Secure Collaboration Within Organizations, B2B and B2C

Total Page:16

File Type:pdf, Size:1020Kb

Secure Collaboration Within Organizations, B2B and B2C Secure Collaboration within Organizations, B2B and B2C [email protected] [email protected] • Definition of the term “Collaboration”: Working with others to do a task and to achieve shared goals. • Major Business Requirements Structured filing Simple and secure identity and access management processes within and across companies, user self-services Broad support of devices and applications Flexibility regarding business processes and team structures Data security and classification Traceability and auditability of any IAM and business activities Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records • Microsoft Azure, Office 365, SharePoint Online Global cloud solution managing tenants and trusts Single user identity for authentication and authorization to all resources Broad support of devices and applications • Rights Management Services Leverage access control beyond applications (DLP) Data classification Document tracking • Digital Signature Services Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records Microsoft Azure, Office 365, SharePoint Online Rights Management Services Short introduction of Microsoft RMS and Secure Islands IQ Protector Digital Signature Services • About RMS Traditional security controls (e.g. ACLs, firewalls, etc.) have limited effectiveness to protect company data while still empowering users to work efficiently (i.e. usage of many platforms, applications, mobile workplaces, etc.) RMS protects the sensitive information independent of any other security measures. It uses encryption, identity, and authorization policies to help secure the data. • Available on-prem (AD RMS) and in the cloud (Azure RMS) • Major features Security is intrinsically tied to data, no dependency to other security measures Dynamic management of users and roles (joiners / movers / leavers / deputies / auditors / legal investigators) RMS Protected Data Data Data Owner / Author RMS Ad-hoc Template User/Group RMS Metadata IQP Classification IQP Metadata • Major features Data protection and classification Rights enforcement (do not forward, read only, do not print, etc.) Document tracking and document revocation Application RMS Protected Data Acquire Data Data RMS License RMS Server Log / Report Owner / Author RMS Ad-hoc Auth Use Template User/Group RMS Metadata IQP Classification IQP Metadata • Broad support of applications and file-types Microsoft Office on Windows and Mac (Office 2016 and beyond for Mac ) RMS SDK available for Windows, Linux and iOS and Android More and more RMS enlightened applications available Broad support of file-types (Office, PDF, CVS, TXT, JPG, etc., almost any file-types) • Typical Use-cases Leverage access control beyond applications (DLP) Separation of business data from IT administrators Separation of individual organizational units (e.g. human resources or finance department, research and development, etc.) Secure collaboration within an organization or across organizational boundaries Document tracking (and document revocation) • Additional use-cases with Secure Islands IQP Policy-based file- and folder encryption Automated and policy-based encryption / classification of data, e- mails, web up- and downloads User-awareness (pop-up windows) based on pattern matching (content scanning) Comprehensive Microsoft Exchange Journaling support for compliance and audit reasons • Use-case – example B2B Sync Microsoft Azure Tenant (Org 1) Tenant (Org 2) User A Group G User X Group W Azure Azure Active Directory Active Directory Sharepoint Online Sharepoint Online Azure RMS (Office 365) (Office 365) on-prem on-prem Directory Directory Federation Service Federation Service Synchronization Synchronization (ADFS) (ADFS) (AADConnect) (AADConnect) Data Data User X Group W User A Group G Fileshare, Exchange, USB Data User A Active Directory User X User Y Active Directory Stick, etc. • Use-case – example - description 1. User X from Org 2 downloads a document from the SharePoint Online Server of Org 1 2. User X is entitled to access the SharePoint Online Server and to open the document 3. User X sends the document to User Y (File-share, e-mail, etc.) 4. User Y is not entitled to access the SharePoint Online Server. Since the RMS rights on the document are based on the permissions of the SharePoint access rights the User Y cannot open the document. Note: It is possible to apply other protection rules, especially wit RMS on prem and Secure Islands IQP RMS - Document tracking and reporting • Keyon - true-Xtended Reporting for RMS and IQP • Collects log-files and events from many sources, especially from Secure Islands IQP and Microsoft RMS Servers • Enriches log-files and events from further sources (e.g. AD, LDAP, DB’s, DLP Systems, other Applications) • Periodically copies enriched log-files and events into Splunk or Microsoft Reporting Services • Data collection and reports can be customized RMS - Document tracking and reporting • .. and how it looks like Live Demo Microsoft Azure, Office 365, SharePoint Online Rights Management Services Digital Signature Services Short introduction Digital Signature Services • Business Benefits • Evidence records for approval processes • Contracts and agreements • Integrity and authenticity of internal and external documents • Benefits for IT operations • Signed Office Macros • Signed code (.exe, Java) Digital Signature Services • Breakout-Session 14:15 Swiss Re - Moderne Signaturanwendungen für Business Workflows und IT-Sicherheit inkl. Live-Demo“ Microsoft Azure, Office 365, SharePoint Online Short introduction Rights Management Services Digital Signature Services Microsoft Office 2013 (new: Office 2016) Office Application Suite for PC and Mac Mobile Apps for iOS, Windows & Android Microsoft Azure Active Directory (AAD) Sharepoint Online Azure RMS Office 365 / Azure prerequisites Identity and access management Collaboration with Sharepoint Online RMS protection Demo B2C lookout, IDM challenges Office 365 / Azure prerequisites Office 365 subscription Subscription that includes Sharepoint Online: Starting with “Office 365 Business Essentials” (CHF 4.70/user/month). Also available in “Office 365 Business Premium” Included in all enterprise plans Basic personal sharing and collaboration options are also available with subscriptions that include OneDrive for Business but not Sharepoint. Identity and Access Management • Office 365 uses Azure Active Directory • Users of Office 365 must exist in Azure AD • Several options: Cloud identity: Create users online (small companies without Active Directory) Synchronized identity: Synchronize users from AD to Azure AD + password sync (Identity Lifecycle) Federated identity: Synchronize users from AD to AAD and federate with Azure AD (Identity Lifecycle + SSO) User synchronization and federation: Microsoft Azure Tenant (Org 1) • Re-use identities from the organization’s User A Group G Active Directory Azure Active Directory Sharepoint Online • Synchronize AD users and groups to Azure (Office 365) AD (AADConnect) on-prem • Enable SSO through Federation (ADFS) Directory Federation Service Synchronization (ADFS) (AADConnect) User A Group G User A Active Directory Result of user synchronization: The synchronized users appear in the Azure AD and are ready for use Single Sign On with Federation: External users: • Collaboration partners re- B2B Sync Microsoft Azure use their own Azure Tenant (Org 1) Tenant (Org 2) identities to access shared User A Group G User X Group W team sites in Sharepoint Azure Azure Active Directory Active Directory Online. Sharepoint Online Sharepoint Online (Office 365) (Office 365) • Users that are not yet in Azure can create a on-prem on-prem Directory Directory Federation Service Federation Service Synchronization Synchronization Microsoft account to access (ADFS) (ADFS) (AADConnect) shared team sites (AADConnect) User X Group W User A Group G User A User X Active Directory Active Directory Identity and Access Management • Identity management, provisioning and decommissioning Azure Active Directory B2B collaboration lets you enable access to your corporate applications from partner managed identities. You can create cross-company relationships by inviting and authorizing users from partner companies to access your resources B2B Sync Microsoft Azure Tenant (Org 1) Tenant (Org 2) User A Group G User X Group W Azure Azure Active Directory Active Directory Sharepoint Online Sharepoint Online (Office 365) (Office 365) • Create team and project based SharePoint sites • Edit documents together at the same time • Access files across devices • Share internally and externally • Versioning, archiving • IRM protection • External users do not require an Office 365 license to access files shared with them Other collaboration tools offered by Microsoft 365: • Lync instant messaging Supports federation with Lync in other organizations • Shared team/project mailboxes • Share your calendar with people outside of the organization • OneDrive for Business RMS protection • Sharepoint
Recommended publications
  • How to Elevate Your Cloud Solutions Practice
    How to elevate your cloud solutions practice AZURE MANAGED SERVICES PLAYBOOK FOR CSP PARTNERS 1 © 2016 MICROSOFT ALL RIGHTS RESERVED Azure managed services playbook for CSP partners Introduction 3 How to build an MSP practice 37 Who is an Azure Managed Services Provider? 4 Business planning 38 What is a cloud MSP? 5 Offer design 44 Why cloud managed services? 7 Go to market 51 Azure Managed Services opportunities 9 Cost of setting up an MSP practice 55 MSP profitability 10 Helpful links for Azure MSPs 56 How do MSPs make money? 11 MSP service offerings 12 Managed Services – Under the hood 13 Breaking down the functions of an MSP 14 Cloud assessment and planning 15 Cloud migration/deployments 17 Infrastructure operations management 19 Configuration management 20 Automation/Dev-Ops 21 Backup and Disaster Recovery 22 Identity and access management 23 Cloud monitoring services 24 Cost optimization 26 Security 28 Support 30 Azure Managed Services Spectrum 32 2 Introduction Cloud is disrupting traditional IT faster than we think. Today, with 80%1 business The playbook not only answers the “Why managed services?” question, it also deploying or fully embracing the cloud, we have ‘crossed the chasm’ and are addresses the “What is it?” and the “How to build” type of questions regarding in the ‘early majority’ stage of the adoption curve. All of this means more managed services practices. Over the course of this e-book, you will find answers opportunities for cloud solution providers. IDC discusses this opportunity to the following questions: extensively in “The Booming Cloud” report. 1.
    [Show full text]
  • HP Atalla Information Protection and Control: Automatically Classify And
    Family data sheet HP Atalla Information Protection and Control Automatically classify and protect unstructured data persistently June 2014 Family data sheet | HP Atalla Information Protection and Control Figure 1. Embed protection in the data at the point of creation SaaS applications Classification Data repositories and Intercept File shares Classify Protection Protect Users generated mechanism In an era of increasing cyber threats and targeted attacks, organizations must now assume that their network has been breached. How, then, can organizations protect sensitive unstructured data like documents and spreadsheets from The second-highest return on improper access? HP Atalla Information Protection and Control investment (ROI) in security (IPC) solves this complex issue by giving organizations the investments comes from the means to bring protection to the data itself. HP Atalla IPC widespread and effective applies protection at the point information is created and application of encryption, makes that protection persistent, so it follows the information policy, and access controls wherever it goes. This secures sensitive data no matter where on data. it actually resides. The challenge of protecting unstructured information Analysts estimate that by 2015, nearly 90 percent of organizational data will be unstructured.1 Sensitive organizational data in spreadsheets, documents, presentations, and other files resides in multiple locations—for example, employee laptops/mobile devices, file servers, and storage arrays (NAS and SAN). In today’s de-perimiterized environment, collaboration is crucial—but sharing data necessitates exposing it. Traditional data protection solutions inhibit productivity by applying protection unnecessarily, and items classified as “sensitive” easily lose this classification if it’s not saved in a predefined format or network location, or if modified out of original context.
    [Show full text]
  • A Cruiser's View of Bequia
    C A R I B B E A N On-line C MPASS NOVEMBER 20088 NO.NO. 158 The Caribbean’s Monthly Look at Sea & Shore A CRUISER'S VIEW OF BEQUIA See story on page 28 WILFRED DEDERER NOVEMBER 2008 CARIBBEAN COMPASS PAGE 2 a NOVEMBER 2008 CARIBBEAN COMPASS PAGE 3 CALENDAR NOVEMBER 1 All Saints’ Day. Public holiday in French West Indies 1 Independence Day. Public holiday in Antigua & Barbuda 1 D Hamilton Jackson Day. Public holiday in USVI 1 - 2 Women’s Caribbean One Design Keelboat Championship, St. Maarten. [email protected] The Caribbean’s Monthly Look at Sea & Shore 2 19th West Marine Caribbean 1500 sets sail from Hampton, VA to Tortola. www.carib1500.com www.caribbeancompass.com 3 Independence Day. Public holiday in Dominica 4 Community Service Day. Public holiday in Dominica NOVEMBER 2008 • NUMBER 158 6 - 11 Le Triangle Emeraude rally, Guadeloupe to Dominica. [email protected] 7 - 8 BVI Schools Regatta, Royal British Virgin Islands Yacht Club (RBVIYC), tel (284) 494-3286, [email protected], www.rbviyc.net 7 – 9 Heineken Regatta Curaçao. www.heinekenregattacuracao.com 7 – 9 BMW Invitational J/24 Regatta, St. Lucia. [email protected] Repo Man 8 Reclaiming a stolen yacht ..... 32 St. Maarten Optimist Open Championship. [email protected] 8 - 10 Triskell Cup Regatta, Guadeloupe. http://triskellcup.com TERI JONES 10 - 15 Golden Rock Regatta, St Maarten to Saba. CONNELLY-LYNN [email protected] 11 Veterans’ Day. Public holiday in Puerto Rico and USVI 11 Armistice Day. Public holiday in French West Indies and BVI 13 FULL MOON 13 - 21 Heineken Aruba Catamaran Regatta.
    [Show full text]
  • Microsoft Advanced Threat Analytics Brings the Behavioral Analytics Concept to IT and the Organization’S Users
    Welcome Improved Security and Productivity using Office 365 & Microsoft Cloud What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: ▪ Microsoft Certified Partner…since 1980’s • Silver – Learning Solutions • Train 6,000 students/year • Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. • Silver – Infrastructure ▪ 1,000’s of Microsoft implementations • Small Business to Enterprise • Non-profit • Education System Source & Microsoft: Microsoft Competencies • Server Platform • Hosting • Windows Server 2012 & 2016 • Exchange Server, SQL Server, Microsoft Server • Management and Virtualization • Microsoft Cloud Solutions, Microsoft • Devices & Deployment Private Cloud, Configuration • Windows 10, Office Manager, Windows Server • Small Business • Messaging • Office 365, Windows 10 • Exchange Server, Exchange Online, Exchange Online Protection • Mid-Market Solutions Provider • Microsoft Cloud Solutions, Office 365, Windows Server 2012 & 2016, Windows 10 Agenda System Source – Dave Ferg What is a secure environment? Identity and authentication security with Office 365 Email security features with Office 365 Microsoft - Steve Deming System Source Learning Center – Jack Underwood What is security? What is a secure environment? Organizations have varying degrees of security requirements. Regulations for financial, health, government, etc. Threats are evolving daily Viruses and malware Vulnerable software, data breaches, lost devices Hacked identities Ransomware, and more… What is a secure environment? Threats are attacking various targets. Data in transit Email and storage Servers and end devices Some threats are “innocent” Sending confidential information outside the organization Having data on unsecure devices – Unencrypted drives, removable media, unmanaged devices, etc.
    [Show full text]
  • Microsoft 365 E5 Learning Module Deck
    • What is: • “The Tenant” • Cloud Strategy. M365, Dynamics 365, Azure, 3rd Party • High Level - What is Microsoft 365 • Why: • Business alignment/Priority Agenda • Budget – Licensing and redundant spend • How: • Partner Ecosystem • Fast Track • Premier • Not on the agenda: • Technical Architecture What is the tenant, really? THE WORLD BEFORE MOBILITY & CLOUD users devices apps data On-premises / Private cloud CLOUD APPS & SAAS SERVICES On-premises / Private cloud MOBILE AND PERSONAL DEVICES On-premises / Private cloud ORGANIZATION & SOCIAL IDENTITIES On-premises / Private cloud On-premises / Private cloud On-premises / Private cloud MICROSOFT CLOUD Microsoft 365 Licensing and Roadmap Microsoft Internal & Partner Use Only A complete, intelligent, secure solution to empower employees Unlocks Built for Integrated Intelligent Creativity Teamwork for Simplicity Security Windows 10 Enterprise Enterprise Mobility & Security 14 Microsoft 365 E5 value Microsoft 365 E5 adds incremental value to Microsoft 365 E3 across these solution areas Microsoft 365 E5 Security Compliance Voice Analytics Extends identity and Brings together information Adds audio conferencing and Adds Power BI capabilities threat protection protection & advanced calling capabilities in the that help you realize to help stop damaging compliance capabilities to cloud to enable your teams significant business value attacks with integrated protect and govern data while from your data and automated security reducing risk Office 365 Enterprise Capabilities APPS SERVICES SECURITY ANALYTICS
    [Show full text]
  • Security Threats Worry You?
    WELCOME! Office 365 – What Security Threats Worry You? What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! Collect ‘Learn Today’ Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: System Source & Microsoft: Microsoft Certified Partner…since 1980’s Silver – Learning Solutions Train 6,000 students/year Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. Silver – Infrastructure 1,000’s of Microsoft implementations Small Business to Enterprise Non-profit Education What Security Threats Worry You? Stephen Deming Microsoft Partner Technology Strategist Challenges 2 billion records compromised in the last year 140+ days between infiltration and detection 87% of senior managers admit using personal accounts for work 45% of organizations lack data governance which leaves them open to litigation and data security risks Ever-evolving industry standards across geographies Attack kill chain Attack kill chain Attack kill chain and ATA Our Commitment to Trust Privacy Customer is the owner of their data. We do not mine customer data for advertising purposes. Privacy controls enable you to configure your company privacy policies. Microsoft advocates for data privacy on behalf of customers. Microsoft safeguards customer data with strong contractual commitments.
    [Show full text]
  • 2016 Microsoft Licensing Agreement & Products NEWSLETTER
    1 Issue 11 2016 Microsoft Licensing Agreement & Products NEWSLETTER Contents Azure only SCE Minimum is Changing 2 u Azure Cool Blob Storage Promo - NEW 7 u Enterprise Cloud Suite Rename to Secure Productive Microsoft R Server Monthly VL Subscription Offerings - NEW u u 2 Enterprise E3 7 Project Pro for Office 365 and Project Online Plans Replaced Important Changes For Customers Buying Enterprise u by New Plans 2 Software and Cloud Services in British Pound. Effective 1st 7 u January 2017 - PLEASE READ IF THIS AFFECTS YOU Project Online Professional and Premium Cloud Add-ons 3 u Select Plus is Retiring for Existing Customers - PLEASE READ Promotion Available for Project Standard Customers u IF THIS AFFECTS YOU 8 Windows 10, EMS and ECS Name Changes and Licensing 3 u Microsoft Products and Services Agreement (MPSA) inc Multi Offering u Year & Short Term Subscriptions 8 Office 365 E1 Limitations and How It May Affect You -NEW 4 u Enterprise Agreement - Enterprise Cloud Suite and Server u Cloud Suite 9 Azure and Office 365 Now Available from United Kingdom 4 u Data Centres Changes to the Microsoft Enterprise Agreement (EA) 9 u Azure EMS Suite Changes 5 u MPSA Portal Changing to Business Centre Portal 10 u Secure Productive Enterprise Launch Promotion 5 u Visual Studio (aka MSDN) Management Portal - u RELEVANT NOW 11 Introducing the New Microsoft Dynamics 365 - NEW 5 u Increase your ROI with adding Insight Direct as your Partner u of Record (POR) 11 SQL Server 2016 6 u Software Assurance Activation, Deployment and Managing - u BOOK YOUR LIVE SESSION 12 Windows Server and Systems Centre 2016 Licensing Changes 6 u Introducing Comms-Care as Insight's Partner for Planning u Service Day Delivery 13 E5 and Skype for Business Availability Update 6 u Product Licensing and Use Rights Search 13 u Insight, your Trusted Advisor Insight’s vision is to be the Trusted Advisor to our clients, helping them enhance their business performance through innovative technology solutions.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016
    G00277564 Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016 Analyst(s): Brian Reed, Neil Wynne Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection. Strategic Planning Assumptions By 2018, 90% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2018, less than 10% of organizations with integrated DLP will have a well-defined data security governance program in place, up from near zero today. Market Definition/Description Gartner defines the data loss prevention (DLP) market as those technologies that, as a core function, perform both content inspection and contextual analysis of data at rest on-premises or in cloud applications and cloud storage, in motion over the network, or in use on a managed endpoint device. DLP solutions can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. Data loss prevention technologies can be divided into two categories: ■ Enterprise DLP solutions incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Solutions are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery. Leading characteristics of enterprise DLP solutions include a centralized management console, support for advanced policy definition and event management workflow. Enterprise DLP functions as a comprehensive solution to discover sensitive data within an organization and mitigate the risk of its loss at the endpoints, in storage and over the network.
    [Show full text]
  • 7 Best Practices for Data Security in Office 365 and Beyond
    WHITEPAPER 7 Best Practices for Data Security in Office 365 and Beyond How to achieve unified visibility and control for unstructured data stored on-premises and the cloud. VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 1 Contents Data Security in a Complex, Hybrid World 3 The Rise of “Dark” Data 4 Data Security Is Not Optional 5 Cloud-Centric Security Is Not Enough 6 Enhancing Cloud Security with Varonis 9 1. Unified Control for On-Premises and Office 365 Data 10 2. 360o Permissions Visibility & Management 11 3. Sensitive Data Discovery 12 4. Comprehensive Auditing & Monitoring 13 5. Advanced Threat Detection (UEBA) 14 6. Risk Remediation & Least Privilege Automation 15 7. Data Owner-Driven Access Governance 16 Get a Personalized Office 365 Risk Assessment 17 VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 2 Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments. Many enterprises are moving pieces of their corporate email and file sharing infrastructure to the cloud where Microsoft Office 365 is the clear market leader. Microsoft Oce 365 Salesforce.com Box Amazon Web Services G Suite 2014 2015 2016 2017 ▲ Source: Okta Businesses @ Work, January 2017 Using Office 365 alongside on-premises data stores introduces data security and governance challenges that must be addressed in the era of mega breaches and strict privacy regulations. Security and risk leaders should implement consistent and sustainable data security controls and best practices across their on-premises and cloud repositories.
    [Show full text]
  • Microsoft's Expanded Horizons in Security
    Microsoft's Expanded Horizons in Security Securing Azure remains front and center, but hybrid and multicloud security is the way forward Licensed Reprint Publication Date: 02 Apr 2019 | Product code: INT003-000345 Rik Turner Information Classification: General Microsoft's Expanded Horizons in Security Summary Catalyst Microsoft's development of its security offerings has, until now, been designed to reinforce the appeal, first of its operating system, database, and office productivity software and more recently of its cloud services. While this remains the core driver of its activities in security, there are signs of a broadening of its approach of late as it moves to support heterogeneous environments and the environments of competing cloud service providers (CSPs). Most significantly, in the run-up to the recent RSA Conference on cybersecurity, held in San Francisco March 4‒7, 2019, the company launched Azure Sentinel, a security incident and event management (SIEM) platform it is offering as a cloud-based service, and a managed threat-hunting service called Microsoft Threat Experts. The SIEM-as-a-service (SIEMaaS) offering in particular takes Microsoft into the world of heterogeneous security management. Ovum view Microsoft has already expanded successfully from being a vendor of software licenses to providing the whole spectrum of cloud services, which include infrastructure- and platform-as-a-service (IaaS and PaaS) with its Azure business and software-as-a-service (SaaS) with its Microsoft 365 portfolio. In making that journey, the vendor has also recognized that security is an integral part of being a CSP, and it has invested accordingly in both internal development and acquisitions.
    [Show full text]
  • Gartner Magic Quadrant for Enterprise Data Loss Prevention 2017
    08/02/2018 Gartner Reprint (https://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for Enterprise Data Loss Prevention Published: 16 February 2017 ID: G00300911 Analyst(s): Brian Reed, Deborah Kish Summary Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities. Strategic Planning Assumptions By 2022, 60% of organizations will involve line-of-business owners when crafting their data loss prevention (DLP) strategy, up from 15% today. By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2022, a majority of DLP market revenue will be driven by integrated DLP products, as opposed to enterprise DLP systems. Market Definition/Description Gartner defines the DLP market as those technologies that, as a core function, provide remediation for data loss based on both content inspection and contextual analysis of data: At rest on-premises, or in cloud applications and cloud storage In motion over the network In use on a managed endpoint device. DLP products can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. DLP technologies can be divided into two separate categories: Enterprise DLP products incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Products are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery.
    [Show full text]