Identity and Data protection with Enterprise Mobility Security in ottica GDPR
of employees say mobile business
apps change how they work
80%
of employees use non-approved
SaaS apps for work
50%
85%
of enterprise organizations keep
sensitive information in the cloud
On-premises
Devices AppsIdentity Data
On-premises
On-premises
THE PROBLEM
The security you need integrated
with the productivity tools you want
Productivity
Secure
On-premises
OR
Apps and Data
SaaS
Malware Protection Center Hunting Teams Security Response Center
Device
CERTs and
other partners
Infrastructure
Antivirus Network
PaaS IaaS
Identity
INTELLIGENT SECURITY GRAPH
Cyber Defense
Operations Center
Law Enforcement
Digital Crimes Unit
Microsoft Intelligent Security Graph
Unique insights, informed by trillions of signals
Windows Server
Active Directory
Azure
Public cloud
Azure
Active Directory
Commercial
IdPs
Consumer
IdPs
Partners
Customers
Azure AD
Connect
1. Single-sign On to thousands of 3rd
party SaaS application from any device
2. More options for authentication than any other vendor.
3. Unmatched Office 365 Integration.
4. Secure remote access to on-premises apps.
Remote Access
to on-premises
apps
SSO to SaaS
Office 365 App
Launcher
Azure AD
Connect
— Identity and access management for employees, partners, and customers —
Conditional
Access
Multi-Factor
Authentication
Addition of
custom cloud
apps
Remote Access
to on-premises
apps
Privileged
Identity
Management
Dynamic Groups
Identity
Protection
Azure AD DS
Office 365 App
Launcher
Group-Based
Licensing
Access
Panel/MyApps
Azure AD
Connect
Connect Health
Provisioning-
Deprovisioning
Azure AD Join
Self-Service
capabilities
MDM-auto
enrollment /
Enterprise State
Roaming
Security
Reporting
Access Reviews
HR App
Integration
B2B
collaboration
Azure AD
B2C
SSO to SaaS
Microsoft
Authenticator -
Password-less
Access
Securing Identity
Modern “identity & access management
as a service”
Spans cloud and on-premises
Provides full spectrum of services
• Hybrid Identity
• Federation & SSO
• Identity management
• Device registration
• User provisioning
• Conditional Access control
• Data protection
• B2B & B2C
• App integration
• MFA and security features
Apps in
MS Cloud
Third-party
web apps &
SaaS clouds
Microsoft Cloud
Microsoft Identity
Manager (MIM)
Web Apps
on-premises
AAD App Proxy
Web App
Proxy (DMZ) Azure AD App
Proxy
Connectors
Employees
Everywhere access
Partners
Everywhere access
AAD B2B
Customers
Everywhere access
B2C
Azure
AD
Connect
Other ID
stores
Other
Active
Directories
Active Directory
Federation Services
(ADFS)
Conditional Access
Application
Per app policy
Type of client
(Web, mobile rich app)
Cloud and On-premises
applications
Microsoft, 3rd party and LOB
User attributes
User identity
Group memberships
Devices
Are domain-joined
Are compliant
Platform type
(Windows, iOS, Android)
Lost or stolen
Other
Location (IP Range)
Risk profile (with Azure
Identity Protection)
ENFORCE MFA
ALLOW
BLOCK
IDENTITY-DRIVEN SECURITY
Azure Multi-Factor Authentication (MFA)
Privileged identity management
Enforce on-demand, just-in-time administrative access when needed
Use Alert, Audit Reports and Access Review
Domain
User
Global
Administrator
Discover, restrict, and monitor privileged identities
Domain
User
Administrator
privileges expire after
a specified interval
What is your favorite food?
Self Service Password Reset for WW use with a handful of click
Default or custom security questions
Email to external verified mail
Mobile phone call or TXT
Office phone call
Self-service password change: The user
knows their password but wants to
change it to something new.
Self-service password reset: The user is
unable to sign in and wants to reset their
password by using one or more of the
following validated authentication
methods.
Self-service account unlock: The user is
unable to sign in with their password
and has been locked out. The user wants
to unlock their account without
administrator intervention by using their
authentication methods.
Corporate
network
Microsoft Azure
Active Directory
Connectors are deployed usually on
corpnet next to resources
Multiple connectors can be deployed
for redundancy, scale, multiple sites,
and different resources
Users connect to the cloud service
that routes their traffic to
resources via the connectors
A connector that auto-connects
to the cloud service
Azure Active Directory Application Proxy
1000s OF APPS, 1 IDENTITY
DMZ
https://app1-
contoso.msappproxy.net/
Application Proxy
http://app1
SharePoint Online
& Office 365 apps
Assign B2B users access to any app
or service your organization owns
Add B2B users with accounts in
other Azure AD organizations
Other
organizations
Add B2B users with MSA or other
Identity Provider accounts
Other Identity
Providers*
Microsoft
Account
On-
premises
Microsoft Azure
Active Directory
Securely authenticate your
customers using their preferred
identity provider
Capture login, preference, and
conversion data for customers
Provide branded (white-label)
registration and login
experiences Social IDs Business &
Government IDs
contoso
Customers
Analytics
Apps
Microsoft Azure
Active Directory
Data Protection with
AIP - Azure Information
Protection
Enterprise Mobility + Security
Protect your
data anywhere
of workers have
accidentally shared
sensitive data to
the wrong person
58%
Stroz Friedberg
How much control do
you have over data?
OUT OF YOUR CONTROL
MICROSOFT’S APPROACH TO INFORMATION PROTECTION
Detect ProtectClassify Monitor
C L O U DD E V I C E S O N P R E M I S E S
Comprehensive protection of sensitive data throughout the
lifecycle – inside and outside the organization
Scan & detect sensitive
data based on policy
Classify data and apply
labels based on sensitivity
Apply protection actions,
including encryption,
access restrictions
Reporting, alerts,
remediation
The evolution of Azure RMS
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Reclassification
You can override a
classification and
optionally be required to
provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content
you’re working on, you
can be prompted with
suggested classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
Configure policies to discover, classify,
label and protect on premises data
Periodically scan on premises repositories
to label and protect data
Run in discovery or enforce modes
Critical for migration scenarios and
compliance with regulations such as
GDPR
Azure Information Protection scanner
Automatic classification - example
Due Diligence Documentation
Due Diligence
Category Documentation Task Owner Status
Business Plan, Corporate Structure, Financing
Business plan Current five-year business plan
Prior business plan
Corporate
organization
Articles of incorporation
Bylaws
Recent changes in corporate structure
Parent, subsidiaries, and affiliates
Shareholders’ agreements
Minutes from board meetings
Recommended classification - example
Reclassification and justification - example
User-driven classification - example
Identity and Data protection with Enterprise Mobility Security in ottica GDPR

More Related Content

PDF
Office 365 smb guidelines for pure bookkeeping (slideshare)
PPTX
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
PDF
Microsoft Office 365 Security and Compliance
PPTX
Securing Governing and Protecting Your Office 365 Investments
PPTX
Office 365 Security Best Practices
PPTX
cyber-security-reference-architecture
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PDF
Management of all the devices using Microsoft 365 Business
Office 365 smb guidelines for pure bookkeeping (slideshare)
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Microsoft Office 365 Security and Compliance
Securing Governing and Protecting Your Office 365 Investments
Office 365 Security Best Practices
cyber-security-reference-architecture
3 Modern Security - Secure identities to reach zero trust with AAD
Management of all the devices using Microsoft 365 Business

What's hot (20)

PDF
Microsoft 365 Security Overview
PDF
Thr30117 - Securely logging to Microsoft 365
PPSX
Thread Legal and Microsoft 365 Security
PPTX
Mct summit 2021
PDF
Microsoft Cloud App Security CASB
PDF
Introduction to Microsoft Enterprise Mobility + Security
PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Securely logging to Microsoft 365
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PPTX
2 Modern Security - Microsoft Information Protection
PDF
Microsoft EMS Enterprise Mobility and Security Architecture Poster
PDF
Microsoft 365 Security and Compliance
PPTX
Cloud App Security
PPTX
1 Modern Security - Keynote
PDF
Msft cloud architecture_security_commonattacks
PPTX
Azure information protection
PDF
December 2019 Microsoft 365 Need to Know Webinar
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
DOCX
Security and Compliance In Microsoft Office 365 Whitepaper
PDF
How to get deeper administration insights into your tenant
Microsoft 365 Security Overview
Thr30117 - Securely logging to Microsoft 365
Thread Legal and Microsoft 365 Security
Mct summit 2021
Microsoft Cloud App Security CASB
Introduction to Microsoft Enterprise Mobility + Security
Daniel Grabski | Microsofts cybersecurity story
Securely logging to Microsoft 365
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
2 Modern Security - Microsoft Information Protection
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft 365 Security and Compliance
Cloud App Security
1 Modern Security - Keynote
Msft cloud architecture_security_commonattacks
Azure information protection
December 2019 Microsoft 365 Need to Know Webinar
4 Modern Security - Integrated SecOps and incident response with MTP
Security and Compliance In Microsoft Office 365 Whitepaper
How to get deeper administration insights into your tenant
Ad

Similar to Identity and Data protection with Enterprise Mobility Security in ottica GDPR (20)

PDF
Information protection & classification
PPTX
5 steps to securing your identity infrastructure.pptx
PDF
Protect your data in / with the Cloud
PPTX
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PPTX
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
PPTX
Zero trust deck 2020
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
PPTX
ciso-workshop-3-identity-protection.pptx
PPTX
In t trustm365ems_v3
PPTX
Securing your Organization with Microsoft 365
PDF
Microsoft Enterprise Mobility and Security EMS
PDF
Power Saturday 2019 E1 - Office 365 security
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
PDF
MSFT Cloud Architecture Information Protection
PPTX
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
PPTX
AzureThursday Mirabeau - Azure Information Protection
PPTX
Azure AD Presentation - @ BITPro - Ajay
PDF
Security As A Service
Information protection & classification
5 steps to securing your identity infrastructure.pptx
Protect your data in / with the Cloud
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Get ahead of cybersecurity with MS Enterprise Mobility + Security
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
Zero trust deck 2020
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
ciso-workshop-3-identity-protection.pptx
In t trustm365ems_v3
Securing your Organization with Microsoft 365
Microsoft Enterprise Mobility and Security EMS
Power Saturday 2019 E1 - Office 365 security
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
MSFT Cloud Architecture Information Protection
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
AzureThursday Mirabeau - Azure Information Protection
Azure AD Presentation - @ BITPro - Ajay
Security As A Service
Ad

More from Jürgen Ambrosi (20)

PDF
Discover AI with Microsoft Azure
PDF
IBM Cloud Platform
PDF
Laboratori virtuali
PDF
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
PDF
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
PDF
Power BI Overview e la soluzione SCA per gli Atenei
PDF
HPC on Azure for Reserach
PPTX
Gruppo di lavoro ICT - attività 2019
PDF
Threat management lifecycle in ottica GDPR
PPTX
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
PPTX
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
PPTX
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
PPTX
Dalle soluzioni di BackUp & Recovery al Data management a 360°
PPTX
Le soluzioni tecnologiche per il disaster recovery e business continuity
PPTX
Le soluzioni tecnologiche per il Copy Data Management
PDF
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
PPTX
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
PDF
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
PPTX
Veritas - Software Defined Storage
PPTX
Le soluzioni tecnologiche a supporto della normativa GDPR
Discover AI with Microsoft Azure
IBM Cloud Platform
Laboratori virtuali
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
Power BI Overview e la soluzione SCA per gli Atenei
HPC on Azure for Reserach
Gruppo di lavoro ICT - attività 2019
Threat management lifecycle in ottica GDPR
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il Copy Data Management
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Veritas - Software Defined Storage
Le soluzioni tecnologiche a supporto della normativa GDPR

Recently uploaded (20)

PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PDF
Unleashing the Potential of the Cultural and creative industries
PDF
Compact First Student's Book Cambridge Official
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PPSX
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
African Communication Research: A review
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PPT
hemostasis and its significance, physiology
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PDF
Review of Related Literature & Studies.pdf
Laparoscopic Imaging Systems at World Laparoscopy Hospital
Unleashing the Potential of the Cultural and creative industries
Compact First Student's Book Cambridge Official
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
Power Point PR B.Inggris 12 Ed. 2019.pptx
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Diabetes Mellitus , types , clinical picture, investigation and managment
African Communication Research: A review
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
hemostasis and its significance, physiology
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
ACFE CERTIFICATION TRAINING ON LAW.pptx
Disorder of Endocrine system (1).pdfyyhyyyy
hsl powerpoint resource goyloveh feb 07.ppt
faiz-khans about Radiotherapy Physics-02.pdf
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Review of Related Literature & Studies.pdf

Identity and Data protection with Enterprise Mobility Security in ottica GDPR

  • 2. of employees say mobile business apps change how they work 80% of employees use non-approved SaaS apps for work 50% 85% of enterprise organizations keep sensitive information in the cloud On-premises
  • 5. THE PROBLEM The security you need integrated with the productivity tools you want Productivity Secure On-premises OR
  • 6. Apps and Data SaaS Malware Protection Center Hunting Teams Security Response Center Device CERTs and other partners Infrastructure Antivirus Network PaaS IaaS Identity INTELLIGENT SECURITY GRAPH Cyber Defense Operations Center Law Enforcement Digital Crimes Unit
  • 7. Microsoft Intelligent Security Graph Unique insights, informed by trillions of signals
  • 8. Windows Server Active Directory Azure Public cloud Azure Active Directory Commercial IdPs Consumer IdPs Partners Customers Azure AD Connect
  • 9. 1. Single-sign On to thousands of 3rd party SaaS application from any device 2. More options for authentication than any other vendor. 3. Unmatched Office 365 Integration. 4. Secure remote access to on-premises apps. Remote Access to on-premises apps SSO to SaaS Office 365 App Launcher Azure AD Connect
  • 10. — Identity and access management for employees, partners, and customers — Conditional Access Multi-Factor Authentication Addition of custom cloud apps Remote Access to on-premises apps Privileged Identity Management Dynamic Groups Identity Protection Azure AD DS Office 365 App Launcher Group-Based Licensing Access Panel/MyApps Azure AD Connect Connect Health Provisioning- Deprovisioning Azure AD Join Self-Service capabilities MDM-auto enrollment / Enterprise State Roaming Security Reporting Access Reviews HR App Integration B2B collaboration Azure AD B2C SSO to SaaS Microsoft Authenticator - Password-less Access
  • 11. Securing Identity Modern “identity & access management as a service” Spans cloud and on-premises Provides full spectrum of services • Hybrid Identity • Federation & SSO • Identity management • Device registration • User provisioning • Conditional Access control • Data protection • B2B & B2C • App integration • MFA and security features Apps in MS Cloud Third-party web apps & SaaS clouds Microsoft Cloud Microsoft Identity Manager (MIM) Web Apps on-premises AAD App Proxy Web App Proxy (DMZ) Azure AD App Proxy Connectors Employees Everywhere access Partners Everywhere access AAD B2B Customers Everywhere access B2C Azure AD Connect Other ID stores Other Active Directories Active Directory Federation Services (ADFS)
  • 12. Conditional Access Application Per app policy Type of client (Web, mobile rich app) Cloud and On-premises applications Microsoft, 3rd party and LOB User attributes User identity Group memberships Devices Are domain-joined Are compliant Platform type (Windows, iOS, Android) Lost or stolen Other Location (IP Range) Risk profile (with Azure Identity Protection) ENFORCE MFA ALLOW BLOCK IDENTITY-DRIVEN SECURITY
  • 14. Privileged identity management Enforce on-demand, just-in-time administrative access when needed Use Alert, Audit Reports and Access Review Domain User Global Administrator Discover, restrict, and monitor privileged identities Domain User Administrator privileges expire after a specified interval
  • 15. What is your favorite food? Self Service Password Reset for WW use with a handful of click Default or custom security questions Email to external verified mail Mobile phone call or TXT Office phone call Self-service password change: The user knows their password but wants to change it to something new. Self-service password reset: The user is unable to sign in and wants to reset their password by using one or more of the following validated authentication methods. Self-service account unlock: The user is unable to sign in with their password and has been locked out. The user wants to unlock their account without administrator intervention by using their authentication methods.
  • 16. Corporate network Microsoft Azure Active Directory Connectors are deployed usually on corpnet next to resources Multiple connectors can be deployed for redundancy, scale, multiple sites, and different resources Users connect to the cloud service that routes their traffic to resources via the connectors A connector that auto-connects to the cloud service Azure Active Directory Application Proxy 1000s OF APPS, 1 IDENTITY DMZ https://app1- contoso.msappproxy.net/ Application Proxy http://app1
  • 17. SharePoint Online & Office 365 apps Assign B2B users access to any app or service your organization owns Add B2B users with accounts in other Azure AD organizations Other organizations Add B2B users with MSA or other Identity Provider accounts Other Identity Providers* Microsoft Account On- premises Microsoft Azure Active Directory
  • 18. Securely authenticate your customers using their preferred identity provider Capture login, preference, and conversion data for customers Provide branded (white-label) registration and login experiences Social IDs Business & Government IDs contoso Customers Analytics Apps Microsoft Azure Active Directory
  • 19. Data Protection with AIP - Azure Information Protection
  • 20. Enterprise Mobility + Security Protect your data anywhere of workers have accidentally shared sensitive data to the wrong person 58% Stroz Friedberg
  • 21. How much control do you have over data? OUT OF YOUR CONTROL
  • 22. MICROSOFT’S APPROACH TO INFORMATION PROTECTION Detect ProtectClassify Monitor C L O U DD E V I C E S O N P R E M I S E S Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization Scan & detect sensitive data based on policy Classify data and apply labels based on sensitivity Apply protection actions, including encryption, access restrictions Reporting, alerts, remediation
  • 23. The evolution of Azure RMS DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT
  • 24. Reclassification You can override a classification and optionally be required to provide a justification Automatic Policies can be set by IT Admins for automatically applying classification and protection to data Recommended Based on the content you’re working on, you can be prompted with suggested classification User set Users can choose to apply a sensitivity label to the email or file they are working on with a single click
  • 25. Configure policies to discover, classify, label and protect on premises data Periodically scan on premises repositories to label and protect data Run in discovery or enforce modes Critical for migration scenarios and compliance with regulations such as GDPR Azure Information Protection scanner
  • 26. Automatic classification - example Due Diligence Documentation Due Diligence Category Documentation Task Owner Status Business Plan, Corporate Structure, Financing Business plan Current five-year business plan Prior business plan Corporate organization Articles of incorporation Bylaws Recent changes in corporate structure Parent, subsidiaries, and affiliates Shareholders’ agreements Minutes from board meetings