OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
MICROSOFT CONFIDENTIAL Page 1 A Secure Cloud-Computing Platform Azure Partner Architects| 4/11/2011 David McGhee | Windows Azure Platform Technical Specialist.
…your guide through terrain
Why Microsoft makes the cloud shine Nigel Watson, Platform Strategy Advisor.
Optimize for Software + Services Archiving Archiving Protect CommunicationsProtect Communications Advanced SecurityAdvanced Security Manage.
Exchange Server 2010 Personal Archive & Retention Policies Ned Gnichtel Technical Specialist - UC Microsoft Corporation
LOTUS NOTES 8.5. Ease of Filtering/Message Organization: Sort by Who.
Controls for Information Security
“I need to reduce hardware costs and operational overhead.” - IT Manager, Messaging Infrastructure “Our Sales teams need to connect with the right customers.
Video gallery HD video or high resolution photos of attendees H.264 SVC support Personalized collaboration experiences Intuitive controls Consistent.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Exchange Deployment Planning Services Exchange 2010 Compliance, Archiving, Retention.
PreserveDiscover In-Place Archive with secondary quota Available on-prem, online, or EOA Lync Archives into Exchange Search across Primary & Archive –
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
Outlook 2007: Management Tips and Tricks. I. Prepare for July 1 Implementation of UCOP Management Program Address items in EVault – restore.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
Introduction to Exchange Server 2010 Name Title Microsoft Corporation.
Introduction to Exchange Server 2010 Omar El-Sherif Solutions Specialist – Unified Communications Microsoft Egypt.
Version 2.0 for Office 365 Wave 15. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureAdministering.
Srinivas L Technology Specialist – Security | Microsoft
Enterprise Content Management In Microsoft Office SharePoint Server 2007 Lionel Moyal Intervate Solutions
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
OUC207. Identity-centric environment Targeted attacks Cloud computing Regulatory/compliance issues Consumerisation of IT Key trends affecting security.
HIPAA COMPLIANCE WITH DELL
SIM 302. Unprepared UninformedUnaware Untrained Unused.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 9 Configuring Messaging Policy and Compliance.
Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of PST files stored outside of IT control.
Empower the User Outlook, Word, PowerPoint, SharePoint, Mobile Apps, etc. Exchange, SharePoint, Lync, AD, File Server, third parties, etc. Exchange/
Harvinder Bhela General Manager, Exchange Microsoft Corporation SESSION CODE: UNC201
Paul Andrew. Identity-centric environment Targeted attacks Cloud computing Regulatory/compliance issues Consumerization of IT Key trends affecting security.
Module 9 Configuring Messaging Policy and Compliance.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Module 7 Planning and Deploying Messaging Compliance.
Module 11: Designing Security for Network Perimeters.
Exchange Deployment Planning Services Exchange Server 2010 Overview.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
The New Exchange - Archiving and Compliance Steve Chew Senior Technical Product Manager Microsoft Corporation EXL333.
90% 147 $1M Automated time-based criteria to delete Set policies at item or folder level – admin or user Set site level retention polices Search across.
Spam continues to be a problem Volume of spam has increased to 94% of all Spammers are constantly evolving new techniques Malware attacks on.
Implementing Microsoft Exchange Online with Microsoft Office 365
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Kamal Janardhan Lead Program Manager Exchange Product Group Microsoft Corporation SESSION CODE: UNC307 Archiving, Retention and Discovery in Exchange Server.
IS3220 Information Technology Infrastructure Security
Secure Services Shared Hosted MS Exchange 2010.
Microsoft ® Outlook & Microsoft Exchange Delivering Value & Choice across PC, Phone, and Browser The Right Tool for the Job Delivering Value & Choice.
PreserveDiscover In-Place Archive with secondary quota Available on-prem, online, or EOA Storage Management Capture deleted & edited messages Preservation.
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
Trusting Office 365 Privacy Transparency Compliance Security.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
A Winning Combination !! and Good afternoon…
MICROSOFT OUTLOOK and Outlook service Provider
Threat Management Gateway
Demo Advanced Threat Protection
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
ISMS Information Security Management System
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Identity & Access Management
Cloud Computing for Wireless Networks
Presentation transcript:

OSP214

SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE

Compliance Management Information Security Policy Security Privacy & Regulatory Privacy & Regulatory Service Continuity 3

4 Microsoft Confidential

Security Management Threat & Vulnerability Management, Monitoring & Response Edge Routers, Firewalls, Intrusion Detection, Vulnerability scanning Network perimeter Dual-factor Auth, Intrusion Detection, Vulnerability scanning Internal Network Access Control & Monitoring, Anti-Malware, Patch & Config Mgmt Host Secure Engineering (SDL), Access Control & Monitoring, Anti-Malware Application Access Control & Monitoring, File/Data Integrity Data User Account Mgmt, Training & Awareness, Screening Facility Physical controls, video surveillance, Access Control Strategy: employ a risk-based, multi-dimensional approach to safeguarding services and data 5

Microsoft believes that delivering secure software requires Executive commitment Ongoing Process Improvements SDL a mandatory policy at Microsoft since 2004 Technology and Process EducationAccountability

ISO SAS 70 Type I (BPOS-S) SAS 70 Type II (BPOS-D) Services (BPOS and FOPE) ISO SAS 70 Type II Data Centers Safe Harbor Microsoft 7

8

9

10

11

12

13

14

15 Microsoft Confidential

Business Rules for protecting information and systems which store and process information System or procedural specific requirements that must be met Step by step procedures A process or system to assure the implementation of policy 16

17

18

19 Microsoft Confidential

20

21

22

Secondary mailbox with separate quota Appears in Outlook and Outlook Web App Automated and time- based criteria Set policies at item or folder level Expiry date shown in message EWS Support Capture deleted and edited messages Offers single item restore Notify user on hold Web-based UI Search primary, archive, and recoverable items Delegate through roles-based admin Annotate content De-duplication after discovery Alert sender about possible risks or policy violations Option of customized MailTips MailTipsMailTips Inspect both messages and attachments Apply controls to all sent and received Delegate through roles- based admin Apply IRM automatically Access messages in OWA, EAS Decrypt protected messages to enable search, filtering, journaling, transport rules Protect sensitive voic Extend access to partners Transport Rules IRM Integration