integrated cloud security solutions integrated cloud security solutions simeon lazarov – sam &...

23
Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft Ognyan Yuskeseliev - Director App and Cloud Development, Telelink Business Services

Upload: others

Post on 28-May-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Integrated cloud security solutions

Simeon Lazarov – SAM & Compliance Manager, Microsoft

Ognyan Yuskeseliev - Director App and Cloud Development, Telelink Business Services

Page 2: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

https://www.microsoft.com/secure

Page 3: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Page 4: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Microsoft Intelligent Security Graph

450B monthly

authentications

18B+ Bing web

pages scanned

750M+ Azure user accounts

Enterprise security

for 90% of

Fortune 500

5B threats

detected on devices every

month

Shared threat data from partners,

researchers, and law enforcement

worldwide

Botnet data from Microsoft Digital Crimes

Unit

1.2B devices scanned

each month

400B emails

analyzed

200+ global cloud consumer

and commercial services

OneDrive

Xbox

Microsoft

accounts

Bing

Azure

Outlook

Windows

Page 5: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Microsoft Secure global security vision

Microsoft 365 A single suite that unifies enterprise security with user productivity to meet the needs of today’s modern workplace

Microsoft 365 products

Securing the enterprise

with Microsoft 365

Realities of digital

transformation

How Microsoft 365 Fits In

Page 6: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Identity & Access

Management

Threat

Protection

Security starts with great

user authentication

Data is your most

important company asset

Correlate threat information

and automatically respond Optimize with security insights

and configuration tools

Information

Protection

Security

Management

SECURING THE ENTERPRISE WITH MICROSOFT 365

Page 7: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Protect users’

identities and control

access to valuable

resources based on

user risk level

Gain visibility

and control over

security tools

Protect against

advanced threats and

recover quickly when

attacked

Protect sensitive

information wherever

it lives or travels

Threat

Protection

Identity & Access

Management

Information

Protection

Security

Management

Intelligent security for the modern workplace Microsoft 365 unifies enterprise security and user productivity

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Holistic security across your digital landscape

Page 8: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Office 365

Enterprise

Windows 10

Enterprise

Enterprise Mobility

+ Security

…on a range of modern devices

Page 9: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Office 365 Enterprise

Windows 10

Enterprise

Enterprise Mobility

+ Security

Microsoft 365 Enterprise

Page 10: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Office 365 Enterprise

Chat- centric workspace

Email & Calendar

Voice, Video & Meetings

Office applications/ co-authoring

Sites & Content Management

Analytics

Advanced Security & Compliance

Enterprise Mobility+ Security

Identity & Access Management

Managed Mobile Productivity

Information Protection

Identity Driven Security

Windows 10 Enterprise

Advanced Endpoint Security

Designed For Modern IT

More Productive

Powerful, Modern devices

Microsoft 365 Enterprise

Page 11: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Microsoft 365 Enterprise

Chat- centric workspace Teams

Email & Calendar Outlook

Voice, Video & Meetings Skype for Business

Co-creating content Office ProPlus

Sites & Content management SharePoint and OneDrive

Analytics Delve

Security & Compliance Data Loss Prevention

M I C R O S O F T 3 6 5 E 3

Office 365 Enterprise E3 Enterprise Mobility

+ Security E3 Windows 10 Enterprise E3

Identity & Access Management Azure Active Directory Premium P1

Managed Mobile Productivity Microsoft Intune

Information Protection Azure Information Protection Premium P1

Identity Driven Security Microsoft Advanced Threat Analytics

Advanced Endpoint Security Credential Guard, Device Guard

Designed For Modern IT Azure AD Join, Dynamic Management

More Productive Windows Ink, Cortana at Work

Powerful, Modern devices Innovative designs,, new in class devices

Page 12: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Microsoft 365 Enterprise

M I C R O S O F T 3 6 5 E 3

Office 365 Enterprise E3 Enterprise Mobility

+ Security Suite E3 Windows 10 Enterprise E3

Voice PSTN Conferencing, Cloud PBX

Analytics Power BI Pro, Delve Analytics

Security & Compliance ATP, TI, ASM, Advanced eDiscovery & more

M I C R O S O F T 3 6 5 E 5

Office 365 Enterprise E5 Enterprise Mobility

+ Security E5 Windows 10 Enterprise E5

Identity & Access Management Azure Active Directory Premium P2

Information Protection Azure Information Protection Premium P2

Identity Driven Security Microsoft Cloud App Security

Advanced Endpoint Security Windows Defender Advanced Threat Protection

Page 13: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Demo

Page 14: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

© Copyright Microsoft Corporation. All rights reserved.

Thank you.

Page 15: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

© Copyright Microsoft Corporation. All rights reserved.

Appendix

Page 16: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Security solutions in Microsoft 365 Enterprise E5 MICROSOFT 365 E5 SECURITY PRODUCT SUITE

Azure Information Protection

Office 365 Data Loss Prevention

Microsoft Cloud App Security

Windows Information Protection

Microsoft Intune

BitLocker

Azure Advanced Threat Protection

Windows Defender Advanced Threat Protection

Office 365 Advanced Threat Protection

Office 365 Threat Intelligence

Microsoft Cloud App Security

Azure Active Directory

Microsoft Cloud App Security

Windows Hello

Windows Credential Guard

Microsoft Security & Compliance Center

Windows Defender Security Center

Microsoft Secure Score

Identity & Access

Management

Threat

Protection

Security

Management

Information

Protection

Page 17: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Identity & Access

Management

Threat

Protection

Security

Management

Information

Protection

Security categories M365 Enterprise E5 covers

Security categories other Microsoft solutions cover

What Microsoft Services/ MSSPs cover

What Microsoft integrates with

What Microsoft doesn’t do

• Single Sign-on

• Multi-Factor Authentication

• Access Control

• Privileged Access Management

(PAM)

• Data Loss Prevention (DLP)

• Data Encryption

• Information Protection

• Data Classification

• Data Governance

• Cloud Access Security Broker (CASB)

• Key Management

• Mobile Application Management

• Secure Email Gateway

• Endpoint Detection and Response

(EDR)

• Endpoint Protection (EPP)

• Anti-malware/phishing

• Anti-spyware

• Antivirus Software

• User and Entity Behavior Analytics

(UEBA)

• Anomaly Detection

• Threat Intelligence Feeds

• Remote Browser

• Intrusion Detection System (IDS)

• Intrusion Prevention System (IPS)

• Security Scoring

• Reporting

• Secrets Management

• Database Security

• Encrypted Cloud Storage

• Back Up

• Disaster Recovery

• Virtual Private Networks (VPN)

• IoT Protection

• Cloud Workload Protection

• DDoS Protection

• Incident Response Services

• Asset Discovery

• Pen Testing/ Risk Assessment

• Vulnerability Assessment

• Web Application Testing

• Managed detection and response

(MDR)

• SOC

• Security training

• SIEM (SIM/ SEM/ Log management)

• Incident Ticket System

• Firewall/ Network

• Mobile Threat Detection tools

• Host intrusion prevention system

(HIPS)

• Network traffic analysis (NTA)

• Container Security

• Anti-subversion software

• Anti-tamper software

• Deception

• Cloud-based Management

• Cross-platform endpoint protection

Page 18: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Holistic security capabilities

that can reduce the number

of vendors you manage

Microsoft 365 security suite advantages SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Individual components are

purpose-built to integrate,

which decreases TCO

Because security is built-in,

deployment and on-going

management is simplified

Security tools are fed by

trillions of signals to

provide insights across the

global Microsoft ecosystem

Security capabilities extend

beyond Microsoft to secure

3rd party platforms, apps

and services

Standard integration

capabilities connect to

your other security tools

(3rd party or homegrown)

Intelligent, adaptive security

gives users more freedom

in how they work, from

anywhere on any device

Page 19: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Security capabilities only available in Microsoft 365 Enterprise E5

SECURING THE ENTERPRISE WITH MICROSOFT 365 E5

Control access to sensitive data, even when its shared outside of your organization or accessed via a 3rd party application

Discover shadow IT so it can be secured and managed, reducing your exposure to data leakage through inappropriate sharing and unsecured storage

Because users log in with a single user ID to any application from any device from any location, you have the context to detect and investigate suspicious activities

Recognize users and devices and dynamically change what level of access is allowed and how users authenticate based on parameters such as location, device risk, user risk or document confidentiality level

Security automation detects potential threats and correlates alerts to identify a specific attack vector, investigates and remediates threats, reauthenticates high-risk users, and takes action to limit access to data

Page 20: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Identity and Access Management Protect users’ identities and control access to valuable resources based on user risk

If a user’s identity or device

becomes compromised,

automatically block or limit

access, or require MFA

Alert me when a user's

credentials are for sale on the

dark web and elevate their risk

level

Discover 3rd party cloud apps

that are in use and assess their

risk level, so you can sanction or

block them

Discover, restrict, and monitor

privileged identities and their

access to resources

A single solution that can protect

identity across on premises and

cloud directories

Eliminate passwords by using

biometrics or pins

Page 21: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Information Protection Protect sensitive information wherever it lives or travels

Automatically apply data security

policies if a user's access to that

data changes, the user becomes

compromised or the data reaches

a certain age.

Identify potentially sensitive

information, like credit card

numbers or bank routing numbers,

and automatically apply a label

and protection to the file

Protect sensitive data when it

travels outside of your

organization via email, USB, or a

3rd party SaaS app

Scan historical on-premises data

files for potentially sensitive

information

Allow select partners and

customers to access sensitive

information

Page 22: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Threat Protection Protect against advanced threats and recover quickly when attacked

Detect attacks from both

on premises and cloud

signals

Endpoint monitoring with

the ability to quarantine

the endpoint for

investigation and wipe the

device, if compromised

Advanced email protection

against phishing attempts,

and unknown (zero day)

threats

Detect and remove

ransomware, then recover

my files

Automatically detect

anomalies and suspicious

behavior without needing

to create and fine tune

rules

Reduce false positives by

contextually aggregating

alerts together to identify

a specific attack vector

Automatically investigate

endpoint alerts and

remediate threats,

removing them from all

impacted machines

Page 23: Integrated cloud security solutions Integrated cloud security solutions Simeon Lazarov – SAM & Compliance Manager, Microsoft ... Azure Active Directory Premium P1 Managed Mobile

Lig

ht B

lue

R0 G

188 B

242

Gre

en

R16 G

124 B

16

Red

R232 G

17 B

35

Mag

en

taR

180 G

0 B

158

Pu

rple

R92 G

45 B

145

Blu

eR

0 G

120 B

215

Teal

R0 G

130 B

114

Yello

wR

255 G

185 B

0

Ora

ng

eR

216 G

59 B

1

Lig

ht Y

ello

wR

255 G

241 B

0Lig

ht O

ran

ge

R255 G

140 B

0Lig

ht M

ag

en

taR

227 G

0 B

140

Lig

ht P

urp

leR

180 G

160 B

255

Lig

ht T

eal

R0 G

178 B

148

Lig

ht G

reen

R186 G

216 B

10

Dark

Red

R168 G

0 B

0D

ark

Mag

en

ta

R92 G

0 B

92

Dark

Pu

rple

R50 G

20 B

90

Mid

Blu

eR

0 G

24 B

143

Dark

Teal

R0 G

75 B

80

Dark

Gre

en

R0 G

75 B

28

Dark

Blu

eR

0 G

32 B

80

Mid

Gra

yR

115 G

115 B

115

Dark

Gra

yR

80 G

80 B

80

Ric

h B

lack

R0 G

0 B

0

Wh

iteR

255 G

255 B

255

Gra

yR

210 G

210 B

210

Lig

ht G

ray

R230 G

230 B

230

Security Management Gain visibility and control over security tools

A quantifiable measurement

of your security posture

Recommended actions you can

take to improve your security

posture

Incident and event

forensic reporting

Detailed reports on the latest

threats, so you can answer

questions, like "How well am I

protected against the latest

threats?"

Teach users to guard against

email phishing by simulating an

attack in a safe environment

Benchmark your security score

against companies in your

industry or of similar size