executive keynote: microsoft - dell technologies us · office 365. on-premises. in the era of cloud...

25
Trustworthy Computing: Stay Secure and Productive in a connected, mobile world Chris Papaphotis Commercial and Partner Director, Microsoft

Upload: others

Post on 21-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Trustworthy Computing: Stay Secure and Productive in a connected, mobile world

Chris PapaphotisCommercial and Partner Director, Microsoft

Page 2: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Our Customers need to evolve in the new Era while Building their Infrastructure on Trust

Cloud is transforming Technology

Technology is transforming Business

Page 3: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

86% of CEOs believe technology will transform their business more than any other global trend

26% set a clear vision for digital transformation

Source: Digital Transformation Infographic by Forrester

19% believe their companies have the technology to transform

Source: Digital Transformation nfographic by Forrester

73% of Fortune 500 CEOs said pace of technology change is a challenge

Source: Fortune 500 CEO Survey

Technology is transforming Businesses

Page 4: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

“CYBER SECUR IT Y I S A BUSINESS OWNER ISSUE .”

Impact of lost productivity and growth

Average cost of a data breach (15% YoY increase)

$3.0 TRILL ION $3.5 MILL ION

Corporate liability coverage.

$500 MILL ION

In a Connected, Mobile World, Cyber Threats are the MAJOR IT RISK

Page 5: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

EVOLUTION OF ATTACKS

Mischief

Script Kiddies

Unsophisticated

Fraud and Theft

Organized Crime

More sophisticated

Damage and Disruption

Nations, Terror Groups, Activists

Very sophisticated and well resourced

Page 6: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Data Breaches & Cybercrime

Page 7: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Traditional Workplace

Multiple Devices

User and Business Owned

Cloud Managed & SaaS Apps

Automated

Proactive

Self-Service

Modern Workplace

Single Device

Business Owned

Corporate Network & Legacy Apps

Manual

Reactive

High-touch

Page 8: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

On-premises

Apps & SaaS

Office 365

Page 9: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Office 365

Company-owned and personal devices

On-premises

Page 10: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Data$$

On-premises

Office 365

Page 11: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

$$

Office 365

On-premises

In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure

Page 12: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

$$

Office 365

On-premises

Data LossMalware

Trojan Horses

Compromised Identity

Virus

Shadow IT

Personal data Leakage

Page 13: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Information Rights ManagementMobile Device

& Application Management

Cloud Access Security Broker

SIEM

Data Loss Prevention

User & Entity Behavioral Analytics

Mobile Data Loss Prevention

Threat Detection

Identity governance

Single-sign on

Cloud Data Loss Prevention

Conditional access

Discovery

Cloud visibility

Secure collaboration

Cloud anomaly detection

Identity & Access Management

Page 14: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Enterprise Security without compromising Productivity

Mobile device & app management

Information protection

Identity and access management

Threat protection

Holistic and innovative solution for protection across users, devices, apps and data

Protect at thefront door

Detect &remediate attacks

Protect yourdata anywhere

Page 15: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Windows 10 Security on Modern Devices (Fresh Install or upgraded from 64-bit Windows 8 )

POST-BREACHPRE-BREACH

Mobile device & app management

Information protection

Identity and access management

Threat protection

Detect and Remediate Advanced Attacks

Page 16: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

WINDOWS DEFENDER ADVANCED THREAT PROTECTION

DETECT ADVANCED ATTACKS AND REMEDIATE BREACHES

Unique threat intelligence knowledge base Unparalleled threat optics provide detailed actor profiles1st and 3rd party threat intelligence data.

Rich timeline for investigationEasily understand scope of breach. Data pivoting across endpoints. Deep file and URL analysis.

Behavior-based, cloud-powered breach detectionActionable, correlated alerts for known and unknown adversaries. Real-time and historical data.

Built in to WindowsNo additional deployment & infrastructure. Continuously up-to-date, lower costs.

Page 17: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Mobile ProductivityEnable a mobile experience that works

the way employees want it to.

Device choice

Easy accessto resources

Self-service options

Familiar Office apps

Data Protection Ensure that the right data protection

is applied to the right scenarios.

User, device, app,file control

Conditional access

Protectionafter access

Management Tools and services that empower IT pros to do strategically more with less.

Unified management Cloud-based scalability and reliability

24/7

Deployment support

Enable Mobile Productivity without compromising Security

Page 18: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Intelligent security

Unlocks creativity

Built for teamwork

Integratedfor simplicity

Digitally Transforming the Modern Workplace

Lead your Customers to Cloud withModern Desktop deploying Genuine Windows 10 & Office 365. Evolve to Microsoft 365.

- Creativity- Communication- Collaboration- Productivity

- Security & Compliance- Simple Administration- Lower TCO- New culture of Work

Microsoft 365

Page 19: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Discover Manage Protect Report

Microsoft cloud services make it easier to locate and identify the personal data you collect, so you can more easily find and evaluate the data across your organization.

Microsoft cloud services make it possible to centralize processing by more effectively managing applicable policies, data categorizations, and use cases.

Microsoft cloud services synthesize threat intelligence and provide tools that help you get the greatest benefit from that intelligence for your security efforts.

Microsoft cloud services centralize and streamline technical and administrative steps that are required for compliance, such as demonstrating due diligence and handling data access requests.

Office & Office 365:Data Loss PreventionAdvanced Data GovernanceOffice 365 eDiscovery

Enterprise Mobility + Security (EMS):Microsoft Cloud App Security

Windows 10:PowerShell

Dynamics 365: Audit Data and User ActivityReport & Analytics with Dynamics 365Dynamics 365 metadata & data models

SQL Server and Azure SQL Database:SQL Query Language

Microsoft Azure:Microsoft Azure Data Catalog

Windows 10 & Windows Server 2016:Microsoft Data Classification Toolkit

Office & Office 365: Advanced Data Governance

Enterprise Mobility + Security (EMS):Microsoft Azure Information Protection

Windows 10:Permissions

Dynamics 365:Security concepts for Microsoft Dynamics 365

Enterprise Mobility + Security (EMS):Azure Active Directory (Azure AD)Azure Active Directory PremiumCloud App SecurityMicrosoft Cloud App SecurityMicrosoft IntuneMicrosoft Azure Information Protection

SQL Server and Azure SQL Database:Azure SQL Database firewallSQL Server authenticationDynamic Data Masking (DDM)Row-Level Security (RLS)Transparent Data EncryptionAlways EncryptedAuditing for SQL Database and SQL Server auditSQL Database Threat Detection

Microsoft Azure:Azure Security CenterData Encryption in Azure StorageAzure Key VaultLog Analytics

Windows 10 & Windows Server 2016:Windows HelloWindows Defender AntivirusWindows Defender Advanced Threat ProtectionDevice GuardCredential GuardBitLocker Drive EncryptionWindows Information ProtectionShielded Virtual MachinesJust Enough Administration and Just in Time Administration

Office & Office 365: Advanced Threat ProtectionThreat IntelligenceAdvanced Security ManagementOffice 365 Audit Logs

Office & Office 365: Service AssuranceOffice 365 Audit LogsCustomer Lockbox

Windows 10:Windows Defender Advanced Threat Protection (ATP)

Dynamics 365Report & Analytics with Dynamics 365

Microsoft Azure:Azure Auditing and Logging

Enable Compliance without compromising Productivity

Page 20: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Identity and Access Management

Virtualization Based Security / Advanced Threat Protection

Compliance and Data Protection

Threat Protection and Information Protection

BUSINESS I S BUILT ON TRUST . TRUST I S BUILT ON GENUINEP R OT E C T Y O U R I T I N V E S T M E N T U S I N G M O D E R N D E V I C E S W I T H P R O P E R LY L I C E N S E D S O F T WA R E

Page 21: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Source: BSA

Page 22: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Source: BSA

Page 23: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Workshop: A survival guide on building a secure IT Infrastructure in Modern Workplace

Page 24: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

Software price is too good to be true.

Software comes from file sharing apps or is circulated through email, social networks or websites.

Product keys are sold separately from software or they come in bundles of multiple product keys.

Packaging has been opened or is not standard Microsoft packaging.

Product key or installation code doesn’t work, or the software cannot be activated.

Software comes in non-standard or unprofessional packaging.

They are asked to download files to complete activation.

Their PC or other device comes with software already activated.

It is very likely that Customers are victims of Piracy when:

Page 25: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification

THANK YOU