![Page 1: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/1.jpg)
Enterprise Mobility + Security
WEBINAR:
![Page 2: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/2.jpg)
YOUR PRESENTERS
Mark MarraSolutions Architect
at Softchoice
Nick JohnsonTechnology Solutions Professional
at Microsoft
![Page 3: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/3.jpg)
AGENDA
• Understanding mobility, beyond just the device
• Demonstrating how EM+S can help you protect, detect, and respond to modern threats
• Enterprise Mobility + Security product overview
• Azure Active Directory• Cloud App Security• Azure Information Protection• Intune• Advanced Threat Analytics
![Page 4: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/4.jpg)
WHAT IS MOBILITY?
![Page 5: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/5.jpg)
Data breaches63% of confirmed data breaches involve weak, default, or stolen
passwords.
63% 0.6%IT Budget growth
Gartner predicts global IT spend will grow only 0.6% in 2016.
Shadow ITMore than 80 percent of employees
admit to using non-approved software as a service (SaaS)
applications in their jobs.
80%
MOBILE-FIRST, CLOUD-FIRST REALITY
![Page 6: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/6.jpg)
YOURSECURITY POSTURE
!
DETECTusing targeted signals, behavioral monitoring, and machine learning
RESPONDclosing the gap between discovery and
action
PROTECTacross all endpoints, from sensors to the datacenter
![Page 7: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/7.jpg)
Identity OUR UNIQUE APPROACH
Device
Apps & Data
Infrastructure
PLATFORM
![Page 8: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/8.jpg)
ENTERPRISE MOBILITY + SECURITY
MicrosoftIntune
Azure Information Protection
Protect your users, devices, and apps
Detect threats early with visibility and threat analytics
Protect your data, everywhere
Extend enterprise-grade security to your cloud and SaaS apps
Manage identity with hybrid integration to protect application
access from identity attacks
MicrosoftAdvanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory Premium
![Page 9: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/9.jpg)
Protect users• Multi-factor authentication• Leaked credentials reporting
Intelligent analysis• Machine learning• Risk-based conditional access• User behavior analysis
AZURE ACTIVE DIRECTORYIdentity and access management from the cloud
Guard apps• Conditional access• Secure remote access
![Page 10: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/10.jpg)
![Page 11: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/11.jpg)
![Page 12: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/12.jpg)
![Page 13: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/13.jpg)
Q&A
![Page 14: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/14.jpg)
DiscoveryGain complete visibility and context for cloud usage and shadow IT—no agents required
Data ControlShape your cloud environment with granular controls and policy setting for access, data sharing, and DLP
CLOUD APP SECURITYEnterprise-grade security for your cloud apps
Threat ProtectionIdentify high-risk usage and security incidents, detect abnormal user behavior, and prevent threats
01011001
![Page 15: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/15.jpg)
![Page 16: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/16.jpg)
![Page 17: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/17.jpg)
![Page 18: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/18.jpg)
Persistent protection• Storage-independent• Permit all companies to authenticate• Enforce authorization policies
Tracking and compliance• Powerful logging and reporting• Use/abuse tracking• Kill documents remotely
AZURE INFORMATION PROTECTIONCollaborate securely
Integrated use• Works across common platforms• Consistent user experience• Integrate into common apps and services
![Page 19: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/19.jpg)
![Page 20: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/20.jpg)
![Page 21: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/21.jpg)
![Page 22: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/22.jpg)
Q&A
![Page 23: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/23.jpg)
Access management• Conditional access• Compliance enforcement• Multi-identity support
Mobile device &and app protection• Manage iOS, Android, and Windows devices• Protect data in corporate apps with or without
a device enrollment
INTUNEManage and secure mobile productivity
Office 365 mobile app integration• Prevent leakage of corporate data in Office 365
mobile apps to personal applications• Extend app-level management to other LOB
apps via Intune SDK
![Page 24: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/24.jpg)
![Page 25: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/25.jpg)
![Page 26: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/26.jpg)
![Page 27: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/27.jpg)
Behavioral AnalyticsUncover suspicious activities and abnormal behavior, leveraging machine learning
Detection for known threatsForensic tools to search for known security attacks such as “pass the hash”
ADVANCED THREAT ANALYTICSIdentify advanced on-premises security attacks before they cause damage
Focus on what’s importantClear, efficient, and convenient timeline feed that surfaces the right things along with recommendations for investigation and remediation
![Page 28: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/28.jpg)
![Page 29: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/29.jpg)
ENTERPRISE MOBILITY +SECURITY
MicrosoftIntune
Azure Information Protection
Protect your users, devices, and apps
Detect threats early with visibility and threat analytics
Protect your data, everywhere
Extend enterprise-grade security to your cloud and SaaS apps
Manage identity with hybrid integration to protect application
access from identity attacks
MicrosoftAdvanced Threat Analytics
Microsoft Cloud App Security
Azure Active Directory Premium
![Page 30: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/30.jpg)
Please let us know how Softchoice can help you:1. I am interested in learning more about EM + S by speaking to a Softchoice
Solution’s Architect
2. I would like to learn more about my options with Azure Active Directory
3. I already own EM + S but need help in getting it implemented
4. I have other questions I’d like to discuss and would like a follow-up call
NEXT STEPS: POLL
![Page 31: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/31.jpg)
1. Contact your account representative at Softchoice
2. Contact Luke Black at [email protected] if you are unsure of who your Account Representative is
3. Or call 1 800-268-7638
CONTACT US
![Page 32: Getting secure in a mobile-first world with EMS](https://reader033.vdocuments.net/reader033/viewer/2022052706/586f96d81a28abcc238b48e5/html5/thumbnails/32.jpg)
Thank You