stratégies de croissance via la mobilité (ems)
Post on 24-Jan-2017
658 Views
Preview:
TRANSCRIPT
Conférence sur la Transformation Numérique par le CloudThe Cloud Digital Transformation SummitMontréal, 16 juin 2016 – Montreal, June 16 2016
Présenté par
Session 4
STRATÉGIES DE CROISSANCE VIA LA MOBILITÉ (EMS)GROWTH STRATEGY USING ENTERPRISE MOBILITY SUITE (EMS)Jérôme Bousquet Ayman YassaSSP Mobility TSP MobilityMicrosoft Microsoft
The state of security today
Enterprise security has failed to keep
up
$400B in annual
damages
Cybercriminals have evolved
$ $
$
$$$
$
$
$$ $$
$$
of employees use personal devices for work purposes.*
of employees that typically work on employer premises, also frequently work away from their desks.***
of all software will be available on a SaaS delivery by 2020.**
Mobility is the new normal66% 25% 33%
*CEB The Future of Corporate ITL: 203-2017. 2013.**Forrester Application Adoption Trends: The Rise Of SaaS***CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.
Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
Is it possible to keep up?
Employees Business partners Customers
Microsoft’s vision
Access everything from everything
Manage and secure productivity
Integrate with what you haveApps
Devices
Data
Users
Protecting data in a mobile-first, cloud-first world
Enterprise Mobility Suite
Access control and data protection integrated natively in the apps, devices, and the cloud
DataUsersDevice
sApps
Managed cloud
SharePointOnline
ExchangeOnline
On-premises
Enterprise Mobility Suite
Microsoft Azure Active Directory Premium
Microsoft Azure Rights Management
PremiumAdvanced Threat
Analytics
Easily manage identities across on-premises and cloud
Single sign-on and self-service for corporate resources
Leverage PC management, MDM, and MAM to protect corporate apps and data on almost any device
Encryption, identity, and authorization to secure corporate files and email across phones, tablets, and PCs
Identify suspicious activities and advanced threats in near real time with simple, actionable reporting
Behavior-based threat
analytics
Information protection
Identity and access
management
Device and app
managementMicrosoft IntuneSystem Center Configuration
Manager
One vendor. Unified solutions.
Making it easier to deliver a great brand experience
Keeping the selling workforce productive
Bringing a new level of efficiency to management
Our Grow
th Lead with Security
243 average days an attacker resides within a victims network
76% network intrusions due to compromised user credentials
90%+ Business use
>1 Billion Auths per day
520M User Accounts
86% Fortune 500
ADFoundational
Current Investment
MUCHintegrationMaintain Active
Directory
Expand to Azure AD
Transforming Identity
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
One user. One identity. Everywhere.
Desktop Virtualization
Access & information protection
Mobile device & application management
Hybrididentity
On-premises applications
APPLICATIONPer app policy Type of client (Web Rich, mobile)
OTHERLocation (IP Range)Risk Profile
DEVICESAre domain joinedAre compliantPlatform type (Windows, iOS, Android)
USER ATTRIBUTESUser identity Group membershipsAuthentication strength
Identity-driven security: conditional access
• Allow• Enforce MFA• Block
Introducing Microsoft Advanced Threat Analytics
Behavioral Analytics
Detection for known attacks and issues
Advanced Threat Detection
An on-premises platform to identify advanced security attacks before they cause damage
Advanced Threat Analytics Benefits
Detect threats fast with Behavioral Analytics
Adapt as fast as your enemies
Focus on what is important fast using the simple attack timeline
Reduce the fatigue of false positives
Prioritize and plan for next steps
No need for creating rules, fine-tuning or monitoring a flood of security reports, the intelligence needed is ready to analyze and self-learning.
ATA continuously learns from the organizational entity behavior (users, devices, and resources) and adjusts itself to reflect the changes in your rapidly-evolving enterprise.
The attack timeline is a clear, efficient, and convenient feed that surfaces the right things on a timeline, giving you the power of perspective on the “who-what-when-and how” of your enterprise.
Alerts only happen once suspicious activities are contextually aggregated, not only comparing the entity’s behavior to its own behavior, but also to the profiles of other entities in its interaction path.
For each suspicious activity or known attack identified, ATA provides recommendations for the investigation and remediation.
How Microsoft Advanced Threat Analytics works
Abnormal Behavior Anomalous
logins Remote
execution Suspicious
activity
Security issues and risks Broken trust Weak protocols Known protocol
vulnerabilities
Malicious attacks Pass-the-Ticket (PtT) Pass-the-Hash (PtH) Overpass-the-Hash Forged PAC (MS14-
068)
Golden Ticket Skeleton key
malware Reconnaissance BruteForce
Unknown threats Password sharing Lateral
movement
Device choice. Simplified management.
Desktop Virtualization
Access & information protection
Mobile device & application management
Hybrididentity
Consistent user experienceSimplified device enrollment and registrationSingle console to manage devices
Mobile application management
PC managementMobile device management
ITUser
Microsoft Intune
Intune helps organizations provide their employees with access to corporate applications, data, and resources from virtually
anywhere on almost any device, while helping to keep corporate information secure.
Enterprise mobility management with Intune
Mobile app managementMANAGED MOBILE PRODUCTIVITY
Managed apps
Personal apps
Personal apps
Managed apps Corporate
data
Personal data
Multi-identity policy
Personal apps
Managed apps
Copy Paste Save
Save to personal storage
Paste to personal app
Email attachment
Managed email and productivity
Identity
Application
Device (optional)
Data
Right info. Right person. Right device.
Desktop Virtualization
Access & information protection
Mobile device & application management
Hybrididentity
Dynamic Access Control
Rights management
Secure access to work files
FPO
Data-level protection for secure sharing
COMPREHENSIVE SOLUTION
Any device/ any platform
• Data-level encryption
• All file types• LOB app protection
Protect Share Track and revoke
External user
*******
Internal user
*******
• Timeline view• Map view• Access and denials
Microsoft Cloud app securityEnterprise-grade security to your cloud apps
Security-as-a-service extending visibility and control to cloud appsComprehensive and proven protectionBased on Adallom acquisitionCommitted to support third-party appsDiscovery – Data Control – Threat Protection
Always up to date• Real-time updates• Keep up with new
apps and devices
Works with what you
have• Support multiple platforms
• Use existing investments
Simple to set
up and connect
• Easy, secure connections
• Simplified management
Flexible architecture that just works
COMPREHENSIVE SOLUTION
EMS BenefitsImproved end user productivity getting access and logging into SAAS applications
Security cost risk avoidance
Reduced legacy license and infrastructure costs for enterprise mobility management
Reduction in call volume to help desk resulting cost savings
Improved mobile device registry and access, reducing work for the business and IT
Reduced administrative efforts for IT staff managing mobile devices
© 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
MERCI / THANK YOUN’oubliez pas de compléter votre évaluation et de visiter le stand
Vidéo
Don’t forget to complete your evaluation and visit the Video booth
Conférence sur la Transformation Numérique par le CloudThe Cloud Digital Transformation Summit
Présenté par
top related