Microsoft 365 Enterprise E5 Overview Presentation

February 19, 2024 | Author: Anonymous | Category: N/A
Share Embed Donate


Short Description

Download Microsoft 365 Enterprise E5 Overview Presentation...

Description

Microsoft 365 Enterprise E5 Security Overview Rani Lofstrom 05/01/18

title

Microsoft Secure Ensuring security to enable your digital transformation through a comprehensive platform, unique intelligence, and broad partnerships

title

OUR UNIQUE APPROACH

PLATFORM

INTELLIGENCE

PARTNERS

Microsoft Intelligent Security Graph

Shared threat data from partners, researchers, and law enforcement worldwide

Unique insights, informed by trillions of signals OneDrive Outlook

5B

threats detected on devices every month

1.2B

400B

emails analyzed

devices scanned each month

200+

Azure

global cloud consumer and commercial services

Enterprise security for

Windows

Botnet data from Microsoft Digital Crimes Unit

Microsoft accounts

Bing

90% of

18B+

Fortune 500

750M+

Azure user accounts

Xbox Live

Bing web pages scanned

450B

monthly authentications

How Microsoft 365 Enterprise E5 Fits In

Realities of digital transformation

Microsoft Secure global security vision

Securing the enterprise with Microsoft 365

Microsoft 365 Enterprise E5 A single suite that unifies enterprise security with user productivity to meet the needs of today’s modern workplace

Microsoft 365 Enterprise E5 security products

Realities of digital transformation

REALITIES OF DIGITAL TRANSFORMATION

The intelligent, connected cloud introduces both opportunity and risk Technology has changed the way enterprises conduct business

96% of companies have embraced the cloud 2018 State of the Cloud Survey (Rightside)

Requiring a new approach to protect company assets

43% (1.88B) of the global workforce will be mobile by 2023

Global Mobile Workforce Forecast Update 2017-2023, Strategy Analytics

1/3 of successful enterprise attacks will be on Shadow IT resources by 2020

How to eliminate enterprise shadow IT, Gartner, April 11, 2017

Only

26%

of European companies say they are GDPR compliant

“The State of GDPR Readiness: GDPR Readiness Progress es, But Strategies Depend Too Heavily on IT” Forrester, J anuary, 2018

REALITIES OF DIGITAL TRANSFORMATION

Complexity is the enemy of intelligent security

$1.37M On average that an organization spends annually in time wasted responding to erroneous malware alerts

“The Cost of Insecure Endpoints” Ponemon Institute© Research Report, June 2017

1.87M Global cybersecurity workforce shortage by 2022 Global Information Security Workforce Study 2017

70

Security products

from

35

Security vendors

Is the average for companies with over 1,000 employees Nick McQuire, VP Enterprise Research CCS Insight.

REALITIES OF DIGITAL TRANSFORMATION

Balancing security capabilities with a manageable security posture

Best-of-breed point solutions

Security you can maintain with your current staff and budget

REALITIES OF DIGITAL TRANSFORMATION

Reducing complexity can eliminate many security challenges:

Lack of specific recommendations on how to improve security posture

Too much time spent managing security vendors

Too many alerts to investigate

Learning how to configure and manage disparate security solutions slows deployment

Integration is time-consuming and increases total cost of ownership

User productivity is compromised for the sake of security, resulting in users bypassing security measures

Securing the enterprise with Microsoft 365

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

title Threat Protection

Identity & Access Management

Information Protection

Data is your most important company asset

Security starts with great user authentication

Security Management

Correlate threat information and automatically respond

Optimize with security insights and configuration tools

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Intelligent security for the modern workplace Microsoft 365 Enterprise E5 unifies enterprise security and user productivity

Identity & Access Management

Information Protection

Threat Protection

Security Management

Protect users’ identities and control access to valuable resources based on user risk level

Protect sensitive information wherever it lives or travels

Protect against advanced threats and recover quickly when attacked

Gain visibility and control over security tools

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

For enterprise customers that embrace the Microsoft productivity suite, significant gains can be realized in security

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Microsoft 365 security suite advantages

Holistic security capabilities that can reduce the number of vendors you manage

Individual components are purpose-built to integrate, which decreases TCO

Because security is built-in, deployment and on-going management is simplified

Security capabilities extend beyond Microsoft to secure 3rd party platforms, apps and services

Standard integration capabilities connect to your other security tools (3rd party or homegrown)

Intelligent, adaptive security gives users more freedom in how they work, from anywhere on any device

Security tools are fed by trillions of signals to provide insights across the global Microsoft ecosystem

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Security capabilities only available in Microsoft 365 Enterprise E5 Recognize users and devices and dynamically change what level of access is allowed and how users authenticate based on parameters such as location, device risk, user risk or document confidentiality level

Control access to sensitive data, even when its shared outside of your organization or accessed via a 3rd party application

Security automation detects potential threats and correlates alerts to identify a specific attack vector, investigates and remediates threats, reauthenticates high-risk users, and takes action to limit access to data

Because users log in with a single user ID to any application from any device from any location, you have the context to detect and investigate suspicious activities

Discover shadow IT so it can be secured and managed, reducing your exposure to data leakage through inappropriate sharing and unsecured storage

Identity and Access Management Protect users’ identities and control access to valuable resources based on user risk

If a user’s identity or device becomes compromised, automatically block or limit access, or require MFA

Alert me when a user's credentials are for sale on the dark web and elevate their risk level

Discover 3rd party cloud apps that are in use and assess their risk level, so you can sanction or block them

Discover, restrict, and monitor privileged identities and their access to resources

A single solution that can protect identity across on premises and cloud directories

Eliminate passwords by using biometrics or pins

Information Protection Protect sensitive information wherever it lives or travels

Automatically apply data security policies if a user's access to that data changes, the user becomes compromised or the data reaches a certain age.

Identify potentially sensitive information, like credit card numbers or bank routing numbers, and automatically apply a label and protection to the file

Scan historical on-premises data files for potentially sensitive information

Allow select partners and customers to access sensitive information

Protect sensitive data when it travels outside of your organization via email, USB, or a 3rd party SaaS app

Threat Protection Protect against advanced threats and recover quickly when attacked

Detect attacks from both on premises and cloud signals

Endpoint monitoring with the ability to quarantine the endpoint for investigation and wipe the device, if compromised

Advanced email protection against phishing attempts, and unknown (zero day) threats

Detect and remove ransomware, then recover my files

Automatically detect anomalies and suspicious behavior without needing to create and fine tune rules

Reduce false positives by contextually aggregating alerts together to identify a specific attack vector

Automatically investigate endpoint alerts and remediate threats, removing them from all impacted machines

Security Management Gain visibility and control over security tools

A quantifiable measurement of your security posture

Benchmark your security score against companies in your industry or of similar size

Recommended actions you can take to improve your security posture

Detailed reports on the latest threats, so you can answer questions, like "How well am I protected against the latest threats?"

Teach users to guard against email phishing by simulating an attack in a safe environment

Incident and event forensic reporting

title

Addressing the risks inherent in a growing shadow IT environment

“Using Cloud App Security as a magnifying glass, we gain amazing visibility into our SaaS environment. Cloud App Security works with Azure Information Protection to alert us if someone is trying to share sensitive data. Our vision is to use Cloud App Security together with the Azure conditional access policies that we have already defined, such as for our SuccessFactors app.” Muhammad Yasir Khan Head of IT Infrastructure Nakilat, Qatar Gas Transport

MICROSOFT 365 E5 SECURITY PRODUCT SUITE

Whole Food protects apps with Microsoft 365 security

“Identity is the new firewall of the future. We can’t continue to use our old way of controlling application access, because business isn’t happening exclusively in our network anymore. With Azure Active Directory Premium, we can stay in control, no matter where our users roam.” WILL LAMB Infrastructure Coordinator Whole Foods Market, United States

title

Korn Ferry authenticates and protects Office 365 apps and 60 third-party applications, including SAP and Salesforce.com. “With Azure Active Directory, we can set policies that treat employees outside the office more strictly than those inside it and that prompt for Multi-Factor Authentication on unmanaged devices or for certain applications. With Microsoft 365, we no longer have to choose between mobility and security—we have both.” Bryan Ackermann Chief Information Officer Korn Ferry, United States

title

In just a few months, Yara deployed Azure Information Protection for 14,000 users and 10,000 devices.

“We set Azure Information Protection so that when you click ‘confidential,’ the file will be encrypted automatically and access will be restricted to designated users—even if you accidentally send it to the wrong person.” Erlend Skuterud Chief Information Security Officer Yara, Norway

title “Teams across different divisions and different countries can now easily build and safely store and share documents. In the past, there was nothing comparable.” CONOR O’HALLORAN Head of Identity Management Merck KGaA, Darmstadt, Germany

title “As we see the security landscape evolving with more sophisticated attacks, we trust Microsoft to stay ahead of the latest threats to protect our network and our data.” CHRIS KREBS Chief Information Officer Fruit of the Loom

title “Today, we trust EMS and Surface devices running Windows 10 as a highly reliable platform that protects our data—such as the proprietary running shoe designs that make our name— in a mobile environment.” EDWIN IDEMA IT Manager, EMEA Asics

Microsoft 365 Enterprise E5 security products

MICROSOFT 365 E5 SECURITY PRODUCT SUITE

Security solutions in Microsoft 365 Enterprise E5

Identity & Access Management

Information Protection

Threat Protection

Security Management

Azure Active Directory

Azure Information Protection

Azure Advanced Threat Protection

Microsoft Security & Compliance Center

Microsoft Cloud App Security

Office 365 Data Loss Prevention

Windows Defender Security Center

Windows Hello

Microsoft Cloud App Security

Windows Defender Advanced Threat Protection

Windows Credential Guard

Windows Information Protection Microsoft Intune BitLocker

Office 365 Advanced Threat Protection Office 365 Threat Intelligence Microsoft Cloud App Security

Microsoft Secure Score

Identity & Access Management

Information Protection

title • • • •

Single Sign-on Multi-Factor Authentication Access Control Privileged Access Management (PAM)

• Secrets Management

• • • • • • • •

Data Loss Prevention (DLP) Data Encryption Information Protection Data Classification Data Governance Cloud Access Security Broker (CASB) Key Management Mobile Application Management

• • • •

Database Security Encrypted Cloud Storage Back Up Disaster Recovery

• Virtual Private Networks (VPN)

Security categories M365 Enterprise E5 covers Security categories other Microsoft solutions cover What Microsoft Services/ MSSPs cover What Microsoft integrates with What Microsoft doesn’t do

Threat Protection • Secure Email Gateway • Endpoint Detection and Response (EDR) • Endpoint Protection (EPP) • Anti-malware/phishing • Anti-spyware • Antivirus Software • User and Entity Behavior Analytics (UEBA) • Anomaly Detection • Threat Intelligence Feeds • Remote Browser • Intrusion Detection System (IDS) • Intrusion Prevention System (IPS) • IoT Protection • Cloud Workload Protection • DDoS Protection • Incident Response Services • Cross-platform endpoint protection • • • • • • • • •

Incident Ticket System Firewall/ Network Mobile Threat Detection tools Host intrusion prevention system (HIPS) Network traffic analysis (NTA) Container Security Anti-subversion software Anti-tamper software Deception

Security Management • Security Scoring • Reporting • Cloud-based Management Asset Discovery Pen Testing/ Risk Assessment Vulnerability Assessment Web Application Testing Managed detection and response (MDR) • SOC • Security training • • • • •

• SIEM (SIM/ SEM/ Log management)

E3 vs E5 Identity and Access Management

Microsoft 365 Enterprise E5 (includes E3 solutions)

E3

E5

Azure Active Directory P1 Windows Hello Credential Guard

Azure Active Directory P2

Information Protection

Azure Information Protection P1 Office 365 Data Loss Prevention Windows Information Protection BitLocker

Azure Information Protection P2 Microsoft Cloud App Security Office 365 Cloud App Security

Threat Protection

Microsoft Advanced Threat Analytics Windows Defender Antivirus Device Guard

Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection Office 365 Threat Intelligence Azure Advanced Threat Protection

Security Management

Secure Score Microsoft security and compliance center Windows Security Center

(additional management reports and capabilities)

Compliance

eDiscovery

Advanced eDiscovery, Customer Lockbox, Advanced Data Governance

Analytics

Delve

Power BI Pro, MyAnalytics

Productivity, Creativity and Teamwork solutions

Office Applications Outlook/ Exchange Microsoft Teams Skype for Business

Skype Audio Conferencing Phone System

MICROSOFT 365 E5 SECURITY PRODUCT SUITE

title

E5

Security

Azure Active Directory P2

Identity & Access Management that is automated across your entire digital footprint

Microsoft Cloud App Security

Discovers cloud app being used in your enterprise, identifies and combats cyberthreats and enables you to control how your data travels

Azure Information Protection P2

Protects sensitive enterprise data, even when it travels outside of your organization

Windows Defender Advanced Threat Protection

A unified endpoint security platform that protects against advanced attacks and automatically investigates and remediates evolving threats

Azure ATP

Detect and investigate advanced attacks on-premises and in the cloud

Compliance

Advanced Data Governance

Customer Lockbox

Analytics

My Analytics

Power BI Pro

Voice

Audio Conferencing, Phone System

Office 365 Advanced Threat Protection

Protects your email, files and online storage against unknown and sophisticated attacks

Office 365 Threat Intelligence

Research threats, track phishing or malware campaigns aimed at your users, and search for threat indicators from user reports and other intelligence sources

Advanced eDiscovery

MICROSOFT 365 E5 SECURITY PRODUCT SUITE

Microsoft 365 addresses real-world security challenges I need to be compliant with data protection regulations, like GDPR. How can Microsoft help me discover, classify and protect my sensitive data?

How do I find and manage shadow IT and rogue devices, and put in place policies to ensure we remain compliant and secure?

I have solutions from many vendors in my enterprise IT environment, how can Microsoft help me secure our entire digital landscape?

How can Microsoft help me understand my current security posture and get recommendations on how to improve it?

Eventually, we will experience a breach. How can Microsoft help me detect and respond to a breach fast?

If a user becomes compromised, how can I configure security policies that automatically enforce additional layers of authentication to keep my organization safe?

Thank you.

© Copyright Microsoft Corporation. All rights reserved.

Appendix

© Copyright Microsoft Corporation. All rights reserved.

Real life data breaches

Jason’s Deli

FedEx

Under Armour

Saks Fifth Avenue

As many as 2 million payment cards we re stolen and sold on the dark web .

Personal information was found on a n unsecure cloud storage server.

An unauthorized party acquired data fr om 150 million cloud app users

Hackers stole 5 million credit and debit cards and sold them on the dark web.

January 11, 2018

February 15, 2018

March 29, 2018

April 1, 2018

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF