SlideShare une entreprise Scribd logo
1  sur  34
Sensitivity: Internal
Sensitivity: Internal
http://windowstechpro.com
Sensitivity: Internal
The challenges we face today in
keeping users productive while
protecting company information
Sensitivity: Internal
Mobility is the new normal
52% of information workers
across 17 countries report
using three or more devices
for work*
52%
90% of enterprises will have
two or more mobile operating
systems
90%
>80% of employees admit to
using non-approved software-
as-a-service (SaaS)
applications in their jobs***
>80%
Sensitivity: Internal
Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
Sensitivity: Internal
Rich PC management will continue to be an on-premises workload
Enterprise Mobility Management will be delivered as a Cloud service
IT Pros and end users want consistent and integrated experiences
Organizations will begin to shift to MDM-like management for their PCs
Hybrid Identity is the new control plane for the enterprise
Data must become self-protecting
The user is the final authority on their personal devices
IT is the final authority on corporate assets on any device
Sensitivity: Internal
User freedomSecure against new threats Do more with less
Customers need
Identity – driven security Productivity without
compromise
Comprehensive
solutions
Microsoft solution
ENTERPRISE MOBILITY + SECURITY
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
Sensitivity: Internal
What's Driving Change?
Devices Apps Data
Sensitivity: Internal
1. Protect at the front door
Safeguard your resources at the front door with innovative and advanced risk-based
conditional accesses
2. Protect your data against user mistakes
Gain deep visibility into user, device, and data
activity on-premises and in the cloud.
3. Detect attacks before they cause damage
Uncover suspicious activity and pinpoint threats with deep visibility and
ongoing behavioral analytics.
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
What is the Enterprise Mobility & Security?
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
Sensitivity: Internal
One User. One Identity. Everywhere.
Desktop
Virtualization
Access &
Information
Protection
Mobile Device &
Application
Management
Hybrid
Identity
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
Sensitivity: Internal
Public Identity as the control point
Active Directory
Sensitivity: Internal
Identity is the foundation for enterprise
Sensitivity: Internal
Sensitivity: Internal
Hybrid Identity
Unify your environment
Create a centralized identity
across on-premises and cloud
Use identity federation to
maintain centralized
authentication and securely share
and collaborate with external
users and businesses
Enable users
Provide users with self-service
experiences to keep them
productive
Enable single sign-on for users
across all the resources they need
access to
Protect your data
Enforce strong authentication when
users access resources and apply
conditional access controls to
sensitive company information
Configure single sign-on across all
company applications
Ensure compliance with governance,
attestation and reporting
Protect your dataEnable users
User
Unify your environment
User
Sensitivity: Internal
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
What is the Enterprise Mobility & Security?
Sensitivity: Internal
Device choice. Simplified management.
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Consistent user experience
Simplified device enrollment and registration
Single console to manage devices
Application management for Office and LOB
Sensitivity: Internal
Office365andIntuneprotectdataonmobiledevices
withoutsacrificinguserproductivity
Secure Collaboration
• IT can set and manage policy around how data is shared with
managed and non-managed apps
• In addition to Office mobile apps for iOS and Android, Intune will
support management of LOB iOS and Android apps
Rich Office Experience
• Give users familiar, full-featured Office applications
• Maintain document formatting across platforms
• Securely store, sync, and share content via OneDrive for Business
Managing Office Mobile Apps with Intune
Personal
Corporate
Sensitivity: Internal
Sensitivity: Internal
User and Device Management
Protect your data
Protect corporate information by
selectively wiping apps and data
from retired/lost devices
A common identity for accessing
resources on-premises and in the
cloud
Identify which mobile devices have
been compromised
Enable users
Access to company resources
consistently across devices
Simplified registration and enrollment of
devices
Synchronized corporate data
User
Unify your environment
On-premises and cloud-based
management of devices within a single
console.
Simplified, user-centric application
management across devices
Comprehensive settings management
across platforms, including certificates,
VPNs, and wireless network profiles
User
Sensitivity: Internal
Microsoft Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
What is the Enterprise Mobility & Security?
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
Sensitivity: Internal
Right info. Right person. Right device.
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Dynamic Access Control
Rights management
Secure access to work files
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
STRICTLY CONFIDENTIAL
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
FINANCE
CONFIDENTIAL
Add persistent labels defining sensitivity to filesClassify data according to policies– automatically or by user
Sensitivity: Internal
Sensitivity: Internal
Employees Business partners Customers
Secure and protect against new threats
Maximum productivity experience
Comprehensive and integrated
Apps DevicesDataUsers
Sensitivity: Internal
Enterprise Mobility +Security
Sensitivity: Internal
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection Premium P2
Intelligent classification and
encryption for files shared
inside and outside your
organization
1)(includes all capabilities in P
Azure Information
Protection Premium P1
Encryption for all files and
storage locations
Cloud-based file tracking
Microsoft Cloud
App Security
Enterprise-grade visibility,
control, and protection for
your cloud applications
Microsoft Advanced
Threat Analytics
Protection from advanced
targeted attacks leveraging
user and entity behavioral
analytics
Microsoft Intune
Mobile device and app
management to protect
corporate apps and data on
any device
Azure Active Directory
Premium P2
Identity and access
management with advanced
protection for users and
privileged identities
1)includes all capabilities in P(
Azure Active Directory
Premium P1
Secure single sign-on to
cloud and on-premises apps
MFA, conditional access, and
advanced security reporting
EMS
E3
EMS
E5
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
Sensitivity: Internal
Softkrishnan@gmail.com
Softkrishnan@outlook.com

Contenu connexe

Tendances

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 

Tendances (20)

Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 

Similaire à Overview of Microsoft Enterprise Mobility & Security(EMS)

05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 

Similaire à Overview of Microsoft Enterprise Mobility & Security(EMS) (20)

Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Overview of Microsoft Enterprise Mobility & Security(EMS)

  • 3. Sensitivity: Internal The challenges we face today in keeping users productive while protecting company information
  • 4. Sensitivity: Internal Mobility is the new normal 52% of information workers across 17 countries report using three or more devices for work* 52% 90% of enterprises will have two or more mobile operating systems 90% >80% of employees admit to using non-approved software- as-a-service (SaaS) applications in their jobs*** >80%
  • 5. Sensitivity: Internal Is it possible to keep up? Employees Business partners Customers Is it possible to stay secure? Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 6. Sensitivity: Internal Rich PC management will continue to be an on-premises workload Enterprise Mobility Management will be delivered as a Cloud service IT Pros and end users want consistent and integrated experiences Organizations will begin to shift to MDM-like management for their PCs Hybrid Identity is the new control plane for the enterprise Data must become self-protecting The user is the final authority on their personal devices IT is the final authority on corporate assets on any device
  • 7. Sensitivity: Internal User freedomSecure against new threats Do more with less Customers need Identity – driven security Productivity without compromise Comprehensive solutions Microsoft solution ENTERPRISE MOBILITY + SECURITY Identity-driven security Comprehensive solution Managed mobile productivity
  • 8. Sensitivity: Internal What's Driving Change? Devices Apps Data
  • 9. Sensitivity: Internal 1. Protect at the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Protect your data against user mistakes Gain deep visibility into user, device, and data activity on-premises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics.
  • 10. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory What is the Enterprise Mobility & Security? Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key
  • 11. Sensitivity: Internal One User. One Identity. Everywhere. Desktop Virtualization Access & Information Protection Mobile Device & Application Management Hybrid Identity Single sign-on Self-service experiences Common identity Conditional access SaaS applications
  • 12. Sensitivity: Internal Public Identity as the control point Active Directory
  • 13. Sensitivity: Internal Identity is the foundation for enterprise
  • 15. Sensitivity: Internal Hybrid Identity Unify your environment Create a centralized identity across on-premises and cloud Use identity federation to maintain centralized authentication and securely share and collaborate with external users and businesses Enable users Provide users with self-service experiences to keep them productive Enable single sign-on for users across all the resources they need access to Protect your data Enforce strong authentication when users access resources and apply conditional access controls to sensitive company information Configure single sign-on across all company applications Ensure compliance with governance, attestation and reporting Protect your dataEnable users User Unify your environment User
  • 17. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key What is the Enterprise Mobility & Security?
  • 18. Sensitivity: Internal Device choice. Simplified management. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Consistent user experience Simplified device enrollment and registration Single console to manage devices Application management for Office and LOB
  • 19. Sensitivity: Internal Office365andIntuneprotectdataonmobiledevices withoutsacrificinguserproductivity Secure Collaboration • IT can set and manage policy around how data is shared with managed and non-managed apps • In addition to Office mobile apps for iOS and Android, Intune will support management of LOB iOS and Android apps Rich Office Experience • Give users familiar, full-featured Office applications • Maintain document formatting across platforms • Securely store, sync, and share content via OneDrive for Business Managing Office Mobile Apps with Intune Personal Corporate
  • 21. Sensitivity: Internal User and Device Management Protect your data Protect corporate information by selectively wiping apps and data from retired/lost devices A common identity for accessing resources on-premises and in the cloud Identify which mobile devices have been compromised Enable users Access to company resources consistently across devices Simplified registration and enrollment of devices Synchronized corporate data User Unify your environment On-premises and cloud-based management of devices within a single console. Simplified, user-centric application management across devices Comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles User
  • 22. Sensitivity: Internal Microsoft Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory What is the Enterprise Mobility & Security? Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key
  • 23. Sensitivity: Internal Right info. Right person. Right device. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Dynamic Access Control Rights management Secure access to work files
  • 26. Sensitivity: Internal STRICTLY CONFIDENTIAL CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules FINANCE CONFIDENTIAL Add persistent labels defining sensitivity to filesClassify data according to policies– automatically or by user
  • 28. Sensitivity: Internal Employees Business partners Customers Secure and protect against new threats Maximum productivity experience Comprehensive and integrated Apps DevicesDataUsers
  • 30. Sensitivity: Internal Information protection Identity-driven security Managed mobile productivity Identity and access management Azure Information Protection Premium P2 Intelligent classification and encryption for files shared inside and outside your organization 1)(includes all capabilities in P Azure Information Protection Premium P1 Encryption for all files and storage locations Cloud-based file tracking Microsoft Cloud App Security Enterprise-grade visibility, control, and protection for your cloud applications Microsoft Advanced Threat Analytics Protection from advanced targeted attacks leveraging user and entity behavioral analytics Microsoft Intune Mobile device and app management to protect corporate apps and data on any device Azure Active Directory Premium P2 Identity and access management with advanced protection for users and privileged identities 1)includes all capabilities in P( Azure Active Directory Premium P1 Secure single sign-on to cloud and on-premises apps MFA, conditional access, and advanced security reporting EMS E3 EMS E5