intelligent security built for the modern workplace · intelligent security built for the modern...
TRANSCRIPT
Intelligent security built for the modern workplaceMirad Maglic
Microsoft CEE
The modern workplace is built around a culture of empowering people and productivity.
But what about security?
Digital transformation has stressed your existing security practices
On-premises
Clouds
AI
LoB apps
Files
Devices
Branch offices
Remote
work
SaaS apps
Partners
Data
IoT
The pressures of information protection and privacy feel challenging
$600Bis lost to cyber crime each year²
90%of the world’s data has been created within the last two years¹
4.0%of worldwide revenue: the penalty for GDPR non-compliance (€20MM or $23.6MM)³
The marketplace is full of fragmented point solutions
IDENTITY
SOLUTIONS
INFORMATION
SOLUTIONS
THREAT
SOLUTIONS
IOT
SECURITY
DATACENTER
SECURITY
SECURITY
MANAGEMENT
COMPLIANCE
TOOLS
INFRASTRUCTURE
SECURITY
END-POINT
SECURITY
How do you balance security and productivity?
Integrate security into your platform, services, and productivity tools.
Protect users’ identities
and control access to
valuable resources
Protect against advanced
threats and recover quickly
when attacked
Ensure documents and
emails are seen only by
authorized people
Gain visibility and control
over security tools
Identity & access management
Threatprotection
Security management
Information protection
Intelligent security
Identity may be your biggest weakness
of passwords are duplicates²
73%of passwords are eventually compromised³
40%The global mobile workforce by 2020¹
~2B
Sarah is a remote worker
based in the United States and
her credentials experience a
simultaneous login attempt
from across the world.
Device Health
Group Membership
Platform
Location*************
Risk
More ways to safeguard credentials
Multi-factor
authentication
Move beyond
passwords
Leaked credential
reporting and monitoring
Privileged identity
management
***************
****
Additional safety measures
can be applied to Sarah’s
identity to increase security.
Protect users’ identities
and control access to
valuable resources
Protect against advanced
threats and recover quickly
when attacked
Ensure documents and
emails are seen only by
authorized people
Gain visibility and control
over security tools
Identity & access management
Threatprotection
Security management
Information protection
Intelligent security
80%of employees use non-approved apps for work¹
1/3of successful attacks against enterprises will be on shadow IT resources by 2020²
Information protection is a complicated challenge
88%of organizations are no longer confident they can detect and prevent loss of sensitive data³
Phil is trying to download a
sensitive work document that’s
stored in a cloud app onto his
unmanaged device.
Role
Group
Client
Health
Config
Risk
Real-time control
Device not managed
Policy Proxy
Information about the incident is
collected alongside data from
firewalls and proxies, and shared with
IT for visibility—providing ongoing
risk assessment and analytics.
Protect users’ identities
and control access to
valuable resources
Protect against advanced
threats and recover quickly
when attacked
Ensure documents and
emails are seen only by
authorized people
Gain visibility and control
over security tools
Identity & access management
Threatprotection
Security management
Information protection
Intelligent security
93%of malware is polymorphic
50Kcorporate identities attacked every month
<48hours after a breach, an attacker will have control of a network
Attacks are more sophisticated than ever
Ellen receives an email that
appears safe, but is actually
cleverly disguised malware.
As the malware attempts to
enter the network, security
controls detect the abnormal
behavior based on latest
shared intelligence.
Ben can either receive a
notification of a breach or
anomaly, accompanied by
recommendations.
Or, he can enable automatic
remediation, depending
on severity.
Protect users’ identities
and control access to
valuable resources
Protect against advanced
threats and recover quickly
when attacked
Ensure documents and
emails are seen only by
authorized people
Gain visibility and control
over security tools
Identity & access management
Threatprotection
Security management
Information protection
Intelligent security
70%of organizations report having more difficulty managing endpoint risk²
75number of security vendors an average organization uses¹
56%The amount of alerts IT can investigate in a day³
Security operations must modernize
Ryan is the security manager
for his organization.
He has to manage a patchwork
of security solutions, some
legacy, others new.
This approach makes it difficult for
Ryan to maintain the visibility,
confidence, and ability he needs to
quickly respond to threats.
Ryan recommended a new,
platform-driven approach to
security management for a
seamless, connected experience.
Identity & access management
Threatprotection
Security management
Information protection
Intelligent security built in, not bolted on
Microsoft platform
Microsoft Intelligent Security Graph
400Bemails
analyzed
1.2Bdevices
scanned each month
200+global cloud
customer and commercial services
930Mthreats detected on devices every month
Shared threat data from partners,
researchers, and law enforcement worldwide
Botnet data from Microsoft Digital
Crimes Unit
18B+Bing web pages
scanned 450Bmonthly
authentications
Enterprise security
for 90% of
Fortune 500
750M+Azure user accounts
Azure
Outlook
Xbox Live
Bing
OneDrive
Windows
Microsoftaccounts
Microsoft platform
Microsoft Intelligent Security Association
https://www.microsoft.com/en-us/security/association
Collaboration strengthens
protection
Improved threat
discoverability
Shared
intelligenceIntelligentSecurityGraph
Extend security for
mutual customers
Microsoft Digital Crimes Unit
Investigations, forensics,
and analytics
Machine learning, AI,
and data visualization
Public and private partnership
Creative legal standings
Leading the fight against cybercrime
Microsoft 365 unites productivity and security
Microsoft 365
Unlock creativity Built for teamwork Integrated for simplicity Intelligent security
© Copyright Microsoft Corporation. All rights reserved.
Thank you.
FastTrack.microsoft.com
Maximized ROI
Faster Deployment
HigherAdoption
Migrate email, content, and light up Microsoft 365 services
Deploy and securely manage devices
Enable your business and gain end-user adoption
Delivered by Microsoft engineers as part of your subscription
Tight integration with qualified partners for additional services
FastTrack for Microsoft 365Move to the cloud with confidence
“Lorem.”
NAMETITLECompany
“Lorem.”
NAMETITLECompany