Cloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security
|
|
- Dwayne Howard
- 7 years ago
- Views:
Transcription
1 Cloud aber Sicher Florian van Keulen Senior Consultant Cloud & Security BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH
2 Since 2014 at Trivadis Security Infrastructure Identity & Access Management Cloud Infrastructure & Security Office 365 & SharePoint Florian van Keulen Senior Consultant BDS Security Officer Information Security Management 2 Dec 2015
3 Security Opportunities 3 Dec 2015
4 Datacenter & Storage Location Ireland & Netherlands Azure Office 365 Dynamics CRM Online Finland & Austria NEW Office 365 Germany NEW Data Trustee Telekom 4 Dec 2015
5 Datacenter & Storage Location Storage Replication Locally Redundant Storage (LRS) Zone Redundant Storage (ZRS) Geo Redundant Storage (GRS) Read Access Geo Redundant Storage (RA-GRS) 5 Dec 2015
6 6 Dec 2015
7 Identity & Access Management 7 Dec 2015
8 Multi Factor Authentication (MFA) Extra Authentication Factor Automated Call / Token (SMS) Authenticator App For Cloud Services Also for On-Premise Rules can be Applied Administrators and Users 8 Dec 2015
9 Conditional Access 9 Dec 2015
10 Comprehensive Reports & Notifications Microsoft Threat Intelligence Credentials found in Dark web Botnet activity Authentication Context Analysis 10 Dec 2015
11 Unified Device Management 11 Dec 2015
12 Azure RMS Encrypts and protects Documents and Mails Access through Authorization by Azure AD Policies Edit Copy Print Retention Time Also with External Users 12 Dec 2015
13 Azure RMS uses encryption, identity, and authorization policies to secure Mails and Files protected both within and outside your organization protection remains with the data Encryption: 2048-bit RSA asymmetric key with SHA- 256 hash algorithm AES 128-bit symmetric (CBC mode with PKCS#7 padding) Azure RMS 13 Dec 2015
14 Azure RMS Keys are Stored in Azure Keyvault Geo-location specific Stored in HSM module Full Audit und Logging of Key usage BYOK support available Azure RMS 14 Dec 2015
15 Azure RMS Bring your Own Key (BYOK) 15 Dec 2015
16 Enterprise Mobility Suite Identity Management Authentication & Authorization MFA Conditional Access Document Level Security Encryption Policies Secure Access Microsoft Azure Active Directory Premium + Microsoft Intune + Microsoft Azure Rights Management Unified Mobile Device Management Access Management Apps Deployment Selective Wipe 16 Dec 2015
17 Enterprise Mobility Suite Microsoft Azure Active Directory Premium + Microsoft Intune + Microsoft Azure Rights Management 17 Dec 2015
18 Office 365 Security Data Retention Policies / Legal Hold Encryption Data Loss Prevention (DLP) Exchange Online Advance Threat Protection (essential RMS & MDM Features) 18 Dec 2015
19 Data Retention Policies / Legal Hold 19 Dec 2015
20 Office 365 Encryption Azure RMS Office 365 Message Encryption S/MIME 20 Dec 2015
21 Office 365 Message Encyption (OME) apply encryption on s that originate from Office 365 inside or outside Office 365 External users can decrypt the received by either: an Office 365 account (from their company) a Microsoft account a one-time passcode Azure RMS used for encryption Office 365 Message Encryption 21 Dec 2015
22 S/MIME standard for public key encryption digital signing of MIME data Public / Private Key Infrastructure Works with Outlook, Outlook Web App, and Exchange ActiveSync clients (mobile) S/MIME 22 Dec 2015
23 Encryption AES265 encryption at Rest and in Motion Two types of encryption for Data at Rest: Disk encryption (using Bitlocker) File encryption Each file is encrypted with its own key Data in Motion SSL (TLS 1.0 & 1.2) New cipher suite order Discovered vulnerabilities are taken serious: SSLv3 Support withdrawn RC4 cipher support withdrawn 23 Dec 2015
24 Encryption of Files in OneDrive & SharePoint Encrypted Files and File Chunks stored randomlyaccross Encrypted Storage Containers Keys of the Container & Content DB Keys of the Files and File Chunks Keys and content are stored in 3 different locations, so you need authorization in all 3 areas to reveal data 24 Dec 2015
25 Data Lost Prevention (DLP) Prevents Sensitive Data From Leaving Organization Provides an Alert when data such as Social Security & Credit Card Number is ed Alerts can be customized by Admin to catch Intellectual Property from being ed out , OneDrive & Office For Based On Policies File Content Patterns Built-in templates based on common regulations Import DLP policy templates from security partners or build your own 25 Dec 2015
26 Exchange Online Advance Threat Protection Multiple Anti Malware Engines URL Link Rich Reporting & Tracing 26 Dec 2015
27 Office365 Lock Box 27 Dec 2015
28 Does your Datacenter Support these features? High Availability & Geo Redundancy of your data Full Featured Identity and Access management Cross Premises and with 3 rd Party MFA and Conditional access Enhanced Security Reports and Notifications (Threat Intelligenz) Unified Device Management Rights Management on Document Level wherever stored & Multi Level File Encryption Retention time, Archiving and Legal Hold Advanced Threat Protection And most of it is already in an Office365 Subscription included!!! 28 Dec 2015
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationConditional Access and Mobile Application Management explained
Conditional Access and Mobile Application Management explained Peter van der Woude AZURE OFFICE 365 ENTERPRISE MOBILITY SUITE OPERATIONS MANAGEMENT SUITE AZURE STACK HYPERV WINDOWS Peter van der Woude
More informationAzure Active Directory
Azure Active Directory Your Cloud Identity Brian Mansure Azure Specialist bmansure@enpointe.com Agenda What Azure Active Directory is What Azure Active Directory is not Hybrid Identity Features Roadmap
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationCloud App Security. Tiberio Molino Sales Engineer
Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationMicrosoft Azure. IaaS Networking Storage. Stefan Geiger Gerry Keune. @trivadis.com
Microsoft Azure IaaS Networking Storage Stefan Geiger Gerry Keune @trivadis.com BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN 1 12.06.2014 Agenda 1.
More informationSecure Collaboration within Organizations, B2B and B2C. eberhard@keyon.ch staible@keyon.ch
Secure Collaboration within Organizations, B2B and B2C eberhard@keyon.ch staible@keyon.ch Definition of the term Collaboration : Working with others to do a task and to achieve shared goals. Major Business
More informationAlexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
More informationSichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationSAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES
SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES Netskope 2015 Enterprises are rapidly adopting Microsoft Office 365. According to the Netskope Cloud Report, the suite is among the top
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationSecurity Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationMICROSOFT EXCHANGE, OFFERED BY INTERCALL
MICROSOFT EXCHANGE, OFFERED BY INTERCALL Comparison Sheet The table below compares in-product or service feature availability between Microsoft 2013 on-premises and Online within. Planning and Deployment
More informationFREQUENTLY ASKED QUESTIONS (FAQ)
General Questions Q1: What is the Vaultive platform and what functionality does it deliver? Vaultive is an Enterprise grade encryption platform that is scalable, redundant and built for performance. Vaultive
More informationCloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
More informationOffice 365 in Healthcare. Shawn Remacle Director, Industry Sales Engagement Microsoft Health & Life Sciences
Office 365 in Healthcare Shawn Remacle Director, Industry Sales Engagement Microsoft Health & Life Sciences Today s Topics Microsoft: Cloud scale infrastructure 1B+ customers in 125 marketplaces Over 1M
More informationIntroducing MachPanel v.5
Introducing MachPanel v.5 Datasheet MachPanel Web Hosting MachSol Inc. MachPanel Web Hosting Table of Contents 1. ABOUT THIS DOCUMENT... 3 2. KEY CONCEPTS... 3 3. MACHPANEL PROVISIONING SYSTEM... 3 4.
More informationMicrosoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
More informationEnterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report
More informationSmall Business (1-25) Midsize Business (1-300) Enterprise (unlimited)
Small Business (1-25) Midsize Business (1-300) Enterprise (unlimited) Simplified admin experience Full Enterprise admin experience Full Enterprise admin experience Business Core needs Enterprise Advanced
More informationBuilding High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services
Building High Growth Services on the Microsoft Cloud Platform Rich Cannon Senior Director, US Partner and Cloud Services Momentum 35% YoY revenue growth Hosters are largest contributor across all partner
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationMeet Exchange Server 2016
Meet Exchange Server 2016 Scott Schnoll schnoll@microsoft.com Superior performance and reliability Robust, proven architecture Flexible, future-ready foundation Deeply integrated with other products Office
More informationInformation Rights Management in SharePoint. by André Vala
Information Rights Management in SharePoint by André Vala About Me... André Vala SharePoint Solutions Architect Office & SharePoint Solutions Team Leader andre.vala@create.pt @atomicvee http://blogit.create.pt/andrevala
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationUNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
More informationMicrosoft Enterprise Mobility and Client Futures
Microsoft Enterprise Mobility and Client Futures Steve Newby& Andy Taylor Device & Mobility TSPs Microsoft UK 66% 18% 33% of employees use personal devices for work purposes.* of all software spending
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationHow To Ensure Data Security On Anor
Oracle Database Security How much would you like? DOAG + SOUG Security-Lounge Stefan Oehrli Senior Consultant Discipline Manager Trivadis AG Basel 24. April 2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT
More informationAPS Connect Denver, CO
New Generation Data Protection Powered by the Acronis AnyData Engine APS Connect Denver, CO Jon Farmer February 26, 2015 2015 Acronis Industry Leader in Data Protection Market Leading Solutions & Technology
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More informationCLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
More informationChapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
More informationOverview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
More informationLicense table for Competency partners
License table for Competency partners Refer to the Product Usage Guide for important details regarding license use rights and limitations about each software product or online service. Your organization
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationQuick Start and Trial Guide (Mail) Version 3 For ios Devices
Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationSOUG-SIG Data Replication With Oracle GoldenGate Looking Behind The Scenes Robert Bialek Principal Consultant Partner
SOUG-SIG Data Replication With Oracle GoldenGate Looking Behind The Scenes Robert Bialek Principal Consultant Partner BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationWindows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
More informationVAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper
COMPLEMENTARY ENCRYPTION SOLUTIONS White Paper Table of Contents Section I: Vaultive & Microsoft: Complementary Encryption Solutions... 2 Section II: Vaultive is a Microsoft ISV Partner... Appendix A:
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationSharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationRights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
More informationMicrosoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries.
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
More informationHans Demeyer Supplier of Inspiration & Optimism @suppl_of_optim v-hansd@microsoft.com
Hans Demeyer Supplier of Inspiration & Optimism @suppl_of_optim v-hansd@microsoft.com Modern Workplace Office 365 What s in it? Office 365 Next steps THE WORLD HAS CHANGED. MODERN WORKPLACE UBIQUITOUS
More informationSecuring sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
More informationv-fspuls@microsoft.com
v-fspuls@microsoft.com Agenda Get Current Upgrade Plan Segment Current OS Upgrade To RTW RTW + 1 year Consumer Commercial Windows 8/8.1 Windows 7 Home Basic, Home Premium Windows 8/8.1 Pro Windows 7
More informationCLOUD ACCESS SECURITY BROKERS
The Definitive Guide to CLOUD ACCESS SECURITY BROKERS WHITE PAPER For many enterprises, security and compliance concerns hamper adoption of cloud applications. In fact, 90% of companies have security concerns
More informationWhat is OneDrive for Business?
What is OneDrive for Business? This article is based on public presentations at the Microsoft Ignite event and is not an official Microsoft document and may not represent an official Microsoft position
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationLicense table for Competency partners. Core licenses
License table for Competency partners Refer to the Product Usage Guide for important details regarding license use rights and limitations about each software product or online service. Your organization
More informationAlliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationKelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
More informationO, P, Q I, J, K. Nuvolex, 260, 340
Index A Administration center administrator options, 265 administrator roles, 266 billing administrator, 267 configuration adding new Skype, 280 add password information, 271 add user information and E-mail
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationExchange Online Protection In-Depth
Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationcomplete File Sharing Anywhere Access Technical Support Financiallybacked Simple IT Management HD Video Conferencing
complete Businessclass Email File Sharing HD Video Conferencing Office Desktop Apps Office Web Apps Office Mobile Anywhere Access Technical Support Simple IT Management Financiallybacked SLA Always the
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More informationOndřej Výšek Sales Lead, Microsoft MVP. vysek@kpcs.cz
Ondřej Výšek Sales Lead, Microsoft MVP vysek@kpcs.cz Azure Active Directory Features Free edition Basic edition Premium edition Directory as a service User and group management using UI or Windows PowerShell
More informationIntelligence. Productivity. Mobility. Unified Service. Predictive analytics: Offline mobile: Self, assisted & field service
Productivity Intelligence Mobility Unified Service Next generation productivity: Predictive analytics: Offline mobile: Self, assisted & field service Surface trending documents with Delve Immersive Excel
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More information15 th January 2015. Microsoft Windows Azure
15 th January 2015 Microsoft Windows Azure The cloud platform for the modern business Microsoft Azure is a flexible cloud platform that helps you grow with greater efficiency and be more responsive to
More informationSecure Your Email with Encryption as a Service
Secure Your Email with Encryption as a Service Janene Casella Symantec Jamie Northey Echoworx Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationMIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationSupporting Cloud Services
Supporting Cloud Services Tim Beamer, MCSA, MCSE Microsoft Cloud Engineer, Plus Consulting tim.beamer@plusconsulting.com Agenda + Introductions + The Cloud is changing everything! + Cloud Support + Cloud
More informationMCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationIdentity + Mobile Management + Security = Enterprise Mobility Suite
presenta Identity + Mobile Management + Security = Enterprise Mobility Suite Alessandro Appiani Founder & CTO - Pulsar IT alessandro.appiani@pulsarit.net twitter: @AlexAppiani Gabriele Tansini Partner
More informationMicrosoft Partner Network. Cloud Services Dashboard User Guide
Microsoft Partner Network Cloud Services Dashboard User Guide Table of Contents 1. Navigation... 4 1.1 MPN Portal... 4 2. Azure Consumption... 4 2.1 Subscriptions... 5 2.2 Consumption... 6 2.3 Customers...
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationA Winning Combination!!
Connect Cloud Continuity and 1 A Winning Combination!! Hosted Cloud Differentiators 2 TelePacific Cloud Services Communications Compliance & Security Collaboration Back up & Recovery Professional Services
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationPLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
More informationWebsense Solutions. TRITON v7.7 Architecture
Websense Solutions TRITON v7.7 Architecture Unified Platform Unified architecture Unified security intelligence Unified console Unified policy & reporting TRITON Architecture Solution Stacks for v7.7
More informationAdministering a SQL Database Infrastructure
Administering a SQL Database Infrastructure 20764A 5 Days Instructor-led, Hands on Course Information This five-day instructor-led course provides students who administer and maintain SQL Server databases
More informationAdministering a SQL Database Infrastructure 20764; 5 Days; Instructor-led
Administering a SQL Database Infrastructure 20764; 5 Days; Instructor-led Course Description This five-day instructor-led course provides students who administer and maintain SQL Server databases with
More information