Upload
william-black
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
Spark the future.
May 4 – 8, 2015Chicago, IL
Video
Enterprise grade protection and compliance: Office 365 today and beyondRudra MitraPartner DirectorOffice 365, Information ProtectionMicrosoft
BRK2159
Add single large picture in background to represent
security
HOW CAN I PROTECT MY DATA?
Earning trust
Privacy by design
Continuouscompliance
Built insecurity
Information protection
Operational controls
Organizational controls
Trust
c
Add single large picture in background to illustrate
environment
WHAT CONTEXT ARE WE WORKING IN?
Change is constant
Peoples work expectations
Evolving threat landscape
Industry regulations and standards
Peoples work expectations Information explosion In next decade, mankind’s data will increase 44 times1, while the number of IT
professionals will grow by only 1.4 times… in the next year alone, there will be more data generated than in all of mankind’s history
Of senior managers admit to regularly uploading work files to a personal email or cloud account2
87% Have accidentally sent sensitive information to the wrong person3
58%
1http://www.itpro.co.uk/622942/idc-data-explosion-goes-into-the-zettabytes 2Stroz Friedberg, “On The Pulse: Information Security In American Businesses,” 20133HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012
Peoples work expectations
DEVICES ARE OUTNUMBERING PEOPLE: 20B BY 2020
Threat landscape
3525 known security breaches
between April 2005–Dec 2012
600 million breached records
in the US
On average, the cost of one
breached record $194
Which means: that makes the average breach incident cost 5.5
million dollars
The evolution of attacks
Targeting
Sop
his
tica
tion
Volume and impact
Script kiddies
BLASTER, SLAMMER
Motive: mischief
2003–2004
The evolution of attacks
2005–PRESENT
Organized crime
RANSOMWARE,
CLICK-FRAUD, IDENTITY
THEFT
Motive: profitScript kiddies
BLASTER, SLAMMER
Motive: mischief
2003–2004
Targeting
Sop
his
tica
tion
The evolution of attacks
2005–PRESENT
Organized crime
RANSOMWARE,
CLICK-FRAUD, IDENTITY
THEFT
Motive: profitScript kiddies
BLASTER, SLAMMER
Motive: mischief
2012–BEYOND
Nation states,
activists, terror groups
BRAZEN, COMPLEX, PERSISTENT
Motives:IP theft,damage,disruption
2003–2004
Targeting
Sop
his
tica
tion
Industry regulations and standards
Average per case cost of eDiscovery
$1 million U.S. corporations
currently engaged
in litigation
90% Average number of active lawsuits
for companies larger than $1
billion
147
EVERYWHERE YOUR DATA EXISTS, MOVES,AND IS SHARED, WE WILL PROTECT IT
OUR PROMISE
HOW WE DO IT
Our unique approach
PEOPLE-CENTRIC
PERVASIVE TRANSPARENT
IT ADMINISTRATORSBUSINESS DECISION MAKER/ IT DECISION
MAKER
COMPLIANCE OFFICER INFORMATION WORKERS/
SMALL BUSINESSES
Who are our users
BUILT-IN COMPLIANCE AND SECURITY FOUNDATION WITH UNIFIED EXPERIENCES ACROSS SERVICES AND APPLICATIONS
PERVASIVE
Built into Office 365 and with unified policy management
Available across services and application in different platforms
Policy tied to data, travels with data
DemoPersona: IT Administrator
Levon EsibovGroup Program ManagerOffice 365, Information Protection
Compliance Center Automatic Archive Scaling Advanced Threat Protection – General
Availability in June
Announcements
PROACTIVE VISIBILITY INTO DATA, AND ACTIVITIES WITH YOUR DATA
TRANSPARENT
IT can quickly and accurately discover data required for compliance
Organizations have visibility into user and operational events impacting data
Organizations can import and correlate operational events across multiple services themselves or with the help of partners
DemoPersona: Compliance Officer
Kamal JanardhanGroup Program ManagerOffice 365, Information Protection
Drive Shipping for O365 O365 eDiscovery integrated with Equivio - Preview in
June Auditing for AAD, Exchange, and SharePoint in O365 Management Activity API for Audit feeds - Preview in
June Sign-up at http://aka.ms/activityapi
Announcements
PEOPLE ARE PART OF THE SOLUTION, AND INVOLVED IN MAINTAINING SECURITY AND COMPLIANCE
PEOPLE CENTRIC
Ensure that worker productivity is not compromised at the cost of compliance and security (enable productivity while providing security)
Corporate data will be accessed and available on personal devices
Training users is important, but provide them with built in protection
DemoPersona: Information Worker
Asaf KashiGroup Program ManagerOffice 365, Information Protection
DLP in OneDrive - Preview in June DLP in Office 2016 clients - Preview in June Office 365 Device Protection now available
in O365
Announcements
Our Portfolio
APPLICATIONS DEVICESINTEGRATED
SERVICES
EDISCOVERY & EQUIVIO
DLP
UNIFIED COMPLIANCE CENTER
RETENTION
ENCRYPTION
AUDITING
ADVANCED THREAT PROTECTIONOUTLOOK, OFFICE CLIENTS, SNACK APPS
MDM WITH INTUNE
AAD MULTI-FACTOR AUTH
Rapid feedbackContinuous innovation
Office 365
Exchange/SharePoint serverSimplified update modelCumulative update stats
Service packs
Cloud-first delivery
Consistent release rhythm
Cumulative update
Cumulative update
Service pack
Cumulative update
Newversion
Our continuous promise to on-premises
Next version
Exchange 2016 SharePoint 2016
Present
260% growth in tenants with DLP configured last year
11M mailboxes under compliance and growing faster than O365 growth
Microsoft blocks 10 million spam messages per minute
Building momentum
185M policy hits per day for sensitive info
8000 unique compliance searches per day
100M audit events a day (only SPO/AAD in preview)
220% yearly growth in encrypted messages
Protecting >100K messages and documents per second
600% yearly growth in information protection HW capacity
WHERE ARE WE GOING?
Improving capabilities in the cloud and on-premises, across services and servers
Mobile first, cloud first… people first
Building a robust platform for partners
Compliance and security across Office 365, Microsoft, and external services and clients
O365 Information Protection sessionsSESSION CODEMeet Office 365 Compliance Center: Your One Stop Shop for Everything Compliance BRK2165: 5/5 – 3:15 PM
Extending Microsoft Office 365 Visibility, Security and Compliance: Office 365 Management APIs
BRK2180: 5/6 – 9:00 AM
Evolving Email Protection for Tomorrow's Needs with Exchange Online Protection BRK2198: 5/6 – 10:45 AM
Your Encryption Controls in Office 365: Across Devices and Platforms BRK3172: 5/6 – 1:30 PM
End-to-End Data Loss Prevention BRK3181: 5/6 – 9:00 AM
Device and Data Protection with Mobile Device Management in Office 365 BRK3113: 5/6 – 3:15 AM
Keeping Your Data in Place with Office 365 Archiving and Retention BRK2144: 5/6 – 10:45 AM
eDiscovery Redefined: Real Time and In-Place BRK3121: 5/6 – 5:00 PM
Deep Dive into How Microsoft Handles Spam and Advanced Email Threats BRK3106: 5/6 – 5:00 PM
Experts Unplugged: Office 365 Security BRK2193: 5/7 – 3:15 PM
Experts Unplugged: Office 365 Compliance BRK2145: 5/7 – 5:00 PM
Auditing for Office 365 BRK3126: 5/8 – 10:45 AM
Visit Myignite at http://myignite.microsoft.com or download and use the Ignite Mobile App with the QR code above.
Please evaluate this sessionYour feedback is important to us!
© 2015 Microsoft Corporation. All rights reserved.