Microsoft 365 E5 Learning Module Deck

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft 365 E5 Learning Module Deck • What is: • “The Tenant” • Cloud Strategy. M365, Dynamics 365, Azure, 3rd Party • High Level - What is Microsoft 365 • Why: • Business alignment/Priority Agenda • Budget – Licensing and redundant spend • How: • Partner Ecosystem • Fast Track • Premier • Not on the agenda: • Technical Architecture What is the tenant, really? THE WORLD BEFORE MOBILITY & CLOUD users devices apps data On-premises / Private cloud CLOUD APPS & SAAS SERVICES On-premises / Private cloud MOBILE AND PERSONAL DEVICES On-premises / Private cloud ORGANIZATION & SOCIAL IDENTITIES On-premises / Private cloud On-premises / Private cloud On-premises / Private cloud MICROSOFT CLOUD Microsoft 365 Licensing and Roadmap Microsoft Internal & Partner Use Only A complete, intelligent, secure solution to empower employees Unlocks Built for Integrated Intelligent Creativity Teamwork for Simplicity Security Windows 10 Enterprise Enterprise Mobility & Security 14 Microsoft 365 E5 value Microsoft 365 E5 adds incremental value to Microsoft 365 E3 across these solution areas Microsoft 365 E5 Security Compliance Voice Analytics Extends identity and Brings together information Adds audio conferencing and Adds Power BI capabilities threat protection protection & advanced calling capabilities in the that help you realize to help stop damaging compliance capabilities to cloud to enable your teams significant business value attacks with integrated protect and govern data while from your data and automated security reducing risk Office 365 Enterprise Capabilities APPS SERVICES SECURITY ANALYTICS VOICE Cloud Productivity & Rich Communication and Advanced Enterprise Complete Cloud Insights for Everyone Mobility Collaboration Protection Communication Office Pro Plus: Exchange : Advanced Threat Protection: Power BI Pro: Audio Conferencing: Business-class email & Calendar Zero-day threat and malware Live business analytics and Worldwide dial-in for your Office apps on up to 5 PCs & protection visualization online meetings Macs OneDrive: Cloud Storage and file sharing Advanced Security Phone System: Mobile Office Apps: Management: Business phone system in the SharePoint: Office Apps for Tablet & Enhanced visibility and control cloud Team sites & internal portals Smartphones Threat Intelligence: Skype for Business: Flow Actionable insights to global Online Meetings, IM, video chat Power Apps attack threats Microsoft Teams: Advanced Compliance: Stream Chat-based Collaboration Advanced eDiscovery, Advanced Yammer: Data Governance and Customer Private social networking Lockbox bundled together to provide an intelligent solution to Office 365 E3 meet compliance needs Office 365 E5 Microsoft Internal & Partner Use Only 16 Office 365 Government Roadmap Enterprise Mobility & Security Capabilities Identity and access management Identity Driven Security Managed Mobile Productivity Information Protection Azure Active Directory Advanced Threat Analytics Microsoft Azure Information Premium P1 Intune Protection Premium P1 E3 Single sign-on to cloud and on- Identify suspicious activities & Mobile device and app Encryption for all files and storage premises applications. Basic advanced attacks on premises. management to protect corporate locations. Cloud based file conditional access security Updated on an annual cadence. apps and data on any device. tracking EMS EMS Existing Azure RMS capabilities E5 EMS EMS Azure Active Directory Azure Advanced Threat Microsoft Azure Information Premium P2 Protection Cloud App Security Protection Premium P2 Advanced risk based identity Identify suspicious activities & Bring enterprise-grade visibility, control, Intelligent classification, & protection with alerts, analysis, & advanced attacks on premises. and protection to your cloud applications encryption for files shared inside & and cloud data. remediation. Integrated with our Intelligent outside your organization Security Graph. Updates on a cloud Secure Islands acquisition cadence. Integration with Microsoft Threat Protection. Microsoft Internal & Partner Use Only 18 What is the difference Features P1 Directory Objects1 No Object Limit User/Group Management (add/update/delete). User-based provisioning, Device registration Available between Azure AD P1 & P2? Single Sign-On (SSO). Free, basic tiers + self-service app integration templates5 No Limit B2B Collaboration7 Available Self-Service Password Change for cloud users Available Only in Azure AD P2 Connect (Sync engine that extends on-premises directories to Azure Active Directory) Available Security/Usage Reports Advanced Reports Identity Protection Group-based access management/provisioning Available Self-Service Password Reset for cloud users Available • Detecting vulnerabilities and risky accounts: Company Branding (Logon Pages/Access Panel customization) Available • Providing custom recommendations to improve overall security Application Proxy Available posture by highlighting vulnerabilities SLA Available • Calculating sign-in risk levels Premium Features • Calculating user risk levels Advanced group features8 Available • Investigating risk events: Self-Service Password Reset/Change/Unlock with on-premises writeback Available Device objects 2-way sync between on-premises directories and Azure AD (Device write- • Sending notifications for risk events Available • Investigating risk events using relevant and contextual information back) • Providing basic workflows to track investigations Multi-Factor Authentication (Cloud and On-premises (MFA Server)) Available • Providing easy access to remediation actions such as password reset Microsoft Identity Manager user CAL4 Available Cloud App Discovery9 Available • Risk-based conditional access policies: Connect Health6 Available • Policy to mitigate risky sign-ins by blocking sign-ins or requiring multi-factor authentication challenges Automatic password rollover for group accounts Available • Policy to block or secure risky user accounts Conditional Access based on group and location Available • Policy to require users to register for multi-factor authentication Conditional Access based on device state (Allow access from managed devices) Available 3rd party identity governance partners integration Available Advanced Identity Governance Terms of Use Available SharePoint Limited Access Available • Privileged Identity Management (PIM) • Access Reviews OneDrive for Business Limited Access Available 3rd party MFA partner integration Preview Available Microsoft Cloud App Security integration Available What is the difference Features P1 Azure Information Protection content consumption by using work or school Available between AIP P1 & P2? accounts from AIP policy-aware apps and services Protection for Microsoft Exchange Online, Microsoft SharePoint Online, and Available Microsoft OneDrive for Business content Only in AIP P2 Bring Your Own Key (BYOK) for customer-managed key provisioning life cycle2 Available Custom templates, including departmental templates Available Protection for on-premises Exchange and SharePoint content via Rights Available • Configure conditions for automatic and Management connector recommended classification Azure Information Protection software developer kit for protection for all Available • Azure Information Protection scanner for platforms including Windows, Windows Mobile, iOS, Mac OSX, and Android Protection for non-Microsoft Office file formats, including PTXT, PJPG, and PFILE Available automated classification, labeling, and (generic protection) protection of supported on-premises files Azure Information Protection content creation by using work or school accounts Available • Hold Your Own Key (HYOK) that spans Office 365 Message Encryption Available Azure Information Protection and Active Administrative control3 Available Directory (AD) Rights Management Manual, default, and mandatory document classification Available for highly regulated scenarios Azure Information Protection scanner for content discovery of on-premises files Available matching any of the sensitive information types Azure Information Protection scanner to apply a label to all files in an on-premises Available file server or repository Rights Management connector with on-premises Windows Server file shares by Available using the File Classification Infrastructure (FCI) connector Document tracking and revocation Available Windows 10 Enterprise Capabilities The most trusted platform More productive More personal The most versatile devices Enterprise Data Protection Azure Active Directory Join User Experience Virtualization (UX-V) Windows 10 for Industry Devices Prevent accidental leaks by separating Streamline IT process by harnessing the OS and app settings synchronized across Turn any inexpensive, off-the-shelf personal and business data power of the cloud Windows instances device, into an embedded, handheld, or E3 kiosk experience Windows Hello for Business MDM enablement Granular UX Control Enterprise grade biometric and Manage all of your devices with the Enterprise control over user experience companion device login simplicity of MDM E5 Credential Guard Windows Store for Business, Protects user access tokens in a Private Catalog hardware-isolated container Create a curated store experience for employee self-service AppLocker Block unwanted and inappropriate Application Virtualization (App-V) apps from running Simplify app delivery and management Device Guard Cortana Management Windows Windows 10Enterprise Device locked down to only run fully Create, personalize, and manage Cortana trusted apps profiles through
Recommended publications
  • How to Elevate Your Cloud Solutions Practice
    How to elevate your cloud solutions practice AZURE MANAGED SERVICES PLAYBOOK FOR CSP PARTNERS 1 © 2016 MICROSOFT ALL RIGHTS RESERVED Azure managed services playbook for CSP partners Introduction 3 How to build an MSP practice 37 Who is an Azure Managed Services Provider? 4 Business planning 38 What is a cloud MSP? 5 Offer design 44 Why cloud managed services? 7 Go to market 51 Azure Managed Services opportunities 9 Cost of setting up an MSP practice 55 MSP profitability 10 Helpful links for Azure MSPs 56 How do MSPs make money? 11 MSP service offerings 12 Managed Services – Under the hood 13 Breaking down the functions of an MSP 14 Cloud assessment and planning 15 Cloud migration/deployments 17 Infrastructure operations management 19 Configuration management 20 Automation/Dev-Ops 21 Backup and Disaster Recovery 22 Identity and access management 23 Cloud monitoring services 24 Cost optimization 26 Security 28 Support 30 Azure Managed Services Spectrum 32 2 Introduction Cloud is disrupting traditional IT faster than we think. Today, with 80%1 business The playbook not only answers the “Why managed services?” question, it also deploying or fully embracing the cloud, we have ‘crossed the chasm’ and are addresses the “What is it?” and the “How to build” type of questions regarding in the ‘early majority’ stage of the adoption curve. All of this means more managed services practices. Over the course of this e-book, you will find answers opportunities for cloud solution providers. IDC discusses this opportunity to the following questions: extensively in “The Booming Cloud” report. 1.
    [Show full text]
  • HP Atalla Information Protection and Control: Automatically Classify And
    Family data sheet HP Atalla Information Protection and Control Automatically classify and protect unstructured data persistently June 2014 Family data sheet | HP Atalla Information Protection and Control Figure 1. Embed protection in the data at the point of creation SaaS applications Classification Data repositories and Intercept File shares Classify Protection Protect Users generated mechanism In an era of increasing cyber threats and targeted attacks, organizations must now assume that their network has been breached. How, then, can organizations protect sensitive unstructured data like documents and spreadsheets from The second-highest return on improper access? HP Atalla Information Protection and Control investment (ROI) in security (IPC) solves this complex issue by giving organizations the investments comes from the means to bring protection to the data itself. HP Atalla IPC widespread and effective applies protection at the point information is created and application of encryption, makes that protection persistent, so it follows the information policy, and access controls wherever it goes. This secures sensitive data no matter where on data. it actually resides. The challenge of protecting unstructured information Analysts estimate that by 2015, nearly 90 percent of organizational data will be unstructured.1 Sensitive organizational data in spreadsheets, documents, presentations, and other files resides in multiple locations—for example, employee laptops/mobile devices, file servers, and storage arrays (NAS and SAN). In today’s de-perimiterized environment, collaboration is crucial—but sharing data necessitates exposing it. Traditional data protection solutions inhibit productivity by applying protection unnecessarily, and items classified as “sensitive” easily lose this classification if it’s not saved in a predefined format or network location, or if modified out of original context.
    [Show full text]
  • A Cruiser's View of Bequia
    C A R I B B E A N On-line C MPASS NOVEMBER 20088 NO.NO. 158 The Caribbean’s Monthly Look at Sea & Shore A CRUISER'S VIEW OF BEQUIA See story on page 28 WILFRED DEDERER NOVEMBER 2008 CARIBBEAN COMPASS PAGE 2 a NOVEMBER 2008 CARIBBEAN COMPASS PAGE 3 CALENDAR NOVEMBER 1 All Saints’ Day. Public holiday in French West Indies 1 Independence Day. Public holiday in Antigua & Barbuda 1 D Hamilton Jackson Day. Public holiday in USVI 1 - 2 Women’s Caribbean One Design Keelboat Championship, St. Maarten. [email protected] The Caribbean’s Monthly Look at Sea & Shore 2 19th West Marine Caribbean 1500 sets sail from Hampton, VA to Tortola. www.carib1500.com www.caribbeancompass.com 3 Independence Day. Public holiday in Dominica 4 Community Service Day. Public holiday in Dominica NOVEMBER 2008 • NUMBER 158 6 - 11 Le Triangle Emeraude rally, Guadeloupe to Dominica. [email protected] 7 - 8 BVI Schools Regatta, Royal British Virgin Islands Yacht Club (RBVIYC), tel (284) 494-3286, [email protected], www.rbviyc.net 7 – 9 Heineken Regatta Curaçao. www.heinekenregattacuracao.com 7 – 9 BMW Invitational J/24 Regatta, St. Lucia. [email protected] Repo Man 8 Reclaiming a stolen yacht ..... 32 St. Maarten Optimist Open Championship. [email protected] 8 - 10 Triskell Cup Regatta, Guadeloupe. http://triskellcup.com TERI JONES 10 - 15 Golden Rock Regatta, St Maarten to Saba. CONNELLY-LYNN [email protected] 11 Veterans’ Day. Public holiday in Puerto Rico and USVI 11 Armistice Day. Public holiday in French West Indies and BVI 13 FULL MOON 13 - 21 Heineken Aruba Catamaran Regatta.
    [Show full text]
  • Microsoft Advanced Threat Analytics Brings the Behavioral Analytics Concept to IT and the Organization’S Users
    Welcome Improved Security and Productivity using Office 365 & Microsoft Cloud What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: ▪ Microsoft Certified Partner…since 1980’s • Silver – Learning Solutions • Train 6,000 students/year • Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. • Silver – Infrastructure ▪ 1,000’s of Microsoft implementations • Small Business to Enterprise • Non-profit • Education System Source & Microsoft: Microsoft Competencies • Server Platform • Hosting • Windows Server 2012 & 2016 • Exchange Server, SQL Server, Microsoft Server • Management and Virtualization • Microsoft Cloud Solutions, Microsoft • Devices & Deployment Private Cloud, Configuration • Windows 10, Office Manager, Windows Server • Small Business • Messaging • Office 365, Windows 10 • Exchange Server, Exchange Online, Exchange Online Protection • Mid-Market Solutions Provider • Microsoft Cloud Solutions, Office 365, Windows Server 2012 & 2016, Windows 10 Agenda System Source – Dave Ferg What is a secure environment? Identity and authentication security with Office 365 Email security features with Office 365 Microsoft - Steve Deming System Source Learning Center – Jack Underwood What is security? What is a secure environment? Organizations have varying degrees of security requirements. Regulations for financial, health, government, etc. Threats are evolving daily Viruses and malware Vulnerable software, data breaches, lost devices Hacked identities Ransomware, and more… What is a secure environment? Threats are attacking various targets. Data in transit Email and storage Servers and end devices Some threats are “innocent” Sending confidential information outside the organization Having data on unsecure devices – Unencrypted drives, removable media, unmanaged devices, etc.
    [Show full text]
  • Security Threats Worry You?
    WELCOME! Office 365 – What Security Threats Worry You? What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! Collect ‘Learn Today’ Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: System Source & Microsoft: Microsoft Certified Partner…since 1980’s Silver – Learning Solutions Train 6,000 students/year Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. Silver – Infrastructure 1,000’s of Microsoft implementations Small Business to Enterprise Non-profit Education What Security Threats Worry You? Stephen Deming Microsoft Partner Technology Strategist Challenges 2 billion records compromised in the last year 140+ days between infiltration and detection 87% of senior managers admit using personal accounts for work 45% of organizations lack data governance which leaves them open to litigation and data security risks Ever-evolving industry standards across geographies Attack kill chain Attack kill chain Attack kill chain and ATA Our Commitment to Trust Privacy Customer is the owner of their data. We do not mine customer data for advertising purposes. Privacy controls enable you to configure your company privacy policies. Microsoft advocates for data privacy on behalf of customers. Microsoft safeguards customer data with strong contractual commitments.
    [Show full text]
  • 2016 Microsoft Licensing Agreement & Products NEWSLETTER
    1 Issue 11 2016 Microsoft Licensing Agreement & Products NEWSLETTER Contents Azure only SCE Minimum is Changing 2 u Azure Cool Blob Storage Promo - NEW 7 u Enterprise Cloud Suite Rename to Secure Productive Microsoft R Server Monthly VL Subscription Offerings - NEW u u 2 Enterprise E3 7 Project Pro for Office 365 and Project Online Plans Replaced Important Changes For Customers Buying Enterprise u by New Plans 2 Software and Cloud Services in British Pound. Effective 1st 7 u January 2017 - PLEASE READ IF THIS AFFECTS YOU Project Online Professional and Premium Cloud Add-ons 3 u Select Plus is Retiring for Existing Customers - PLEASE READ Promotion Available for Project Standard Customers u IF THIS AFFECTS YOU 8 Windows 10, EMS and ECS Name Changes and Licensing 3 u Microsoft Products and Services Agreement (MPSA) inc Multi Offering u Year & Short Term Subscriptions 8 Office 365 E1 Limitations and How It May Affect You -NEW 4 u Enterprise Agreement - Enterprise Cloud Suite and Server u Cloud Suite 9 Azure and Office 365 Now Available from United Kingdom 4 u Data Centres Changes to the Microsoft Enterprise Agreement (EA) 9 u Azure EMS Suite Changes 5 u MPSA Portal Changing to Business Centre Portal 10 u Secure Productive Enterprise Launch Promotion 5 u Visual Studio (aka MSDN) Management Portal - u RELEVANT NOW 11 Introducing the New Microsoft Dynamics 365 - NEW 5 u Increase your ROI with adding Insight Direct as your Partner u of Record (POR) 11 SQL Server 2016 6 u Software Assurance Activation, Deployment and Managing - u BOOK YOUR LIVE SESSION 12 Windows Server and Systems Centre 2016 Licensing Changes 6 u Introducing Comms-Care as Insight's Partner for Planning u Service Day Delivery 13 E5 and Skype for Business Availability Update 6 u Product Licensing and Use Rights Search 13 u Insight, your Trusted Advisor Insight’s vision is to be the Trusted Advisor to our clients, helping them enhance their business performance through innovative technology solutions.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016
    G00277564 Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016 Analyst(s): Brian Reed, Neil Wynne Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection. Strategic Planning Assumptions By 2018, 90% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2018, less than 10% of organizations with integrated DLP will have a well-defined data security governance program in place, up from near zero today. Market Definition/Description Gartner defines the data loss prevention (DLP) market as those technologies that, as a core function, perform both content inspection and contextual analysis of data at rest on-premises or in cloud applications and cloud storage, in motion over the network, or in use on a managed endpoint device. DLP solutions can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. Data loss prevention technologies can be divided into two categories: ■ Enterprise DLP solutions incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Solutions are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery. Leading characteristics of enterprise DLP solutions include a centralized management console, support for advanced policy definition and event management workflow. Enterprise DLP functions as a comprehensive solution to discover sensitive data within an organization and mitigate the risk of its loss at the endpoints, in storage and over the network.
    [Show full text]
  • Secure Collaboration Within Organizations, B2B and B2C
    Secure Collaboration within Organizations, B2B and B2C [email protected] [email protected] • Definition of the term “Collaboration”: Working with others to do a task and to achieve shared goals. • Major Business Requirements Structured filing Simple and secure identity and access management processes within and across companies, user self-services Broad support of devices and applications Flexibility regarding business processes and team structures Data security and classification Traceability and auditability of any IAM and business activities Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records • Microsoft Azure, Office 365, SharePoint Online Global cloud solution managing tenants and trusts Single user identity for authentication and authorization to all resources Broad support of devices and applications • Rights Management Services Leverage access control beyond applications (DLP) Data classification Document tracking • Digital Signature Services Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records Microsoft Azure, Office 365, SharePoint Online Rights Management Services Short introduction of Microsoft RMS and Secure Islands IQ Protector Digital Signature Services • About RMS Traditional security controls (e.g. ACLs, firewalls, etc.) have limited effectiveness to protect company data while still empowering users to work efficiently (i.e. usage of many platforms, applications, mobile workplaces, etc.) RMS protects the sensitive information independent of any other security measures.
    [Show full text]
  • 7 Best Practices for Data Security in Office 365 and Beyond
    WHITEPAPER 7 Best Practices for Data Security in Office 365 and Beyond How to achieve unified visibility and control for unstructured data stored on-premises and the cloud. VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 1 Contents Data Security in a Complex, Hybrid World 3 The Rise of “Dark” Data 4 Data Security Is Not Optional 5 Cloud-Centric Security Is Not Enough 6 Enhancing Cloud Security with Varonis 9 1. Unified Control for On-Premises and Office 365 Data 10 2. 360o Permissions Visibility & Management 11 3. Sensitive Data Discovery 12 4. Comprehensive Auditing & Monitoring 13 5. Advanced Threat Detection (UEBA) 14 6. Risk Remediation & Least Privilege Automation 15 7. Data Owner-Driven Access Governance 16 Get a Personalized Office 365 Risk Assessment 17 VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 2 Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments. Many enterprises are moving pieces of their corporate email and file sharing infrastructure to the cloud where Microsoft Office 365 is the clear market leader. Microsoft Oce 365 Salesforce.com Box Amazon Web Services G Suite 2014 2015 2016 2017 ▲ Source: Okta Businesses @ Work, January 2017 Using Office 365 alongside on-premises data stores introduces data security and governance challenges that must be addressed in the era of mega breaches and strict privacy regulations. Security and risk leaders should implement consistent and sustainable data security controls and best practices across their on-premises and cloud repositories.
    [Show full text]
  • Microsoft's Expanded Horizons in Security
    Microsoft's Expanded Horizons in Security Securing Azure remains front and center, but hybrid and multicloud security is the way forward Licensed Reprint Publication Date: 02 Apr 2019 | Product code: INT003-000345 Rik Turner Information Classification: General Microsoft's Expanded Horizons in Security Summary Catalyst Microsoft's development of its security offerings has, until now, been designed to reinforce the appeal, first of its operating system, database, and office productivity software and more recently of its cloud services. While this remains the core driver of its activities in security, there are signs of a broadening of its approach of late as it moves to support heterogeneous environments and the environments of competing cloud service providers (CSPs). Most significantly, in the run-up to the recent RSA Conference on cybersecurity, held in San Francisco March 4‒7, 2019, the company launched Azure Sentinel, a security incident and event management (SIEM) platform it is offering as a cloud-based service, and a managed threat-hunting service called Microsoft Threat Experts. The SIEM-as-a-service (SIEMaaS) offering in particular takes Microsoft into the world of heterogeneous security management. Ovum view Microsoft has already expanded successfully from being a vendor of software licenses to providing the whole spectrum of cloud services, which include infrastructure- and platform-as-a-service (IaaS and PaaS) with its Azure business and software-as-a-service (SaaS) with its Microsoft 365 portfolio. In making that journey, the vendor has also recognized that security is an integral part of being a CSP, and it has invested accordingly in both internal development and acquisitions.
    [Show full text]
  • Gartner Magic Quadrant for Enterprise Data Loss Prevention 2017
    08/02/2018 Gartner Reprint (https://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for Enterprise Data Loss Prevention Published: 16 February 2017 ID: G00300911 Analyst(s): Brian Reed, Deborah Kish Summary Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities. Strategic Planning Assumptions By 2022, 60% of organizations will involve line-of-business owners when crafting their data loss prevention (DLP) strategy, up from 15% today. By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2022, a majority of DLP market revenue will be driven by integrated DLP products, as opposed to enterprise DLP systems. Market Definition/Description Gartner defines the DLP market as those technologies that, as a core function, provide remediation for data loss based on both content inspection and contextual analysis of data: At rest on-premises, or in cloud applications and cloud storage In motion over the network In use on a managed endpoint device. DLP products can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. DLP technologies can be divided into two separate categories: Enterprise DLP products incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Products are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery.
    [Show full text]