Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
10. Real-world intelligence at work
Intelligent Edge
Intelligent Cloud
Local ML models, behavior-based detection
algorithms, generics, heuristics
Metadata-based ML models
Sample analysis-based ML
models
Detonation-based ML
models
Big data
analytics
March 6 – Behavior-based detection
algorithms blocked more than 400,000
instances of the Dofoil trojan.
February 3 – Client machine learning
algorithms automatically stopped the
malware attack Emotet in real time.
October 2017 – Cloud-based detonation ML
models identified Bad Rabbit, protecting users
14 minutes after the first encounter.
2017 2018
August 2018 – Cloud machine learning
algorithms blocked a highly targeted campaign
to deliver Ursnif malware to under 200 targets
11. “From the expansion of ATP, to the new Security Graph API,
to Azure Sphere, it’s clear Microsoft is serious about
addressing the emerging threats that come part and parcel
with IoT...I do think Microsoft will be one of the last
standing when it comes to end-to-end security offering.”
Pat Moorhead
Moor Insights & Strategy
“Microsoft’s security offerings provide it with a
level of differentiation from its primary rivals.
Given the level of emphasis placed on security by
those rivals, we expect security to become a new
and more heated area of contention for leadership.”
Scott Crawford
451 Research
“Microsoft should probably scare most people as the biggest existential
threat…Time and time again, legacy security vendors failed to meet the
needs of their customers. Alert fatigue, poor context, poor usability, and lack
of integration capabilities continue to frustrate security teams. But now, the
tech titans are entering the market with customer-focused design,
offering integrated clouds, marketplaces, and interfaces.”
Joseph Blankenship
Forrester
“By 2022, one-third of organizations
hosting their applications on IaaS
vendors' services will use these
vendors' native IAM services.”
Gregg Kreizman
Research VP at Gartner Research
“The breadth of
Microsoft offerings
is attractive to IT
organizations that
require real-time
visibility and
control… the
capabilities of
Microsoft Cloud App
Security can enable IT
organizations to
achieve a level of
normalcy.”
Mark Bowker
ESG Group
12. Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
13. Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
21. An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
22. Secure
identities to
reach zero trust
Strengthen your credentials by turning on MFA
Reduce your attack surface area by blocking
legacy authentication
Automate threat remediation with solutions such
as risk-based conditional access
Increase visibility into why IDs are blocked, monitor
security alerts and take action
Enable self-service capabilities for more predictable
and complete end-user security
26. Correlate across
attack vectors
Detect & remediate
breaches
Protect the
digital estate
Help stop damaging attacks with integrated and automated security
31. Help stop damaging
attacks with
integrated and
automated security
Quickly detect anomalous behavior through
integrated intelligence
Apply sophisticated machine learning, heuristics,
and intelligence to identify credential compromise
Reduce threat resolution times with automation
Identify and mitigate the latest email threats
35. Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
36. Unified approach to discover,
classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations and
applications
Data growing at exponential rate
LabelDiscover Classify
Unified approach
Devices Apps Cloud services On-premises ISVs, 3rd-party
→ Sensitive data discovery
→ Data at risk
→ Policy violations
Monitor
→ Label Analytics
→ Proactive alerts
→ Supervision
Protection Governance
→ Encryption
→ Restrict access
→ Watermark
→ Header/Footer
→ Archiving
→ Retention & deletion
→ Records management
→ Event based
Apply policy
37. Option to manage and control your
own encryption keys to help meet
compliance needs
Additional customer controls for
added protection and control
Data is encrypted by default at-rest
and in-transit
Meets rigorous industry standards
39. Deliver native app experiences that
work and feel natural on any platform
Simplify access to resources
employees need across their devices
with single sign-on and conditional
access
Enable Office apps that users
love on mobile devices, without
compromising security
40. Locate and
classify
information
anywhere it
lives
Define sensitive data & establish your label taxonomy
Customize your protection policies – based on
internal objectives and compliance requirements
Start classifying and labeling content
Assess and adjust, based on ongoing monitoring
of sensitive data, impact on users
48. Strengthen your
security posture
with insights and
guidance
Understand your current security position
across your organization
Create policies and enable controls to better
define your security position
Use the built-in recommendations to find the
right balance of security
49.
50. “If you make security hard,
people may work around it.
With Microsoft 365, we get
native capabilities, visibility into
our operational environment,
and simplicity for all employees.”
Simon Hodgkinson
Group Chief Information
Security Officer, BP
51. “With Advanced Threat Protection,
we’re more aware of potential
threats …. That helps us address
advanced malware threats that are
becoming more prevalent and
decreases the operational expense
of resolving security issues.”
Tony Taylor
Senior Director of Infrastructure and Security,
Land O’Lakes
52. Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
53. Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
55. M365
F1
$10
M365
E31
$32
M365
E51
$57
Productivity &
Collaboration
Office client apps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫
Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar
(Outlook, Exchange), social & internet (SharePoint, Yammer)
⚫2 ⚫ ⚫
Device & App
Management
Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows
Analytics Device Health
⚫ ⚫ ⚫
Security
Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure
Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3,
Windows Information Protection & BitLocker, Azure Information Protection Plan 1
⚫ ⚫ ⚫
Office 365 Data Loss Prevention ⚫ ⚫
Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan
2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP)
⚫
Compliance
Information Protection & Compliance (O365 Advanced Compliance, Azure Information
Protection Plan 2)
⚫
Voice Audio Conferencing, Phone System ⚫
Analytics
MyAnalytics ⚫ ⚫ ⚫
Delve ⚫ ⚫
Power BI Pro ⚫
PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation
SeeSpeakerNotesforfootnotes
Microsoft 365 Enterprise Plan Overview
56. Identity & Threat
Protection
$12
Information Protection
& Compliance
$10
M365 E5
Step-up
$25
Security O365 ATP Plan 2
1
⚫ ⚫
Microsoft Cloud App Security
2
⚫ ⚫
Azure Active Directory Plan 2 ⚫ ⚫
Azure ATP ⚫ ⚫
Windows Defender ATP ⚫ ⚫
Compliance
O365 Advanced Compliance ⚫ ⚫
Azure Information Protection Plan 2 ⚫ ⚫
Voice Phone System
3
⚫
Audio Conferencing
3
⚫
Analytics Power BI Pro
3
⚫
PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation
E5 Advanced Security & Compliance Offerings
1
Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value
2
Consolidates O365 CAS and MCAS value