The 5Th IATI MNC Forum Annual Conference

Total Page:16

File Type:pdf, Size:1020Kb

The 5Th IATI MNC Forum Annual Conference IATI MNC F RUM ANNUAL CONFERENCE th The 5 IATI MNC Forum Annual Conference With the support of: InfinityLabs R&D In partnership with: Connecting Israel’s Tech Ecosystem ISRAEL'S UMBRELLA ORGANIZATION IATI is Israel’s Umbrella Organization for the High-Tech and Government Collaboration Work Group: Life-Science industries. In a country like Israel where Works closely with the IATI government committee to for the High-Tech innovation is a national mindset, IATI’s mission is to strengthen the relations between the government and the promote and support the entire advanced technology industry, creating close collaborations with relevant ecosystem in leveraging its strengths and expanding its government authorities and promoting governmental and Life Science Industries network. policies that will support the industry, e.g.: competitive Amongst IATI's many activities, IATI operates Committees taxation of IP creation following global changes (BEPS), and Forums designated for segments of the industry. IATI programs to scale the talent supply from universities and MNC Forum is the only Forum for R&D Centers of the non-academic institutes and encouraging additional global Multinational companies in Israel, gathering the leading companies to invest in Israel and open new R&D centers in R&D Centers' General Managers. Israel. The Dynamic forum deals with the different challenges Multinational Companies are facing in Israel and provides Human Capital Work Group: collaboration opportunities and a platform to communicate HR leaders of the MNC’s Israeli sites collaborate to address Connecting the tech ecosystem and share knowledge, all in the purpose of promoting and the high-tech industry challenges as well as the unique HR advancing common interests, to the benefit of the entire topics occupying the Israeli MNC sites. tech industry in Israel. Academic Collaboration Work Group: Focuses on expanding various aspects of multinational IATI MNC Forum's Workgroups: Companies' collaboration with Academic Institutions and This MNC Forum operates five specific work groups, each Tech Transfer Offices: e.g. enabling and simplifying IP IATI.CO.IL devoted to a designated field of activity: transfer, sharing & utilizing academic expertise and exposing MNCs to academic research. Education Work Group: Finds solutions for the lack of engineers in Israel in the short Communications Work Group: and long term. Focuses on growing the engineering and Handles communication aspects of Multinational technical capacity for high-tech in Israel through projects, Companies, including press presence, positioning of the actions and initiatives that will eventually increase the Multinational Companies, and providing relevant materials To learn more about joining IATI: number, and quality, of graduating students in Science, on the Israeli tech industry. T: +972 73713 6313 / [email protected] / www.iati.co.il Technology, Engineering and Mathematics (STEM). Herzliya Pituach, Israel To learn more about joining IATI: T: +972 73713 6313 / [email protected] / www.iati.co.il Herzliya Pituach, Israel Connecting Israel’s Tech Ecosystem ISRAEL'S UMBRELLA ORGANIZATION IATI is Israel’s Umbrella Organization for the High-Tech and Government Collaboration Work Group: Life-Science industries. In a country like Israel where Works closely with the IATI government committee to for the High-Tech innovation is a national mindset, IATI’s mission is to strengthen the relations between the government and the promote and support the entire advanced technology industry, creating close collaborations with relevant ecosystem in leveraging its strengths and expanding its government authorities and promoting governmental and Life Science Industries network. policies that will support the industry, e.g.: competitive Amongst IATI's many activities, IATI operates Committees taxation of IP creation following global changes (BEPS), and Forums designated for segments of the industry. IATI programs to scale the talent supply from universities and MNC Forum is the only Forum for R&D Centers of the non-academic institutes and encouraging additional global Multinational companies in Israel, gathering the leading companies to invest in Israel and open new R&D centers in R&D Centers' General Managers. Israel. The Dynamic forum deals with the different challenges Multinational Companies are facing in Israel and provides Human Capital Work Group: collaboration opportunities and a platform to communicate HR leaders of the MNC’s Israeli sites collaborate to address Connecting the tech ecosystem and share knowledge, all in the purpose of promoting and the high-tech industry challenges as well as the unique HR advancing common interests, to the benefit of the entire topics occupying the Israeli MNC sites. tech industry in Israel. Academic Collaboration Work Group: Focuses on expanding various aspects of multinational IATI MNC Forum's Workgroups: Companies' collaboration with Academic Institutions and This MNC Forum operates five specific work groups, each Tech Transfer Offices: e.g. enabling and simplifying IP IATI.CO.IL devoted to a designated field of activity: transfer, sharing & utilizing academic expertise and exposing MNCs to academic research. Education Work Group: Finds solutions for the lack of engineers in Israel in the short Communications Work Group: and long term. Focuses on growing the engineering and Handles communication aspects of Multinational technical capacity for high-tech in Israel through projects, Companies, including press presence, positioning of the actions and initiatives that will eventually increase the Multinational Companies, and providing relevant materials To learn more about joining IATI: number, and quality, of graduating students in Science, on the Israeli tech industry. T: +972 73713 6313 / [email protected] / www.iati.co.il Technology, Engineering and Mathematics (STEM). Herzliya Pituach, Israel To learn more about joining IATI: T: +972 73713 6313 / [email protected] / www.iati.co.il Herzliya Pituach, Israel IATI ANNUAL CONFERENCE The 5th IATI Annual Multinational R&D Centers’ conference Agenda 14:00-14:45 Networking & Light Lunch 14:45-15:40 Opening Remarks Karin Mayer Rubinstein, CEO & President, IATI Erez Tsur, Co-Chairman, IATI Eli Cohen, Minister of Economy and Industry Eli Groner, Director General, Prime Minister Office, One-on-one dialogue with Erez Tsur Farewell to Yoram Yaacovi, General Manager, Microsoft Israel R&D Center & IATI MNC Forum Co-Chair and welcoming Prof. Yossi Matias, Managing Director of Google's R&D Center in Israel The new IATI MNC Forum Co-Chair. Dr. Ami Appelbaum, Chief Scientist, Ministry of Economy & Chairman of Israel Innovation Authority Ziva Eger, Chief Executive, The Foreign Investment and Industrial Cooperation Authority, Ministry of Economy and Industry, Israel 15:40-16:50 Panel Discussion: Tech Human Capital in Israel – Short Term & Long Term Moderator: Shahar Bar-Or, Israel Site Manager, Western Digital, IATI MNC Education Workgroup Leader Panelists: Naomi Krieger Carmy, Head of Societal Challenges Division at Israel Innovation Authority Michal Tzuk, Director of Employment Regulation, Ministry of Labor. Social Affairs and Services Julia Ustyuzhanin, Software developer at AT&T (Alumni Infinity Labs R&D) Itai Tyroler, Winner of the Cyber Championship 2015 & Head of Development Team Cyber Championship 2017 Adir Gozlan, Security Data Scientist at Akamai Technologies (Alumni Israel Tech Challenge) Yitzik Crombie, CEO, Bizmax, IATI Committee for Haredim in High Tech 16:50-17:15 Fireside Chat with Nadav Shemesh, Senior advisor to the Minister of Finance Moderated by: Sharon Shulman, Tax Managing Partner, EY *The program is subject to changes *The invitation is personal, space is limited By invitation only IATI ANNUAL CONFERENCE The 5th IATI Annual Multinational R&D Centers’ conference Welcome to the 5th IATI Annual Conference of Multinational Companies' R&D Centers in Israel! Agenda Israel's unique position as the innovation nation is well earned, not only by its thriving start-up ecosystem, but very much thanks to it being the one-and-only place where usually competing MNCs join hands and co-operate through their local R&D Centers. This strong, ongoing collaboration serves to encourage innovation and contributes to create a better innovative Israel. This co-operation isn't accidental, nor is it being carried out merely on a basis of common interests. What causes Israel's R&D centers to communicate, co-think and co-work is the deep understanding of the concept of "Ecosystem" - interconnections on all levels, that create new opportunities for promoting innovation and enriching the industry as a whole. 14:00-14:45 Networking & Light Lunch 14:45-15:40 Opening Remarks The impact all this has on the local advanced industries' environment in Israel is no less than vast. We at the IATI, as Israel's Karin Mayer Rubinstein, CEO & President, IATI Umbrella Organization of the High-Tech and Life Sciences industries, constantly check-up and monitor the Industry's needs and listen to its various voices. The collective effort carried out by MNCs empowers local innovative forces within Israel. Erez Tsur, Co-Chairman, IATI New and inspiring models of creating strong connections between MNCs and the local ecosystem are something foreign Eli Cohen, Minister of Economy and Industry delegations arriving to Israel crave to learn from. IATI has continuously acted to strengthen in the same way industry-academia relations, through creating possibilities for networking between
Recommended publications
  • How to Elevate Your Cloud Solutions Practice
    How to elevate your cloud solutions practice AZURE MANAGED SERVICES PLAYBOOK FOR CSP PARTNERS 1 © 2016 MICROSOFT ALL RIGHTS RESERVED Azure managed services playbook for CSP partners Introduction 3 How to build an MSP practice 37 Who is an Azure Managed Services Provider? 4 Business planning 38 What is a cloud MSP? 5 Offer design 44 Why cloud managed services? 7 Go to market 51 Azure Managed Services opportunities 9 Cost of setting up an MSP practice 55 MSP profitability 10 Helpful links for Azure MSPs 56 How do MSPs make money? 11 MSP service offerings 12 Managed Services – Under the hood 13 Breaking down the functions of an MSP 14 Cloud assessment and planning 15 Cloud migration/deployments 17 Infrastructure operations management 19 Configuration management 20 Automation/Dev-Ops 21 Backup and Disaster Recovery 22 Identity and access management 23 Cloud monitoring services 24 Cost optimization 26 Security 28 Support 30 Azure Managed Services Spectrum 32 2 Introduction Cloud is disrupting traditional IT faster than we think. Today, with 80%1 business The playbook not only answers the “Why managed services?” question, it also deploying or fully embracing the cloud, we have ‘crossed the chasm’ and are addresses the “What is it?” and the “How to build” type of questions regarding in the ‘early majority’ stage of the adoption curve. All of this means more managed services practices. Over the course of this e-book, you will find answers opportunities for cloud solution providers. IDC discusses this opportunity to the following questions: extensively in “The Booming Cloud” report. 1.
    [Show full text]
  • HP Atalla Information Protection and Control: Automatically Classify And
    Family data sheet HP Atalla Information Protection and Control Automatically classify and protect unstructured data persistently June 2014 Family data sheet | HP Atalla Information Protection and Control Figure 1. Embed protection in the data at the point of creation SaaS applications Classification Data repositories and Intercept File shares Classify Protection Protect Users generated mechanism In an era of increasing cyber threats and targeted attacks, organizations must now assume that their network has been breached. How, then, can organizations protect sensitive unstructured data like documents and spreadsheets from The second-highest return on improper access? HP Atalla Information Protection and Control investment (ROI) in security (IPC) solves this complex issue by giving organizations the investments comes from the means to bring protection to the data itself. HP Atalla IPC widespread and effective applies protection at the point information is created and application of encryption, makes that protection persistent, so it follows the information policy, and access controls wherever it goes. This secures sensitive data no matter where on data. it actually resides. The challenge of protecting unstructured information Analysts estimate that by 2015, nearly 90 percent of organizational data will be unstructured.1 Sensitive organizational data in spreadsheets, documents, presentations, and other files resides in multiple locations—for example, employee laptops/mobile devices, file servers, and storage arrays (NAS and SAN). In today’s de-perimiterized environment, collaboration is crucial—but sharing data necessitates exposing it. Traditional data protection solutions inhibit productivity by applying protection unnecessarily, and items classified as “sensitive” easily lose this classification if it’s not saved in a predefined format or network location, or if modified out of original context.
    [Show full text]
  • A Cruiser's View of Bequia
    C A R I B B E A N On-line C MPASS NOVEMBER 20088 NO.NO. 158 The Caribbean’s Monthly Look at Sea & Shore A CRUISER'S VIEW OF BEQUIA See story on page 28 WILFRED DEDERER NOVEMBER 2008 CARIBBEAN COMPASS PAGE 2 a NOVEMBER 2008 CARIBBEAN COMPASS PAGE 3 CALENDAR NOVEMBER 1 All Saints’ Day. Public holiday in French West Indies 1 Independence Day. Public holiday in Antigua & Barbuda 1 D Hamilton Jackson Day. Public holiday in USVI 1 - 2 Women’s Caribbean One Design Keelboat Championship, St. Maarten. [email protected] The Caribbean’s Monthly Look at Sea & Shore 2 19th West Marine Caribbean 1500 sets sail from Hampton, VA to Tortola. www.carib1500.com www.caribbeancompass.com 3 Independence Day. Public holiday in Dominica 4 Community Service Day. Public holiday in Dominica NOVEMBER 2008 • NUMBER 158 6 - 11 Le Triangle Emeraude rally, Guadeloupe to Dominica. [email protected] 7 - 8 BVI Schools Regatta, Royal British Virgin Islands Yacht Club (RBVIYC), tel (284) 494-3286, [email protected], www.rbviyc.net 7 – 9 Heineken Regatta Curaçao. www.heinekenregattacuracao.com 7 – 9 BMW Invitational J/24 Regatta, St. Lucia. [email protected] Repo Man 8 Reclaiming a stolen yacht ..... 32 St. Maarten Optimist Open Championship. [email protected] 8 - 10 Triskell Cup Regatta, Guadeloupe. http://triskellcup.com TERI JONES 10 - 15 Golden Rock Regatta, St Maarten to Saba. CONNELLY-LYNN [email protected] 11 Veterans’ Day. Public holiday in Puerto Rico and USVI 11 Armistice Day. Public holiday in French West Indies and BVI 13 FULL MOON 13 - 21 Heineken Aruba Catamaran Regatta.
    [Show full text]
  • Microsoft Advanced Threat Analytics Brings the Behavioral Analytics Concept to IT and the Organization’S Users
    Welcome Improved Security and Productivity using Office 365 & Microsoft Cloud What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: ▪ Microsoft Certified Partner…since 1980’s • Silver – Learning Solutions • Train 6,000 students/year • Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. • Silver – Infrastructure ▪ 1,000’s of Microsoft implementations • Small Business to Enterprise • Non-profit • Education System Source & Microsoft: Microsoft Competencies • Server Platform • Hosting • Windows Server 2012 & 2016 • Exchange Server, SQL Server, Microsoft Server • Management and Virtualization • Microsoft Cloud Solutions, Microsoft • Devices & Deployment Private Cloud, Configuration • Windows 10, Office Manager, Windows Server • Small Business • Messaging • Office 365, Windows 10 • Exchange Server, Exchange Online, Exchange Online Protection • Mid-Market Solutions Provider • Microsoft Cloud Solutions, Office 365, Windows Server 2012 & 2016, Windows 10 Agenda System Source – Dave Ferg What is a secure environment? Identity and authentication security with Office 365 Email security features with Office 365 Microsoft - Steve Deming System Source Learning Center – Jack Underwood What is security? What is a secure environment? Organizations have varying degrees of security requirements. Regulations for financial, health, government, etc. Threats are evolving daily Viruses and malware Vulnerable software, data breaches, lost devices Hacked identities Ransomware, and more… What is a secure environment? Threats are attacking various targets. Data in transit Email and storage Servers and end devices Some threats are “innocent” Sending confidential information outside the organization Having data on unsecure devices – Unencrypted drives, removable media, unmanaged devices, etc.
    [Show full text]
  • Microsoft 365 E5 Learning Module Deck
    • What is: • “The Tenant” • Cloud Strategy. M365, Dynamics 365, Azure, 3rd Party • High Level - What is Microsoft 365 • Why: • Business alignment/Priority Agenda • Budget – Licensing and redundant spend • How: • Partner Ecosystem • Fast Track • Premier • Not on the agenda: • Technical Architecture What is the tenant, really? THE WORLD BEFORE MOBILITY & CLOUD users devices apps data On-premises / Private cloud CLOUD APPS & SAAS SERVICES On-premises / Private cloud MOBILE AND PERSONAL DEVICES On-premises / Private cloud ORGANIZATION & SOCIAL IDENTITIES On-premises / Private cloud On-premises / Private cloud On-premises / Private cloud MICROSOFT CLOUD Microsoft 365 Licensing and Roadmap Microsoft Internal & Partner Use Only A complete, intelligent, secure solution to empower employees Unlocks Built for Integrated Intelligent Creativity Teamwork for Simplicity Security Windows 10 Enterprise Enterprise Mobility & Security 14 Microsoft 365 E5 value Microsoft 365 E5 adds incremental value to Microsoft 365 E3 across these solution areas Microsoft 365 E5 Security Compliance Voice Analytics Extends identity and Brings together information Adds audio conferencing and Adds Power BI capabilities threat protection protection & advanced calling capabilities in the that help you realize to help stop damaging compliance capabilities to cloud to enable your teams significant business value attacks with integrated protect and govern data while from your data and automated security reducing risk Office 365 Enterprise Capabilities APPS SERVICES SECURITY ANALYTICS
    [Show full text]
  • Security Threats Worry You?
    WELCOME! Office 365 – What Security Threats Worry You? What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! Collect ‘Learn Today’ Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: System Source & Microsoft: Microsoft Certified Partner…since 1980’s Silver – Learning Solutions Train 6,000 students/year Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. Silver – Infrastructure 1,000’s of Microsoft implementations Small Business to Enterprise Non-profit Education What Security Threats Worry You? Stephen Deming Microsoft Partner Technology Strategist Challenges 2 billion records compromised in the last year 140+ days between infiltration and detection 87% of senior managers admit using personal accounts for work 45% of organizations lack data governance which leaves them open to litigation and data security risks Ever-evolving industry standards across geographies Attack kill chain Attack kill chain Attack kill chain and ATA Our Commitment to Trust Privacy Customer is the owner of their data. We do not mine customer data for advertising purposes. Privacy controls enable you to configure your company privacy policies. Microsoft advocates for data privacy on behalf of customers. Microsoft safeguards customer data with strong contractual commitments.
    [Show full text]
  • 2016 Microsoft Licensing Agreement & Products NEWSLETTER
    1 Issue 11 2016 Microsoft Licensing Agreement & Products NEWSLETTER Contents Azure only SCE Minimum is Changing 2 u Azure Cool Blob Storage Promo - NEW 7 u Enterprise Cloud Suite Rename to Secure Productive Microsoft R Server Monthly VL Subscription Offerings - NEW u u 2 Enterprise E3 7 Project Pro for Office 365 and Project Online Plans Replaced Important Changes For Customers Buying Enterprise u by New Plans 2 Software and Cloud Services in British Pound. Effective 1st 7 u January 2017 - PLEASE READ IF THIS AFFECTS YOU Project Online Professional and Premium Cloud Add-ons 3 u Select Plus is Retiring for Existing Customers - PLEASE READ Promotion Available for Project Standard Customers u IF THIS AFFECTS YOU 8 Windows 10, EMS and ECS Name Changes and Licensing 3 u Microsoft Products and Services Agreement (MPSA) inc Multi Offering u Year & Short Term Subscriptions 8 Office 365 E1 Limitations and How It May Affect You -NEW 4 u Enterprise Agreement - Enterprise Cloud Suite and Server u Cloud Suite 9 Azure and Office 365 Now Available from United Kingdom 4 u Data Centres Changes to the Microsoft Enterprise Agreement (EA) 9 u Azure EMS Suite Changes 5 u MPSA Portal Changing to Business Centre Portal 10 u Secure Productive Enterprise Launch Promotion 5 u Visual Studio (aka MSDN) Management Portal - u RELEVANT NOW 11 Introducing the New Microsoft Dynamics 365 - NEW 5 u Increase your ROI with adding Insight Direct as your Partner u of Record (POR) 11 SQL Server 2016 6 u Software Assurance Activation, Deployment and Managing - u BOOK YOUR LIVE SESSION 12 Windows Server and Systems Centre 2016 Licensing Changes 6 u Introducing Comms-Care as Insight's Partner for Planning u Service Day Delivery 13 E5 and Skype for Business Availability Update 6 u Product Licensing and Use Rights Search 13 u Insight, your Trusted Advisor Insight’s vision is to be the Trusted Advisor to our clients, helping them enhance their business performance through innovative technology solutions.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016
    G00277564 Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016 Analyst(s): Brian Reed, Neil Wynne Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection. Strategic Planning Assumptions By 2018, 90% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2018, less than 10% of organizations with integrated DLP will have a well-defined data security governance program in place, up from near zero today. Market Definition/Description Gartner defines the data loss prevention (DLP) market as those technologies that, as a core function, perform both content inspection and contextual analysis of data at rest on-premises or in cloud applications and cloud storage, in motion over the network, or in use on a managed endpoint device. DLP solutions can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. Data loss prevention technologies can be divided into two categories: ■ Enterprise DLP solutions incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Solutions are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery. Leading characteristics of enterprise DLP solutions include a centralized management console, support for advanced policy definition and event management workflow. Enterprise DLP functions as a comprehensive solution to discover sensitive data within an organization and mitigate the risk of its loss at the endpoints, in storage and over the network.
    [Show full text]
  • Secure Collaboration Within Organizations, B2B and B2C
    Secure Collaboration within Organizations, B2B and B2C [email protected] [email protected] • Definition of the term “Collaboration”: Working with others to do a task and to achieve shared goals. • Major Business Requirements Structured filing Simple and secure identity and access management processes within and across companies, user self-services Broad support of devices and applications Flexibility regarding business processes and team structures Data security and classification Traceability and auditability of any IAM and business activities Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records • Microsoft Azure, Office 365, SharePoint Online Global cloud solution managing tenants and trusts Single user identity for authentication and authorization to all resources Broad support of devices and applications • Rights Management Services Leverage access control beyond applications (DLP) Data classification Document tracking • Digital Signature Services Evidence records for contracts and approval processes Requirement E-Mail SharePoint Structured filing IAM, user self-services Broad support of devices and applications Flexibility w.r.t. processes and team structures Data security and classification Traceability and auditability Evidence records Microsoft Azure, Office 365, SharePoint Online Rights Management Services Short introduction of Microsoft RMS and Secure Islands IQ Protector Digital Signature Services • About RMS Traditional security controls (e.g. ACLs, firewalls, etc.) have limited effectiveness to protect company data while still empowering users to work efficiently (i.e. usage of many platforms, applications, mobile workplaces, etc.) RMS protects the sensitive information independent of any other security measures.
    [Show full text]
  • 7 Best Practices for Data Security in Office 365 and Beyond
    WHITEPAPER 7 Best Practices for Data Security in Office 365 and Beyond How to achieve unified visibility and control for unstructured data stored on-premises and the cloud. VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 1 Contents Data Security in a Complex, Hybrid World 3 The Rise of “Dark” Data 4 Data Security Is Not Optional 5 Cloud-Centric Security Is Not Enough 6 Enhancing Cloud Security with Varonis 9 1. Unified Control for On-Premises and Office 365 Data 10 2. 360o Permissions Visibility & Management 11 3. Sensitive Data Discovery 12 4. Comprehensive Auditing & Monitoring 13 5. Advanced Threat Detection (UEBA) 14 6. Risk Remediation & Least Privilege Automation 15 7. Data Owner-Driven Access Governance 16 Get a Personalized Office 365 Risk Assessment 17 VARONIS WHITEPAPER: Best Practices for Data Security in Office 365 and Beyond 2 Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments. Many enterprises are moving pieces of their corporate email and file sharing infrastructure to the cloud where Microsoft Office 365 is the clear market leader. Microsoft Oce 365 Salesforce.com Box Amazon Web Services G Suite 2014 2015 2016 2017 ▲ Source: Okta Businesses @ Work, January 2017 Using Office 365 alongside on-premises data stores introduces data security and governance challenges that must be addressed in the era of mega breaches and strict privacy regulations. Security and risk leaders should implement consistent and sustainable data security controls and best practices across their on-premises and cloud repositories.
    [Show full text]
  • Microsoft's Expanded Horizons in Security
    Microsoft's Expanded Horizons in Security Securing Azure remains front and center, but hybrid and multicloud security is the way forward Licensed Reprint Publication Date: 02 Apr 2019 | Product code: INT003-000345 Rik Turner Information Classification: General Microsoft's Expanded Horizons in Security Summary Catalyst Microsoft's development of its security offerings has, until now, been designed to reinforce the appeal, first of its operating system, database, and office productivity software and more recently of its cloud services. While this remains the core driver of its activities in security, there are signs of a broadening of its approach of late as it moves to support heterogeneous environments and the environments of competing cloud service providers (CSPs). Most significantly, in the run-up to the recent RSA Conference on cybersecurity, held in San Francisco March 4‒7, 2019, the company launched Azure Sentinel, a security incident and event management (SIEM) platform it is offering as a cloud-based service, and a managed threat-hunting service called Microsoft Threat Experts. The SIEM-as-a-service (SIEMaaS) offering in particular takes Microsoft into the world of heterogeneous security management. Ovum view Microsoft has already expanded successfully from being a vendor of software licenses to providing the whole spectrum of cloud services, which include infrastructure- and platform-as-a-service (IaaS and PaaS) with its Azure business and software-as-a-service (SaaS) with its Microsoft 365 portfolio. In making that journey, the vendor has also recognized that security is an integral part of being a CSP, and it has invested accordingly in both internal development and acquisitions.
    [Show full text]