inc.
Conditions
Allow access or
Block access
Actions
Enforce MFA per
user/per app
User, App sensitivity
Device state
LocationUser
NOTIFICATIONS, ANALYSIS, REMEDIATION,
RISK-BASED POLICIES
CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT
MFA
IDENTITY
PROTECTION
Risk
CLOUD-POWERED PROTECTION
CLOUD-POWERED PROTECTION
Identity Protection at its best
Risk severity calculation
Remediation
recommendations
Risk-based conditional access automatically
protects against suspicious logins and
compromised credentials
Gain insights from a consolidated view of
machine learning based threat detection
Leaked
credentials
Infected
devices Configuration
vulnerabilities
Risk-
based
policiesMFA Challenge
Risky Logins
Block attacks
Change bad
credentials
Machine-Learning Engine
Brute force
attacks
Suspicious sign-
in activities
Collaboration in a borderless world
Users want collaboration and productivity, you want protection and control
Data
Apps
DevicesUsers
Access everything
from everywhere
Share and store data
across boundaries
Protect sensitive data
Employees Business partners Customers
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect problems
early with visibility
and threat analytics
Protect your data,
everywhere
Extend enterprise-grade security
to your cloud and SaaS apps
Manage identity with hybrid
integration to protect application
access from identity attacks
Advanced Threat Analytics
Cloud App Security
Azure Active Directory
Identity Protection
Azure Information
Protection
Protect your data,
everywhere
Challenges with the complex environment
Employees
Business partners
Customers
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen
credentials
The problem is ubiquitous
Intellectual Property theft has
increased
56% rise data theft
Accidental or malicious breaches
due to lack of internal controls
88% of organizations are Losing control
of data
80% of employees admit to
use non-approved SaaS app 91% of breaches could have
been avoided
Organizations no longer confident in
their ability to detect and prevent threats
Saving files to non-approved cloud
storage apps is common
Sources:
2016
Unregulated,
unknown
Managed mobile
environment
How much control
do you have?
On-premises
Perimeter
protection
Identity, device
management protection
Hybrid data = new normal
It is harder to protect
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Azure Information
Protection
The evolution of Azure RMS
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
Our solution: Data Lifecycle Classification and Protection
At data creation
Manual and automatic -
as much as possible
Persistent labels
Industry standard that
enables a wide ecosystem
User awareness through
visual labels
Encryption with RMS
DLP & compliance
actions
Audit trails to track data
Orchestrate
SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users
can complement it
Associate actions such as visual
markings and protection
Due Diligence Documentation
Due Diligence
Category Documentation Task Owner Status
Business Plan, Corporate Structure, Financing
Business plan Current five-year business plan
Prior business plan
Corporate
organization
Articles of incorporation
Bylaws
Recent changes in corporate structure
Parent, subsidiaries, and affiliates
Shareholders’ agreements
Minutes from board meetings
Protect your data in / with the Cloud
Protect your data in / with the Cloud
Protect your data in / with the Cloud
Reclassification
You can override a
classification and
optionally be required
to provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
FINANCE
CONFIDENTIAL
Persistent labels that travel with the document
Labels are metadata written to
documents
Labels are in clear text so that other
systems such as a DLP engine can
read it
VIEW EDIT COPY PASTE
Email
attachment
FILE
Protect data needing protection by:
Encrypting data
Including authentication requirement and a
definition of use rights (permissions) to the data
Providing protection that is persistent and travels
with the data
Personal apps
Corporate apps
Share internally, with business partners, and customers
Bob
Jane
Internal user
*******
External user
*******
Any device/
any platform
Roadmap
Sue
File share
SharePoint
Email
LoB
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection
Premium P2
(includes P1 features)
Azure Information
Protection
Premium P1
Microsoft Cloud
App Security
Microsoft Advanced
Threat Analytics
Microsoft Intune
Azure Active Directory
Premium P2
(includes P1 features)
Azure Active
Directory
Premium P1
E3
E5
Azure Information Protection Premium P1/P2
Feature Azure Information
Protection Premium P1
(EMS E3)
Azure Information
Protection Premium P2
(EMS E5)
View labels and watermarks in Office Yes Yes
Manual labeling (user driven) Yes Yes
Apply content marking and RMS protection in Office Yes Yes
Automatic and recommended labeling Yes
Classification, labeling and protection with MCAS Yes
HYOK (Hold you own key – multi RMS server support) Yes
Apps and Data
SaaS
Microsoft protecting you
Malware Protection Center Cyber Hunting Teams Security Response Center
DeviceInfrastructure
CERTs
PaaS IaaS
Identity
INTELLIGENT SECURITY GRAPH
Cyber Defense
Operations Center
Digital Crimes Unit
Antivirus NetworkIndustry Partners
SECURE MODERN ENTERPRISE
Identity Apps
and Data
Infrastructure Devices
Identity
Embraces identity as primary security perimeter and protects
identity systems, admins, and credentials as top priorities
Apps and Data
Aligns security investments with business priorities including
identifying and securing communications, data, and applications
Infrastructure
Operates on modern platform and uses cloud intelligence to
detect and remediate both vulnerabilities and attacks
Devices
Accesses assets from trusted devices with hardware security
assurances, great user experience, and advanced threat detectionSecure Platform (secure by design)
Identity Pillar
Phase 2: Identity
Embraces identity as primary security perimeter and protects identity systems,
admins, and credentials as top priorities
Identity Pillar
Phase 2: Identity
Embraces identity as primary security perimeter and protects identity systems,
admins, and credentials as top priorities
Azure Active Directory (AAD)
Cloud App Security (CAS)
Windows 10
Windows Hello
Cybersecurity Architect
Windows 10
Credential Guard
Microsoft Passport
Managed ATA
Windows Server 2016
Shielded VMs
Code Integrity
Advanced Threat Analytics
(ATA)
• Enhanced Security
Administrative
Environment (ESAE)
• Active Directory Service
Hardening (ADSH)
• Windows Server 2016
Deployment
Windows 10 Deployment
Managed ATA
Apps and Data Pillar
Phase 2: Apps and Data
Aligns security investments to business priorities and applies both security
fundamentals and modern protections
Apps and Data Capability Mapping
Phase 2: Apps and Data
Aligns security investments to business priorities and applies both security
fundamentals and modern protections
Cloud App Security (CAS)
Cybersecurity Architect
• Windows 10 Deployment
Cybersecurity Architect
• Rights Management Services
• Azure RMS
• Office 365 Integration
• Office 365
• Data Leakage Protection
(DLP)
• Exchange Online Advanced
Threat Protection
• Conditional Access
• Intune
• Azure Active Directory
• Windows 10
• Enterprise Data Protection
• Cloud App Security (CAS)
• Conditional Access
2016
Michael Kirst-Neshva
mkn@ankbs.de
Thank You!
Kommen Sie an unseren Stand und
wir beraten Sie gerne über die weiteren Schritte

More Related Content

PDF
From classification to protection of your data, secure your business with azu...
Joris Faure
 
PDF
Microsoft Azure Rights Management
David J Rosenthal
 
PPTX
Azure information protection
Kjetil Lund-Paulsen
 
PPTX
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
 
PPTX
What's New in Microsoft Rights Management Services
UL Transaction Security
 
PDF
Azure Information Protection
Robert Crane
 
PDF
Microsoft 365 Security and Compliance
David J Rosenthal
 
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
From classification to protection of your data, secure your business with azu...
Joris Faure
 
Microsoft Azure Rights Management
David J Rosenthal
 
Azure information protection
Kjetil Lund-Paulsen
 
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
 
What's New in Microsoft Rights Management Services
UL Transaction Security
 
Azure Information Protection
Robert Crane
 
Microsoft 365 Security and Compliance
David J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 

What's hot (20)

PDF
Information protection & classification
David De Vos
 
PPTX
EMS Diagram Click Through Web
Eric Inch
 
PPTX
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
 
PDF
One name unify them all
BizTalk360
 
PPTX
Overview of Microsoft Enterprise Mobility & Security(EMS)
Radhakrishnan Govindan
 
PDF
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
PPTX
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
PDF
Secure Productive Enterprise from Microsoft and Atidan
David J Rosenthal
 
PDF
Azure information protection_datasheet_en-us
Kjetil Lund-Paulsen
 
PDF
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
 
PPTX
Enterprise Mobility+Security Overview
Chris Genazzio
 
PPTX
Cloud App Security
Alvaro Rezende
 
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 
PDF
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
PPTX
Mct summit 2021
Kushantha Gunawardana
 
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
David J Rosenthal
 
PDF
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
 
PDF
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
PPTX
cyber-security-reference-architecture
Birendra Negi ☁️
 
PPTX
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
Information protection & classification
David De Vos
 
EMS Diagram Click Through Web
Eric Inch
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
 
One name unify them all
BizTalk360
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Radhakrishnan Govindan
 
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
Secure Productive Enterprise from Microsoft and Atidan
David J Rosenthal
 
Azure information protection_datasheet_en-us
Kjetil Lund-Paulsen
 
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
 
Enterprise Mobility+Security Overview
Chris Genazzio
 
Cloud App Security
Alvaro Rezende
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
Mct summit 2021
Kushantha Gunawardana
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
David J Rosenthal
 
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
 
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
cyber-security-reference-architecture
Birendra Negi ☁️
 
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
Ad

Viewers also liked (9)

PDF
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
 
PDF
ALSO Roadshow - Azure and EMS presentation
Olav Tvedt
 
PPTX
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Edge Pereira
 
PPT
Data Leakage Presentation
Mike Spaulding
 
PDF
Demystifying Cloud Security
Ben Clay, CSP (IoT - Expert)
 
PDF
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
PDF
Aluminum and Glyphosate Can Synergistically Induce Pineal Gland Pathology: Co...
Jose Carvalho
 
PPTX
Data Loss Prevention
Reza Kopaee
 
PPTX
Securing Intellectual Property using Azure Rights Management Services
SPC Adriatics
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
 
ALSO Roadshow - Azure and EMS presentation
Olav Tvedt
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Edge Pereira
 
Data Leakage Presentation
Mike Spaulding
 
Demystifying Cloud Security
Ben Clay, CSP (IoT - Expert)
 
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Aluminum and Glyphosate Can Synergistically Induce Pineal Gland Pathology: Co...
Jose Carvalho
 
Data Loss Prevention
Reza Kopaee
 
Securing Intellectual Property using Azure Rights Management Services
SPC Adriatics
 
Ad

Similar to Protect your data in / with the Cloud (20)

PDF
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PPTX
ciso-workshop-3-identity-protection.pptx
elyas44
 
PPTX
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
PPTX
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
PPTX
Gestión de identidad
Plain Concepts
 
PDF
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
DIWUG
 
PPTX
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
 
PDF
Azure Security Overview
David J Rosenthal
 
PDF
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
PPTX
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
PDF
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
NCCOMMS
 
PPTX
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
PDF
Information protection and compliance
Dean Iacovelli
 
PPTX
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice Corporation
 
PDF
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
PDF
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 
PDF
Sikkerhed & Compliance i en cloud-verden
Microsoft
 
PDF
December 2019 Microsoft 365 Need to Know Webinar
Robert Crane
 
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
ciso-workshop-3-identity-protection.pptx
elyas44
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
Gestión de identidad
Plain Concepts
 
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
DIWUG
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
 
Azure Security Overview
David J Rosenthal
 
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
NCCOMMS
 
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
Information protection and compliance
Dean Iacovelli
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice Corporation
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 
Sikkerhed & Compliance i en cloud-verden
Microsoft
 
December 2019 Microsoft 365 Need to Know Webinar
Robert Crane
 

More from GWAVA (20)

PPTX
Slides: Archivierung und Security – Für weniger mehr bekommen
GWAVA
 
PDF
Open Horizons - GroupWise Monitor Deutsch
GWAVA
 
PDF
Open Horizons - Vibe: Run, Rabbit Run
GWAVA
 
PDF
Open Horizons - GroupWise Monitor English
GWAVA
 
PDF
Micro Focus iPrint
GWAVA
 
PDF
GroupWise Mobility Service 14.2.1
GWAVA
 
PDF
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
GWAVA
 
PDF
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
GWAVA
 
PDF
Open Enterprise Server - in a Windows world
GWAVA
 
PDF
ZENworks 2017 - Overview
GWAVA
 
PDF
Vibe Custom Development
GWAVA
 
PDF
Third Party Client Access to GroupWise
GWAVA
 
PDF
Gwava Cloud Offering
GWAVA
 
PDF
Let’s talk Retain – Requirements, Setup and Features
GWAVA
 
PDF
Exchange 2016 Cloud Migration
GWAVA
 
PDF
Large Scale GWAVA 7
GWAVA
 
PDF
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA
 
PDF
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
GWAVA
 
PDF
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
GWAVA
 
PDF
Mobile Auditing and Archiving with Retain
GWAVA
 
Slides: Archivierung und Security – Für weniger mehr bekommen
GWAVA
 
Open Horizons - GroupWise Monitor Deutsch
GWAVA
 
Open Horizons - Vibe: Run, Rabbit Run
GWAVA
 
Open Horizons - GroupWise Monitor English
GWAVA
 
Micro Focus iPrint
GWAVA
 
GroupWise Mobility Service 14.2.1
GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
GWAVA
 
Open Enterprise Server - in a Windows world
GWAVA
 
ZENworks 2017 - Overview
GWAVA
 
Vibe Custom Development
GWAVA
 
Third Party Client Access to GroupWise
GWAVA
 
Gwava Cloud Offering
GWAVA
 
Let’s talk Retain – Requirements, Setup and Features
GWAVA
 
Exchange 2016 Cloud Migration
GWAVA
 
Large Scale GWAVA 7
GWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
GWAVA
 
Mobile Auditing and Archiving with Retain
GWAVA
 

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
The Future of Artificial Intelligence (AI)
Mukul
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 

Protect your data in / with the Cloud

  • 1. Informations Rights Management ANK Business Services GmbH Michael Kirst-Neshva Microsoft MVP Office 365 GWAVACon EMEA 2016 Daten in der / mit der Cloud schützen
  • 2. 2016 Michael Kirst-Neshva ANK Business Services GmbH Senior IT-Infrastructure Architect Microsoft MVP Office 365 Communities: Office365 CommunityDeutschland (Lead) UserGroup Office365 Deutschland(Lead) Azure CommunityDeutschland(Mitglied) Verband „Voice ofInformation“ (Mitglied) http://www.voi.de Competence Center „SharePoint MajorLeague“ http://www.mlsharepoint.de http://www.ankbs.de E-Mail:[email protected] E-Mail:[email protected] Twitter: @ankbs  Blog | http://blog.ugoffice365.ms
  • 3. Is it possible to keep up? Employees Business partners Customers Is it possible to stay secure? Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 4. Is it possible to keep up? Employees Business partners Customers The Microsoft vision Secure and protect against new threats Maximum productivity experience Integrate with what you have Apps Devices Data Users
  • 5. User freedomSecure against new threats Do more with less Customers need Identity – driven security Productivity without compromise Comprehensive solutions Microsoft solution ENTERPRISE MOBILITY + SECURITY Identity-driven security Comprehensive solution Managed mobile productivity
  • 7. Identity as the core of enterprise mobility Single sign-onSelf-service Simple connection On-premises Other directories Windows Server Active Directory SaaSAzure Public cloud CloudMicrosoft Azure Active Directory
  • 8. 1000s of apps, 1 identity Provide one persona to the workforce for SSO to 1000s of cloud and on-premises apps Manage access at scale Manage identities and access at scale in the cloud and on-premises Cloud-powered protection Ensure user and admin accountability with better security and governance Enable business without borders Stay productive with universal access to every app and collaboration capability Azure Active Directory. Identity at the core of your business
  • 9. Secure remote access to on- premises apps Single sign -on to mobile apps Support for lift-and- shift of traditional apps to the cloud Provide one persona to the modern workforce for SSO to 1000s of cloud and on- premises applications Single sign-on to SaaS apps 1000s of apps, 1 identity "Azure AD Premium makes life simpler for the business and for employees. It gives them access to enterprise applications from any device with a single sign-on that is secure and reliable. That is fundamental in increasing the adoption of cloud technology. Bristow is also using Application Proxy, and Azure AD Connect” - Kapil Mehta Productivity & Directory Services Manager, Bristow Group Inc.
  • 10. Conditions Allow access or Block access Actions Enforce MFA per user/per app User, App sensitivity Device state LocationUser NOTIFICATIONS, ANALYSIS, REMEDIATION, RISK-BASED POLICIES CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT MFA IDENTITY PROTECTION Risk CLOUD-POWERED PROTECTION
  • 11. CLOUD-POWERED PROTECTION Identity Protection at its best Risk severity calculation Remediation recommendations Risk-based conditional access automatically protects against suspicious logins and compromised credentials Gain insights from a consolidated view of machine learning based threat detection Leaked credentials Infected devices Configuration vulnerabilities Risk- based policiesMFA Challenge Risky Logins Block attacks Change bad credentials Machine-Learning Engine Brute force attacks Suspicious sign- in activities
  • 12. Collaboration in a borderless world Users want collaboration and productivity, you want protection and control Data Apps DevicesUsers Access everything from everywhere Share and store data across boundaries Protect sensitive data Employees Business partners Customers
  • 13. Intune Azure Information Protection Protect your users, devices, and apps Detect problems early with visibility and threat analytics Protect your data, everywhere Extend enterprise-grade security to your cloud and SaaS apps Manage identity with hybrid integration to protect application access from identity attacks Advanced Threat Analytics Cloud App Security Azure Active Directory Identity Protection
  • 15. Challenges with the complex environment Employees Business partners Customers Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 16. The problem is ubiquitous Intellectual Property theft has increased 56% rise data theft Accidental or malicious breaches due to lack of internal controls 88% of organizations are Losing control of data 80% of employees admit to use non-approved SaaS app 91% of breaches could have been avoided Organizations no longer confident in their ability to detect and prevent threats Saving files to non-approved cloud storage apps is common Sources:
  • 17. 2016 Unregulated, unknown Managed mobile environment How much control do you have? On-premises Perimeter protection Identity, device management protection Hybrid data = new normal It is harder to protect
  • 19. Azure Information Protection The evolution of Azure RMS DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle
  • 20. Our solution: Data Lifecycle Classification and Protection At data creation Manual and automatic - as much as possible Persistent labels Industry standard that enables a wide ecosystem User awareness through visual labels Encryption with RMS DLP & compliance actions Audit trails to track data Orchestrate
  • 21. SECRET CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules PERSONAL Classify data based on sensitivity Start with the data that is most sensitive IT can set automatic rules; users can complement it Associate actions such as visual markings and protection
  • 22. Due Diligence Documentation Due Diligence Category Documentation Task Owner Status Business Plan, Corporate Structure, Financing Business plan Current five-year business plan Prior business plan Corporate organization Articles of incorporation Bylaws Recent changes in corporate structure Parent, subsidiaries, and affiliates Shareholders’ agreements Minutes from board meetings
  • 26. Reclassification You can override a classification and optionally be required to provide a justification Automatic Policies can be set by IT Admins for automatically applying classification and protection to data Recommended Based on the content you’re working on, you can be prompted with suggested classification User set Users can choose to apply a sensitivity label to the email or file they are working on with a single click
  • 27. FINANCE CONFIDENTIAL Persistent labels that travel with the document Labels are metadata written to documents Labels are in clear text so that other systems such as a DLP engine can read it
  • 28. VIEW EDIT COPY PASTE Email attachment FILE Protect data needing protection by: Encrypting data Including authentication requirement and a definition of use rights (permissions) to the data Providing protection that is persistent and travels with the data Personal apps Corporate apps
  • 29. Share internally, with business partners, and customers Bob Jane Internal user ******* External user ******* Any device/ any platform Roadmap Sue File share SharePoint Email LoB
  • 30. Information protection Identity-driven security Managed mobile productivity Identity and access management Azure Information Protection Premium P2 (includes P1 features) Azure Information Protection Premium P1 Microsoft Cloud App Security Microsoft Advanced Threat Analytics Microsoft Intune Azure Active Directory Premium P2 (includes P1 features) Azure Active Directory Premium P1 E3 E5
  • 31. Azure Information Protection Premium P1/P2 Feature Azure Information Protection Premium P1 (EMS E3) Azure Information Protection Premium P2 (EMS E5) View labels and watermarks in Office Yes Yes Manual labeling (user driven) Yes Yes Apply content marking and RMS protection in Office Yes Yes Automatic and recommended labeling Yes Classification, labeling and protection with MCAS Yes HYOK (Hold you own key – multi RMS server support) Yes
  • 32. Apps and Data SaaS Microsoft protecting you Malware Protection Center Cyber Hunting Teams Security Response Center DeviceInfrastructure CERTs PaaS IaaS Identity INTELLIGENT SECURITY GRAPH Cyber Defense Operations Center Digital Crimes Unit Antivirus NetworkIndustry Partners
  • 33. SECURE MODERN ENTERPRISE Identity Apps and Data Infrastructure Devices Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities Apps and Data Aligns security investments with business priorities including identifying and securing communications, data, and applications Infrastructure Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks Devices Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detectionSecure Platform (secure by design)
  • 34. Identity Pillar Phase 2: Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities
  • 35. Identity Pillar Phase 2: Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities Azure Active Directory (AAD) Cloud App Security (CAS) Windows 10 Windows Hello Cybersecurity Architect Windows 10 Credential Guard Microsoft Passport Managed ATA Windows Server 2016 Shielded VMs Code Integrity Advanced Threat Analytics (ATA) • Enhanced Security Administrative Environment (ESAE) • Active Directory Service Hardening (ADSH) • Windows Server 2016 Deployment Windows 10 Deployment Managed ATA
  • 36. Apps and Data Pillar Phase 2: Apps and Data Aligns security investments to business priorities and applies both security fundamentals and modern protections
  • 37. Apps and Data Capability Mapping Phase 2: Apps and Data Aligns security investments to business priorities and applies both security fundamentals and modern protections Cloud App Security (CAS) Cybersecurity Architect • Windows 10 Deployment Cybersecurity Architect • Rights Management Services • Azure RMS • Office 365 Integration • Office 365 • Data Leakage Protection (DLP) • Exchange Online Advanced Threat Protection • Conditional Access • Intune • Azure Active Directory • Windows 10 • Enterprise Data Protection • Cloud App Security (CAS) • Conditional Access
  • 38. 2016 Michael Kirst-Neshva [email protected] Thank You! Kommen Sie an unseren Stand und wir beraten Sie gerne über die weiteren Schritte