Srinivas L Technology Specialist – Security | Microsoft

Slides:



Advertisements
Similar presentations
People Ready Business Graham Harrop Director, Government Microsoft UK Ltd Transformational Government Enabled by Technology.
Advertisements

Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Secure Desktop Name Title Microsoft Corporation. Agenda.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Unified. Simplified. Unified Communications Launch 2007.
Jovan Milošević Solution Specialist, EPG Microsoft Software d.o.o.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Communication Challenges Communication Overload Distributed teams, partners, and customers High cost of communications Security and compliance.
As Never Seen Before Ronen Gabbay Microsoft Exchange Regional Director U-BTech & Hi-Tech CTO.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 6 Planning and Deploying Messaging Security.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
Alex Nikolayev Program Manager Identity and Security Division Microsoft Corporation SESSION CODE: SIA324 Cristian Mora Product Manager Identity and Security.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
customer.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
Unified. Simplified. Unified Communications Launch 2007.
Unified. Simplified. Unified Communications Launch 2007.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Information explosion 1.4X 44X Protect communications.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
IT Operations Management
Hybrid Management and Security
Deployment Planning Services
Microsoft Virtual Academy
Deployment Planning Services
Hybrid Management and Security
Microsoft Azure: The only consistent Hybrid Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
SaaS Application Deep Dive
Microsoft Virtual Academy
Manage mobile productivity with Enterprise Mobility + Security (EMS)
IT Operations Management
Threat Management Gateway
SharePoint Online Management and Control
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Virtual Academy
Office Mac /30/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft Virtual Academy
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Office 365 Security & Compliance: Exchange Online Protection
Enabling the hybrid cloud with remote access appliances
System Center Marketing
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Data Insights Summit
Microsoft Virtual Academy
Microsoft Virtual Academy
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Data Insights Summit
Microsoft Virtual Academy
Presentation transcript:

Srinivas L Technology Specialist – Security | Microsoft

Agenda Business and IT Challenges Business Ready Security Secure Messaging Customer Testimonial The Road Ahead Solution Resources and Tools Summary

Multiple locations and devices Difficulty in discovering and securing sensitive information Financially motivated evolving threats Advanced spam technologies bypassing scanners Control BUSINESS Needs IT Needs Prevent sensitive information from leaking Protection from advanced threats Secure access to messaging from virtually anywhere Receive messaging free of spam Business Needs and IT Challenges

Business Ready Security Help securely enable business by managing risk and empowering people Protect everywhere, access anywhere Simplify the security experience, manage compliance Block from: Enable CostValue SiloedSeamless to: Integrate and extend security across the enterprise Highly Secure & Interoperable Platform

Business Ready Security Solutions Secure Messaging Secure Collaboration Information Protection Integrated Security Identity and Access Management Secure Endpoint

Secure Messaging Enable more secure business communication from virtually any location or device, while preventing unauthorized use of confidential information Best-in-class anti-malware on premises / in cloud Protect sensitive information in Provide more secure, always-on access PROTECT everywhere ACCESS anywhere Built-in Information Protection Extend secure with partners INTEGRATE and EXTEND security Enterprise-wide visibility and reporting Unified management SIMPLIFY security, MANAGE compliance

Protect Messages from Malware On premises or in the cloud Automatic Engine Updates Single Engine Multiple Engines 99% spam detection* * With premium antispam services 38 times faster An AV-Test of consumer antivirus products revealed: On average, Forefront engine sets provided a response in 3.1 hours or less. Single-engine vendors provided responses in 5 days, 4 days, and 6 days respectively. “Forefront Security for Exchange Server can support up to five scanning engines at the same time. Thus, it offers a more secure environment, compared with products that support using only a single engine.” – Akihiro Shiotani, Deputy Director of the Infrastructure Group, Astellas Pharma Information Systems Department

Protect Sensitive Information in Automatically protect sensitive with Active Directory RMS Filter message body and subject based on content criteria Policy based restricted usage of attachments Outlook Web Access ON PREMISES

“ “ Simplified always on access Consolidated secure portal to simplify remote access Restricted, policy-based access to messaging servers Provide More Secure, Anywhere Access DIRECT ACCESS

Deep Integration with Exchange Information protection built-into and managed within Exchange Automatically decrypt protected e- mail for virus scanning and e-discovery Unique in-memory malware scanning to optimize Exchange performance

Simplify Security Management Unified policy management for all messaging servers Enterprise-wide visibility through a centralized security console Easy investigation process with automatic data collection Enable compliance with detailed log analysis and easy-to-use reports Unified policy management for all messaging servers Enterprise-wide visibility through a centralized security console Easy investigation process with automatic data collection Enable compliance with detailed log analysis and easy-to-use reports

Current Situation Multiple Products for secure messaging Separate gateway to detect sensitive content External websites sending spam and malware Virus threats from internal senders Remote access solution w/ separate identities Internal users sending sensitive information to partners in Separate SMTP virus scanner to detect and remove spam and malware Separate gateway to enable remote access Spam

Secure Messaging Simple and easy Always-on access built into platform Internal mail protected with Forefront Protection for Exchange Information Protection built into the platform Malware and spam cleaning in the cloud with FOPE

Customer Testimonial “With Forefront Security for Exchange Server, our comfort level is higher because the mail server and the security product are tightly integrated, and they’re both offered by the same vendor.” Akihiro Shiotani | Section Chief of the Infrastructure Group Astellas Pharma Information Systems Department “With Forefront Security for Exchange Server, our comfort level is higher because the mail server and the security product are tightly integrated, and they’re both offered by the same vendor.” Akihiro Shiotani | Section Chief of the Infrastructure Group Astellas Pharma Information Systems Department CUSTOMER BUSINESS CHALLENGE Managing security solutions from multiple vendors Allowing employees to exchange from outside the office more easily Improving monitoring and reporting capabilities CUSTOMER SOLUTION Microsoft Forefront line of business security products Microsoft System Center family of IT management solutions CUSTOMER RESULTS/BENEFITS Improved security and reliability Simplified deployment, monitoring, and reporting Increased user and IT productivity Simplified publishing and pre-authenticated access to the servers

Secure Messaging – The Road Ahead Management Consoles

Solution Resources & Tools Operations Guides Administrator Guides Troubleshooting Guides Hands-on Labs and VMs Evaluation Guides Proof of Concepts Architecture, Planning and Design Guides Infrastructure Planning Guide Infrastructure Planning Guide Data Protection Using Rights Management Services Secure Remote Application Publishing Services Application Server Protection

Secure Messaging Enable more secure business communication from virtually any location or device, while preventing unauthorized use of confidential information Best-in-class anti-malware on premises / in cloud Protect sensitive information in Provide more secure, always-on access PROTECT everywhere ACCESS anywhere Built-in Information Protection Extend secure with partners INTEGRATE and EXTEND security Enterprise-wide visibility and reporting Unified management SIMPLIFY security, MANAGE compliance Learn more at:

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Better Together Protection Integrated Defense in Depth Exchange 2010Forefront EncryptionAnti-Virus Default Intra-Org ∙ Inter-Org mTLS support ∙ IRM support Multiple Engine Anti- Malware Detection Unified Management Hosted, Hybrid Protection Premium Anti-Spam

Premium Anti-Spam Functional Highlights Exchange ForefrontBenefits Connection Filtering Forefront DNS Block List Aggregates DNS data from multiple providers No configuration required Forefront Unified Management Protocol Filtering Unified management Consolidates Sender/Recipient/Sender ID filtering for simplified management Anti-Backscatter Blocks NDR backscatter spam Content Filtering Cloudmark Filter Option of alternative 3 rd party content filter 99% detection rate; 0.04% false positive No configuration required Forefront True File Type Filtering Inspects the real file type, not just extension Can also spot and delete files within ZIP Global Exception Lists Single access point to sender and recipient exception lists (allow and block actions) Streamlined SCL Less ambiguous ratings for less false positives