Add single large picture in background to represent security.

34
park the future. May 4 – 8, 2015 Chicago, IL

Transcript of Add single large picture in background to represent security.

Page 1: Add single large picture in background to represent security.

Spark the future.

May 4 – 8, 2015Chicago, IL

Page 2: Add single large picture in background to represent security.

Video

Page 3: Add single large picture in background to represent security.

Enterprise grade protection and compliance: Office 365 today and beyondRudra MitraPartner DirectorOffice 365, Information ProtectionMicrosoft

BRK2159

Page 4: Add single large picture in background to represent security.

Add single large picture in background to represent

security

HOW CAN I PROTECT MY DATA?

Page 5: Add single large picture in background to represent security.

Earning trust

Privacy by design

Continuouscompliance

Built insecurity

Information protection

Operational controls

Organizational controls

Trust

Page 6: Add single large picture in background to represent security.

c

Add single large picture in background to illustrate

environment

WHAT CONTEXT ARE WE WORKING IN?

Page 7: Add single large picture in background to represent security.

Change is constant

Peoples work expectations

Evolving threat landscape

Industry regulations and standards

Page 8: Add single large picture in background to represent security.

Peoples work expectations Information explosion In next decade, mankind’s data will increase 44 times1, while the number of IT

professionals will grow by only 1.4 times… in the next year alone, there will be more data generated than in all of mankind’s history

Of senior managers admit to regularly uploading work files to a personal email or cloud account2

87% Have accidentally sent sensitive information to the wrong person3

58%

1http://www.itpro.co.uk/622942/idc-data-explosion-goes-into-the-zettabytes 2Stroz Friedberg, “On The Pulse: Information Security In American Businesses,” 20133HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012

Page 9: Add single large picture in background to represent security.

Peoples work expectations

DEVICES ARE OUTNUMBERING PEOPLE: 20B BY 2020

Page 10: Add single large picture in background to represent security.

Threat landscape

3525 known security breaches

between April 2005–Dec 2012

600 million breached records

in the US

On average, the cost of one

breached record $194

Which means: that makes the average breach incident cost 5.5

million dollars

Page 11: Add single large picture in background to represent security.

The evolution of attacks

Targeting

Sop

his

tica

tion

Volume and impact

Script kiddies

BLASTER, SLAMMER

Motive: mischief

2003–2004

Page 12: Add single large picture in background to represent security.

The evolution of attacks

2005–PRESENT

Organized crime

RANSOMWARE,

CLICK-FRAUD, IDENTITY

THEFT

Motive: profitScript kiddies

BLASTER, SLAMMER

Motive: mischief

2003–2004

Targeting

Sop

his

tica

tion

Page 13: Add single large picture in background to represent security.

The evolution of attacks

2005–PRESENT

Organized crime

RANSOMWARE,

CLICK-FRAUD, IDENTITY

THEFT

Motive: profitScript kiddies

BLASTER, SLAMMER

Motive: mischief

2012–BEYOND

Nation states,

activists, terror groups

BRAZEN, COMPLEX, PERSISTENT

Motives:IP theft,damage,disruption

2003–2004

Targeting

Sop

his

tica

tion

Page 14: Add single large picture in background to represent security.

Industry regulations and standards

Average per case cost of eDiscovery

$1 million U.S. corporations

currently engaged

in litigation

90% Average number of active lawsuits

for companies larger than $1

billion

147

Page 15: Add single large picture in background to represent security.

EVERYWHERE YOUR DATA EXISTS, MOVES,AND IS SHARED, WE WILL PROTECT IT

OUR PROMISE

Page 16: Add single large picture in background to represent security.

HOW WE DO IT

Page 17: Add single large picture in background to represent security.

Our unique approach

PEOPLE-CENTRIC

PERVASIVE TRANSPARENT

Page 18: Add single large picture in background to represent security.

IT ADMINISTRATORSBUSINESS DECISION MAKER/ IT DECISION

MAKER

COMPLIANCE OFFICER INFORMATION WORKERS/

SMALL BUSINESSES

Who are our users

Page 19: Add single large picture in background to represent security.

BUILT-IN COMPLIANCE AND SECURITY FOUNDATION WITH UNIFIED EXPERIENCES ACROSS SERVICES AND APPLICATIONS

PERVASIVE

Built into Office 365 and with unified policy management

Available across services and application in different platforms

Policy tied to data, travels with data

Page 20: Add single large picture in background to represent security.

DemoPersona: IT Administrator

Levon EsibovGroup Program ManagerOffice 365, Information Protection

Page 21: Add single large picture in background to represent security.

Compliance Center Automatic Archive Scaling Advanced Threat Protection – General

Availability in June

Announcements

Page 22: Add single large picture in background to represent security.

PROACTIVE VISIBILITY INTO DATA, AND ACTIVITIES WITH YOUR DATA

TRANSPARENT

IT can quickly and accurately discover data required for compliance

Organizations have visibility into user and operational events impacting data

Organizations can import and correlate operational events across multiple services themselves or with the help of partners

Page 23: Add single large picture in background to represent security.

DemoPersona: Compliance Officer

Kamal JanardhanGroup Program ManagerOffice 365, Information Protection

Page 24: Add single large picture in background to represent security.

Drive Shipping for O365 O365 eDiscovery integrated with Equivio - Preview in

June Auditing for AAD, Exchange, and SharePoint in O365 Management Activity API for Audit feeds - Preview in

June Sign-up at http://aka.ms/activityapi

Announcements

Page 25: Add single large picture in background to represent security.

PEOPLE ARE PART OF THE SOLUTION, AND INVOLVED IN MAINTAINING SECURITY AND COMPLIANCE

PEOPLE CENTRIC

Ensure that worker productivity is not compromised at the cost of compliance and security (enable productivity while providing security)

Corporate data will be accessed and available on personal devices

Training users is important, but provide them with built in protection

Page 26: Add single large picture in background to represent security.

DemoPersona: Information Worker

Asaf KashiGroup Program ManagerOffice 365, Information Protection

Page 27: Add single large picture in background to represent security.

DLP in OneDrive - Preview in June DLP in Office 2016 clients - Preview in June Office 365 Device Protection now available

in O365

Announcements

Page 28: Add single large picture in background to represent security.

Our Portfolio

APPLICATIONS DEVICESINTEGRATED

SERVICES

EDISCOVERY & EQUIVIO

DLP

UNIFIED COMPLIANCE CENTER

RETENTION

ENCRYPTION

AUDITING

ADVANCED THREAT PROTECTIONOUTLOOK, OFFICE CLIENTS, SNACK APPS

MDM WITH INTUNE

AAD MULTI-FACTOR AUTH

Page 29: Add single large picture in background to represent security.

Rapid feedbackContinuous innovation

Office 365

Exchange/SharePoint serverSimplified update modelCumulative update stats

Service packs

Cloud-first delivery

Consistent release rhythm

Cumulative update

Cumulative update

Service pack

Cumulative update

Newversion

Our continuous promise to on-premises

Next version

Exchange 2016 SharePoint 2016

Page 30: Add single large picture in background to represent security.

Present

260% growth in tenants with DLP configured last year

11M mailboxes under compliance and growing faster than O365 growth

Microsoft blocks 10 million spam messages per minute

Building momentum

185M policy hits per day for sensitive info

8000 unique compliance searches per day

100M audit events a day (only SPO/AAD in preview)

220% yearly growth in encrypted messages

Protecting >100K messages and documents per second

600% yearly growth in information protection HW capacity

Page 31: Add single large picture in background to represent security.

WHERE ARE WE GOING?

Improving capabilities in the cloud and on-premises, across services and servers

Mobile first, cloud first… people first

Building a robust platform for partners

Compliance and security across Office 365, Microsoft, and external services and clients

Page 32: Add single large picture in background to represent security.

O365 Information Protection sessionsSESSION CODEMeet Office 365 Compliance Center: Your One Stop Shop for Everything Compliance BRK2165: 5/5 – 3:15 PM

Extending Microsoft Office 365 Visibility, Security and Compliance: Office 365 Management APIs

BRK2180: 5/6 – 9:00 AM

Evolving Email Protection for Tomorrow's Needs with Exchange Online Protection BRK2198: 5/6 – 10:45 AM

Your Encryption Controls in Office 365: Across Devices and Platforms BRK3172: 5/6 – 1:30 PM

End-to-End Data Loss Prevention BRK3181: 5/6 – 9:00 AM

Device and Data Protection with Mobile Device Management in Office 365 BRK3113: 5/6 – 3:15 AM

Keeping Your Data in Place with Office 365 Archiving and Retention BRK2144: 5/6 – 10:45 AM

eDiscovery Redefined: Real Time and In-Place BRK3121: 5/6 – 5:00 PM

Deep Dive into How Microsoft Handles Spam and Advanced Email Threats BRK3106: 5/6 – 5:00 PM

Experts Unplugged: Office 365 Security BRK2193: 5/7 – 3:15 PM

Experts Unplugged: Office 365 Compliance BRK2145: 5/7 – 5:00 PM

Auditing for Office 365 BRK3126: 5/8 – 10:45 AM

Page 33: Add single large picture in background to represent security.

Visit Myignite at http://myignite.microsoft.com or download and use the Ignite Mobile App with the QR code above.

Please evaluate this sessionYour feedback is important to us!

Page 34: Add single large picture in background to represent security.

© 2015 Microsoft Corporation. All rights reserved.