31
Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE

Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Intelligent security built for the modern workplaceMirad Maglic

Microsoft CEE

Page 2: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

The modern workplace is built around a culture of empowering people and productivity.

But what about security?

Page 3: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Digital transformation has stressed your existing security practices

On-premises

Clouds

AI

LoB apps

Files

Devices

Branch offices

Remote

work

SaaS apps

Partners

Data

IoT

Page 4: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

The pressures of information protection and privacy feel challenging

$600Bis lost to cyber crime each year²

90%of the world’s data has been created within the last two years¹

4.0%of worldwide revenue: the penalty for GDPR non-compliance (€20MM or $23.6MM)³

Page 5: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

The marketplace is full of fragmented point solutions

IDENTITY

SOLUTIONS

INFORMATION

SOLUTIONS

THREAT

SOLUTIONS

IOT

SECURITY

DATACENTER

SECURITY

SECURITY

MANAGEMENT

COMPLIANCE

TOOLS

INFRASTRUCTURE

SECURITY

END-POINT

SECURITY

Page 6: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

How do you balance security and productivity?

Integrate security into your platform, services, and productivity tools.

Page 7: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Protect users’ identities

and control access to

valuable resources

Protect against advanced

threats and recover quickly

when attacked

Ensure documents and

emails are seen only by

authorized people

Gain visibility and control

over security tools

Identity & access management

Threatprotection

Security management

Information protection

Intelligent security

Page 8: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Identity may be your biggest weakness

of passwords are duplicates²

73%of passwords are eventually compromised³

40%The global mobile workforce by 2020¹

~2B

Page 9: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Sarah is a remote worker

based in the United States and

her credentials experience a

simultaneous login attempt

from across the world.

Device Health

Group Membership

Platform

Location*************

Risk

Page 10: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

More ways to safeguard credentials

Multi-factor

authentication

Move beyond

passwords

Leaked credential

reporting and monitoring

Privileged identity

management

***************

****

Additional safety measures

can be applied to Sarah’s

identity to increase security.

Page 11: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Protect users’ identities

and control access to

valuable resources

Protect against advanced

threats and recover quickly

when attacked

Ensure documents and

emails are seen only by

authorized people

Gain visibility and control

over security tools

Identity & access management

Threatprotection

Security management

Information protection

Intelligent security

Page 12: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

80%of employees use non-approved apps for work¹

1/3of successful attacks against enterprises will be on shadow IT resources by 2020²

Information protection is a complicated challenge

88%of organizations are no longer confident they can detect and prevent loss of sensitive data³

Page 13: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Phil is trying to download a

sensitive work document that’s

stored in a cloud app onto his

unmanaged device.

Role

Group

Client

Health

Config

Risk

Real-time control

Device not managed

Policy Proxy

Page 14: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Information about the incident is

collected alongside data from

firewalls and proxies, and shared with

IT for visibility—providing ongoing

risk assessment and analytics.

Page 15: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Protect users’ identities

and control access to

valuable resources

Protect against advanced

threats and recover quickly

when attacked

Ensure documents and

emails are seen only by

authorized people

Gain visibility and control

over security tools

Identity & access management

Threatprotection

Security management

Information protection

Intelligent security

Page 16: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

93%of malware is polymorphic

50Kcorporate identities attacked every month

<48hours after a breach, an attacker will have control of a network

Attacks are more sophisticated than ever

Page 17: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Ellen receives an email that

appears safe, but is actually

cleverly disguised malware.

As the malware attempts to

enter the network, security

controls detect the abnormal

behavior based on latest

shared intelligence.

Page 18: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Ben can either receive a

notification of a breach or

anomaly, accompanied by

recommendations.

Or, he can enable automatic

remediation, depending

on severity.

Page 19: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Protect users’ identities

and control access to

valuable resources

Protect against advanced

threats and recover quickly

when attacked

Ensure documents and

emails are seen only by

authorized people

Gain visibility and control

over security tools

Identity & access management

Threatprotection

Security management

Information protection

Intelligent security

Page 20: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

70%of organizations report having more difficulty managing endpoint risk²

75number of security vendors an average organization uses¹

56%The amount of alerts IT can investigate in a day³

Security operations must modernize

Page 21: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Ryan is the security manager

for his organization.

He has to manage a patchwork

of security solutions, some

legacy, others new.

This approach makes it difficult for

Ryan to maintain the visibility,

confidence, and ability he needs to

quickly respond to threats.

Page 22: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Ryan recommended a new,

platform-driven approach to

security management for a

seamless, connected experience.

Page 23: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Identity & access management

Threatprotection

Security management

Information protection

Intelligent security built in, not bolted on

Microsoft platform

Page 24: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Microsoft Intelligent Security Graph

400Bemails

analyzed

1.2Bdevices

scanned each month

200+global cloud

customer and commercial services

930Mthreats detected on devices every month

Shared threat data from partners,

researchers, and law enforcement worldwide

Botnet data from Microsoft Digital

Crimes Unit

18B+Bing web pages

scanned 450Bmonthly

authentications

Enterprise security

for 90% of

Fortune 500

750M+Azure user accounts

Azure

Outlook

Xbox Live

Bing

OneDrive

Windows

Microsoftaccounts

Microsoft platform

Page 25: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Microsoft Intelligent Security Association

https://www.microsoft.com/en-us/security/association

Collaboration strengthens

protection

Improved threat

discoverability

Shared

intelligenceIntelligentSecurityGraph

Extend security for

mutual customers

Page 26: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Microsoft Digital Crimes Unit

Investigations, forensics,

and analytics

Machine learning, AI,

and data visualization

Public and private partnership

Creative legal standings

Leading the fight against cybercrime

Page 27: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

Microsoft 365 unites productivity and security

Microsoft 365

Unlock creativity Built for teamwork Integrated for simplicity Intelligent security

Page 28: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

© Copyright Microsoft Corporation. All rights reserved.

Thank you.

Page 29: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

FastTrack.microsoft.com

Maximized ROI

Faster Deployment

HigherAdoption

Migrate email, content, and light up Microsoft 365 services

Deploy and securely manage devices

Enable your business and gain end-user adoption

Delivered by Microsoft engineers as part of your subscription

Tight integration with qualified partners for additional services

FastTrack for Microsoft 365Move to the cloud with confidence

Page 30: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

“Lorem.”

NAMETITLECompany

Page 31: Intelligent security built for the modern workplace · Intelligent security built for the modern workplace Mirad Maglic Microsoft CEE. The modern workplace ... Files Devices Branch

“Lorem.”

NAMETITLECompany