SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Microsoft 365 Security
Protect your business against cyber- threats
and information loss
Protect against cyber threats Protect business data against leaks Secure devices and control access
Microsoft 365 Security Benefits
Safeguard your business against external threats and leaks, easily manage devices
Key Security Pains
How do I
safeguard
confidential
business data
How do I give
employees the right
access while keeping
hackers at bay?
How do I protect
my employees
from phishing?
How do I enable a
mobile, WFH
workforce?
Protect against phishing, ransomware,
malware, and other advanced threats
Defend against threats
Check links at time of click to combat advanced
phishing
Detect malware with sandbox analysis of email
attachments
Enable anti-phishing policies that use machine
learning
Enable advanced multi-factor authentication and
Conditional Access
Enforce features that help protect Windows 10
devices
Control who has access to sensitive
information
Protect business data
Encrypt sensitive emails
Block sharing of sensitive information like credit card
numbers
Restrict copying and saving of confidential business
information
Enable unlimited cloud archiving
What it is:
Azure Information Protection helps an
organization to classify protect its
documents and emails, either by
restricting the ability to forward and print,
or by applying labels.
The restrictions and protections stay with
the files and emails regardless of the
location. Even if the file is emailed
outside the company, or saved to an
employee’s personal computer, you
remain in control of your data.
Azure Information
Protection (AIP)
Easily secure and manage your devices
Manage the security of the devices that
access your business information
Control which devices and users can
access business information
Apply security policies to protect data on
iOS and Android devices
Keep company data within approved apps
on mobile devices
Remove business data from lost or stolen
devices with selective wipe
Support for Windows Virtual Desktop
M365 Business Premium
What’s new and amazing
Conditional Access
Access controls to when, who,
where accesses Office apps
Multi Factor Authentication
Protects against unauthorized
access
Shared computer Activation
Support for multi-user/firstline
scenarios
Self-service password
writeback
Simplifies password
administration
Windows Virtual Desktop
Easy to manage virtualization
that saves licensing costs
Full Azure Active Directory P1
(coming soon)
Help enable secure remote
access to work apps
ATP helps
protect from
cyberattacks
Run your business from anywhere, with peace of mind
Why choose this solution?
Integrated with Office, Teams and Windows
Built-in: No need to deploy additional products
Streamlined: Protects apps without hogging resources
or requiring clunky add-ons
Deep in the operating system: Resistant to tampering
by malware and hackers
Global scale
Threat intelligence: The world’s largest set of threat-
related optics
AI-powered: Advanced data science turns signals into
actionable intelligence with the Security Graph
Team of experts: Global cybersecurity force working to
combats attacks
Enterprise-grade: Powered by the same technology built
for the world’s largest businesses
Learn More:
Learn about security concepts and Microsoft 365:
https://www.microsoft.com/yournewcso
Product Documentation, Licensing comparison and FAQs:
https://aka.ms/M365BP
Learn about Thread Legal software for Law Firms
built with Microsoft 365:
https://thread.legal
© Copyright Microsoft Corporation. All rights reserved.
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information ProtectionAndrew Bettany
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Microsoft Österreich
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterMicrosoft Österreich
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - KeynoteAndrew Bettany
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceChris Genazzio
 
Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depthAlberto Pascual
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 

Was ist angesagt? (20)

2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
 
Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depth
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 

Ähnlich wie Thread Legal and Microsoft 365 Security

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Microsoft 365 business
Microsoft 365 businessMicrosoft 365 business
Microsoft 365 businessayeshaurooj104
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?The TNS Group
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha ChathurangaaOS Community
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationPatrick Leckie
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 

Ähnlich wie Thread Legal and Microsoft 365 Security (20)

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft 365 business
Microsoft 365 businessMicrosoft 365 business
Microsoft 365 business
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 

Kürzlich hochgeladen

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Thread Legal and Microsoft 365 Security

  • 1. Microsoft 365 Security Protect your business against cyber- threats and information loss
  • 2. Protect against cyber threats Protect business data against leaks Secure devices and control access Microsoft 365 Security Benefits Safeguard your business against external threats and leaks, easily manage devices
  • 3. Key Security Pains How do I safeguard confidential business data How do I give employees the right access while keeping hackers at bay? How do I protect my employees from phishing? How do I enable a mobile, WFH workforce?
  • 4. Protect against phishing, ransomware, malware, and other advanced threats Defend against threats Check links at time of click to combat advanced phishing Detect malware with sandbox analysis of email attachments Enable anti-phishing policies that use machine learning Enable advanced multi-factor authentication and Conditional Access Enforce features that help protect Windows 10 devices
  • 5. Control who has access to sensitive information Protect business data Encrypt sensitive emails Block sharing of sensitive information like credit card numbers Restrict copying and saving of confidential business information Enable unlimited cloud archiving
  • 6. What it is: Azure Information Protection helps an organization to classify protect its documents and emails, either by restricting the ability to forward and print, or by applying labels. The restrictions and protections stay with the files and emails regardless of the location. Even if the file is emailed outside the company, or saved to an employee’s personal computer, you remain in control of your data. Azure Information Protection (AIP)
  • 7. Easily secure and manage your devices Manage the security of the devices that access your business information Control which devices and users can access business information Apply security policies to protect data on iOS and Android devices Keep company data within approved apps on mobile devices Remove business data from lost or stolen devices with selective wipe Support for Windows Virtual Desktop
  • 8. M365 Business Premium What’s new and amazing Conditional Access Access controls to when, who, where accesses Office apps Multi Factor Authentication Protects against unauthorized access Shared computer Activation Support for multi-user/firstline scenarios Self-service password writeback Simplifies password administration Windows Virtual Desktop Easy to manage virtualization that saves licensing costs Full Azure Active Directory P1 (coming soon) Help enable secure remote access to work apps
  • 9. ATP helps protect from cyberattacks Run your business from anywhere, with peace of mind
  • 10. Why choose this solution? Integrated with Office, Teams and Windows Built-in: No need to deploy additional products Streamlined: Protects apps without hogging resources or requiring clunky add-ons Deep in the operating system: Resistant to tampering by malware and hackers Global scale Threat intelligence: The world’s largest set of threat- related optics AI-powered: Advanced data science turns signals into actionable intelligence with the Security Graph Team of experts: Global cybersecurity force working to combats attacks Enterprise-grade: Powered by the same technology built for the world’s largest businesses
  • 11.
  • 12. Learn More: Learn about security concepts and Microsoft 365: https://www.microsoft.com/yournewcso Product Documentation, Licensing comparison and FAQs: https://aka.ms/M365BP Learn about Thread Legal software for Law Firms built with Microsoft 365: https://thread.legal
  • 13. © Copyright Microsoft Corporation. All rights reserved. Thank you

Hinweis der Redaktion

  1. M365B protects your business from external threats by giving you access to the same enterprise-grade services and protections used by many of the world’s largest companies.   Threat protection tools help keep your business free of hazards such as spam, malware, viruses, phishing attempts, malicious links, etc. while helping to protect from sophisticated threats cunningly disguised as email attachments or links, zero-day ransomware, and other advanced threat techniques.   Even your employees who understand that they shouldn’t click on hyperlinks sent from people they don’t know, could be easily fooled by today’s sophisticated phishing schemes. Microsoft 365 Business helps to remove the guesswork by doing the check for you and protecting your users from clicking through to malicious or unsafe sites or the system takes users to a warning page before allowing them access to the link. The threat protection features in Microsoft 365 Business scan each & every attachment coming in via email. It opens these in a virtual environment (sandbox) and does a comprehensive, real time analysis of the behavior of the file to determine its intent (whether normal or malicious), thereby leading to better intelligent protection against unsafe attachments that are the basis for phishing schemes and ransomware infections. To combat the latest phishing methods, where attackers impersonate a person (or brand) the recipient; machine learning is used to analyze past email patterns and relationships to find anomalies that indicate spoofing has occurred. You can configure advanced multifactor authentication policies that disable access from untrusted locations or bypass multifactor authentication from trusted places such as your office network Enforce Microsoft Defender malware protection across all your company’s Windows 10 devices to help prevent users from interacting with ransomware and malicious web locations, and protect files in key system folders from changes made by ransomware
  2. Most businesses deal with a variety of sensitive information like customer credit card numbers, SSN, DOB or even intellectual property that is core to the running of the business. Keeping this information safe can be a daunting task for any business, but especially for SMBs. M365B helps you protect your business data or sensitive customer or employee information from accidental leaks by utilizing Data Loss Prevention capabilities. These DLP policies can help to identify, monitor, and protect sensitive information through deep content analysis, even if your staff forget to apply these controls. It includes preconfigured templates that can help businesses detect specific types of sensitive information being communicated, such as Credit Card Numbers, SSN, DOB or even locale-specific personally identifiable information (PII). It also provides policy tips, which can help educate and prevent end users from accidental sharing of sensitive info by displaying a policy tip in Outlook. With M365B, your employees can easily encrypt email and documents, or impose controls such as do not print or do not forward. This helps you can communicate securely with customers or other people outside your company, ensuring that only the intended recipient can read the message With the information protection features in M365B, you can maintain control of who can access your documents, even after a document has been shared or saved outside your company’s network. M365B also helps to ensure that your data and documents are retained and archived, if needed to meet legal or regulatory requirements. What you really get here is peace of mind. The threat of information loss is what keeps you up at night, but with your files securely backed up in the cloud, and accessible only by you or your employees – even in the event of a lost or damaged device – you don’t need to awake worrying about the security of your data .
  3. Here’s what the interface looks like for protecting. Big blue “Protect” button in the Office ribbon. Pretty straightforward. Options that show up here: Confidential - Only recipients can read (on the email thread you send or that you specify manually, if protecting a document in a standing location) Confidential - All employees – All people in your in company will be able to open. Same protection as “confidential” but no need to specifically name them. Do Not Forward - most commonly used. Examples: managing an employee out of your company. Want to prevent mistakes. Reinforce the sensitive nature of what's being discussed. No oops. Is aware of clients that don't support do not forward (e.g. Pine) – user has to authenticate and view using web experience in these cases; so protection can be enforced. If using Outlook, integrated experience. Encrypt – This is Office 365 Message encryption we discussed in last slide Highly confidential – Same as confidential but with additional protections Highly confidential – All employees – Same as Confidential all –employees --these may be changing; they are updated based on feedback on user experience— Note: For protect button and banner to show up you have to do download AIP client. Can push it down with Intune.
  4. Microsoft 365 Business helps you manage the security on all the devices that access your data – phone, tablets, PCs, macs. …whether they are Windows, iOS, macOS, or Android, M365B helps you manage them. Conditional access capabilities give you flexible and fine-grained control over which devices and users can access your Office 365 data. You have options to block users from logging in from home computers, un-approved apps, or outside of work hours. You get peace of mind if allowing staff to use their own personal devices. You can require a strong PIN or fingerprint to access company data. You can enforce device encryption; and block jailbroken or rooted devices. The solution lets you keep business documents, emails, and other data within approved Office mobile apps on personal devices, and prevent employees from saving these to unauthorized apps and location Because company data is kept within approved apps and locations, you remotely wipe company data from a personal device when an employee leaves your company. And you can enforce device encryption on Windows PCs with BitLocker to help protect against data theft or exposure if a computer is lost or stolen.
  5. Because these capabilities are built on enterprise products used by some of the largest companies in the world, you may wonder if enabling all of these productivity features will be complex. That’s why we have simplified setup and administration in Microsoft 365. Initial setup takes place in a step by step guided experience where you can easily setup the security policies with simple toggle buttons. Here you can do things like set up policies for securing data on iOS and Android mobile devices, and securing your Windows 10 devices. In the Microsoft 365 admin center you have simplified UI for managing device and data policies on an ongoing basis. Because Microsoft 365 Business is built on enterprise products like Intune and Azure Active Directory, you into the full dashboards for those products and do advanced activities as well. Because M365 Business has been designed with SMB customers in mind, it includes these investments in simplification, while still preserving the power of the underlying products and the ability to manage them in a granular way if the need arises.  
  6. As we’ve mentioned, you could buy these capabilities in pieces from various providers. Here's the pitch for why you should choose a solution from Microsoft. At high level, the reasons are integration with Office 365 and Windows; and scale of Microsoft's investment in security Integrated with Office 365 and Windows: Built-in: No need to deploy additional products; just activate it within Office 365 Easy to manage: One place to go to administer this; and rest of your O365 services. So you can set up new users, no separate passwords for people to remember, etc. One administration center to manage your productivity and security tools; one bill to pay; one support organization to deal with when you need assistance Not bloated or clunky: Designed specifically for Office apps, so it protects apps without hogging system resources or requiring special add-ins Deep in the operating system: Advanced defenses are built deep in the Windows making them resistant to tampering by malware and hackers Global scale: Threat intelligence: Every day, Microsoft’s Intelligent Security Graph analyzes over 6.5 trillion signals—the world’s largest set of threat-related optics AI-powered: Microsoft uses cloud computing resources to power advanced data science and machine learning to turn these signals into actionable intelligence Team of experts: A global team of security experts use deep understanding of malware, cyberattacks, and attacker motivation to combat a wide range of attacks Enterprise-grade: The solution is powered by the same technology built for the world’s largest businesses, and hosted from the same cloud that houses data from over 85% of Fortune 500 companies   
  7. But we also want you to know that all of this powered by enterprise-grade security. M365B is not a watered down version. It is the same set of security platform that our enterprise customers use And really M365B is an Intelligent system and is constantly The center piece of our investment in intelligence is the Microsoft Intelligent Security Graph. This is how we describe the way that we synthesize a vast amount of data from a huge variety of sources. 400 billion emails get analyzed by our Outlook.com and Office 365 email services every month.    1.2 billion devices are updated monthly. The 1.2B includes ~750M Windows 10 monthly active devices which we receive telemetry, the balance is Win8/7/Vista/XP which communicate with Windows Update on a monthly basis. 400 Billion emails analyzed monthly. We operate 200-plus global cloud, consumer, and commercial services. Everything from outlook.com to Xbox Live to Office 365 to Azure, and so on. And with all of those services, we have a tremendous amount of surface area that we defend. Enterprise Security from Microsoft is employed by 90% of the Fortune 500.   And so, we see more attacks than most other companies on any given day. We get a lot of information from defending against those attacks.    1 Billion plus Azure user accounts give us tremendous insight into how people authenticate to Azure. And that, combined with the 450 billion monthly authentications that we do with Azure Active Directory and Microsoft Account, really give us some tremendous insight into what is normal behavior when it comes to sign-ins and authentications, and what is abnormal behavior, and how often is it that someone has the right password, but they're not the person they say they are. We learn a lot about defending that really important control point, the identity, by looking across that set of data.    Bing scans about 18 billion web pages every month, giving us really great insight into what people are doing with web scripting technologies when it comes to attacks and phishing campaigns. And we have a great way to look at that and understand how we should help customers defend based on that information.    On top of all of that we layer shared threat data that we get from our partners, from the researchers here at Microsoft who are part of our 3,500-plus people that are full time on security, and law enforcement agencies that we partner with worldwide through our digital crimes unit, as well as botnet data that we collect through the digital crimes unit. All of that intelligence makes up the Intelligent Security Graph.    And why is it a graph? It's a graph because what's really important is connecting these pieces of intelligence, so that these signals are not just individual points of information. The graph brings them together as something that we can draw patterns across. We can learn from one point of data to influence how we interpret another point of data.    So, the Intelligent Security Graph is something that we are very, very heavily invested in at Microsoft. It's something that we feel is unique to us in this industry
  8. Short blurb overview: Outlook helps  you stay connected and organized at work, at home and on the go, backed by enterprise -grade security to protect your confidential information. It brings the best of Office 365 in one place - with easy access to your emails, files, calendar events and contacts so you can quickly get things done. A personalized, intelligent inbox and calendar helps anticipate your needs so you can stay on top of what matters most. Longer explanation: Best of Office 365 in one place Outlook brings email, calendar, contacts, tasks, and more together in one place so you can work efficiently. With Office integration, you can share attachments right from SharePoint and OneDrive. Customize Outlook by integrating with the business apps you already use.   Access email, calendar events, contacts and tasks from one app Quickly view and share Office documents, photos and files stored locally or on the cloud like OneDrive, View rich contact information including organization details and LinkedIn profiles Customize with business apps and services through APIs, add-ins and actionable messages Secure and Manage with Ease Secure and manage your organization’s confidential information with ease. Outlook empowers your employees to stay connected and organized wherever they go, while providing advanced protection against online threats and keeping them in compliance with your organization’s policies. Enables your employees to work from anywhere on any device, while being in compliance with your organizations policies Advanced protection against viruses, spam, phishing attacks and other online threats Ability to encrypt messages Protection of sensitive information and ability to prevent forwarding or copying of confidential emails IT controls to easily secure, set up and manage across globally distributed organizations Advanced access controls, remote wipe and ability to compartmentalize work and personal data. Stay organized and plan ahead Make plans and coordinate schedules by sharing calendars and seeing when your coworkers are available. Book conference rooms and track RSVPs for meetings right from your calendar. You can count on Outlook to keep your organization moving globally. Easily find the best time to meet through by checking their availability , right from the calendar Share calendars to quickly coordinate schedules. You can also delegate calendars Book conference rooms and schedule online meetings in a breeze Track RSVPs for meetings in just one tap or click Intelligence that works for you Outlook anticipates your needs. Search helps you find what you need, fast. Travel and reservations are automatically added to your calendar. And intelligent reminders help you get to appointments on time. Upcoming travel is automatically added to your calendar so you’re always a s step ahead Intelligent search on mobile brings conversations from your top contacts, upcoming reservations and file attachments front and center – all before you even kick off a keyword search query. Outlook helps you focus on what matters- newsletters, promotions and other emails are grouped separately so you focus on what’s important