SECURITY. Becoming a Security Hero: defending your users from rogue attacks

Size: px
Start display at page:

Download "SECURITY. Becoming a Security Hero: defending your users from rogue attacks"

Transcription

1 Becoming a Security Hero: defending your users from rogue attacks Erik Ronny de

2 Agenda Understand how Microsoft protects your company from rogue attacks Understand which security solutions fits best your needs Learn the key considerations and deployment steps

3 Sinterklaas and the stolen wish lists

4

5 Anatomy of an attack Hulppiet ontvangt en opent het verlanglijstje Verlanglijstje met macro ENTER Hulp piet Elevated permissions MS Lateral movement Sinterklaas PC wordt gehackt Inlog gegevens van Sinterklaas worden achterhaald Kernel Exploits Kernel-mode Malware Pass-the-Hash EXPAND Sinterklaas SharePoint ESTABLISH Verlanglijstjes worden gedownload van SharePoint Macro opent backdoor naar hacker PC Browser or Doc Exploit Execution Malicious Attachment Execution Stolen Credential Use ENDGAME BUSINESS DISRUPTION LOST PRODUCTIVITY DATA THEFT ESPIONAGE, LOSS OF IP RANSOM

6 Demo set-up

7 Een mooie klus voor Security Piet

8 How to detect threats in your blind spots? Windows Defender Advanced Threat Analytics (ATP) Microsoft Operations Management Suite (OMS) Microsoft Cloud App Security (CAS)

9 Operations Managemen Suite Security & Compliance Microsoft Cloud App Security Advanced Threat Analytics Zero-day s (MS16-032) Misconfiguratie (LAPS) Windows Defender ATP EDP, Device Guard, Passport, Credential Guard

10 Windows Defender ATP

11 Adding a post-breach mindset PRE-BREACH POST-BREACH Device Device protection protection Threat Identity resistance protection Information Identity protection Information Threat protection resistance Breach detection Breach detection investigation & investigation & response response Device Health Attestation attestation Device Guard Device Control Security policies SmartScreen Built-in 2FA Account AppLocker lockdown Credential Device Guard Windows Microsoft Defender Passport Network/Firewall Windows Hello :) Device Built-in protection 2FA / Account Drive encryption lockdown Windows Credential Information Guard Microsoft Protection Passport Conditional Windows Hello access ;) Device SmartScreen protection / Drive AppLocker encryption Enterprise Device Guard Data Protection Windows Defender Conditional access Network/Firewall Windows Defender ATP Advanced Threat Protection (ATP)

12 Windows Defender ATP Provide insights to cybersecurity threats in your organization Detect signs of attacks Quickly understand how attacks entered Determine impact (damage) of attacks Enables you to respond Available from Windows 10 Anniversary Update Professional Enterprise Education Uses Windows Telemetry (security) 3 rd party antimalware must Windows Defender ELAM driver compatible

13 Demo Windows Defender Advanced Threat Protection

14 Operations Management Suite

15 Operations Management Suite Provide insights to cybersecurity threats in your organization Detect signs of attacks Quickly understand how attacks entered Determine impact (damage) of attacks Enables you to respond Available from Windows 10 Anniversary Update Professional Enterprise Education Uses Windows Telemetry (security) 3 rd party antimalware must Windows Defender ELAM driver compatible

16 Analyse Security Piet Wat er is gebeurd Op welke machine Hoe laat Met welke tool

17 Demo Operations Management Suite Security & Compliance

18 Cloud App Security

19 Cloud App Security Breach detection investigation & response in the cloud Ensure appropriate access to cloud apps Know if my users have been breached Gain visibility into cloud apps and usage Know what apps are used in my environment Prevent data leakage

20 Operations Managemen Suite Secrity & Compliance Extend enterprise-grade security to your cloud and SaaS apps OM+S EM+S C & E E5 Windows 10 E5 Microsoft Cloud App Security Windows Defender ATP EDP, Device Guard, Passport, Credential Guard Azure Active Directory Identity Protection Protect your data, everywhere Azure Information Protection Protect your users, devices, and apps Detect problems early with visibility and threat analytics Advanced Threat Analytics

21 Detect attacks before they cause damage On-premises detection Detection in the cloud Microsoft Advanced Threat Analytics (ATA) Cloud App Security + Azure Active Directory Premium Behavioral Analytics Behavioral analytics Detection of known malicious attacks Anomaly detection Detection of known security issues Security reporting and monitoring

22 Analyse Security Piet Inlog gegevens Sinterklaas zijn gestolen Waarmee OneDrive is geopend Laten we naar Cloud App Security kijken wat we daar zien

23 Demo Cloud App Security

24 Recap

25 Operations Management Suite Provide insights to cybersecurity threats in your organization Provides a holistic approach to security challenges in a mobile-first, cloud-first world Helps you to protect and identify breaches before they cause damage Adopt a POST-breach mindset based upon knowledge of how attackers change their playbook

26 Vragen?

27 17:15 18:15 Closing Note Hasain Alshakarti & Marcus Murray

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile.

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile. Core features Familar, and better than ever Home Pro Education Customizable Start Menu Windows Defender & Windows firewall N/A 1 N/A Fast start up with Hiberboot and InstantGo 2 N/A N/A TPM support 3 Battery

More information

Conditional Access and Mobile Application Management explained

Conditional Access and Mobile Application Management explained Conditional Access and Mobile Application Management explained Peter van der Woude AZURE OFFICE 365 ENTERPRISE MOBILITY SUITE OPERATIONS MANAGEMENT SUITE AZURE STACK HYPERV WINDOWS Peter van der Woude

More information

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES Netskope 2015 Enterprises are rapidly adopting Microsoft Office 365. According to the Netskope Cloud Report, the suite is among the top

More information

v-fspuls@microsoft.com

v-fspuls@microsoft.com v-fspuls@microsoft.com Agenda Get Current Upgrade Plan Segment Current OS Upgrade To RTW RTW + 1 year Consumer Commercial Windows 8/8.1 Windows 7 Home Basic, Home Premium Windows 8/8.1 Pro Windows 7

More information

Registrazione partecipanti e caffè di benvenuto

Registrazione partecipanti e caffè di benvenuto Registrazione partecipanti e caffè di benvenuto Alignment with Business Strategy MB 81% SB 73% AMI-Partners GM 2H 2013 97M devices in 2013 Growing to 147M in 2018 55% SMBs support a mobile workforce AMI-Partners

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Securing and Monitoring Access to Office 365

Securing and Monitoring Access to Office 365 WHITE PAPER Securing and Monitoring Access to Office 365 Introduction Enterprises of all sizes are considering moving some or all of their business-critical applications, such as email, CRM, or collaboration,

More information

Webinar Self-service in Microsoft Azure AD Premium

Webinar Self-service in Microsoft Azure AD Premium Webinar Self-service in Microsoft Azure AD Premium Hugh Simpson-Wells : CEO Agenda What is Azure Active Directory Premium? Self-service demo basis Self-service security groups Self-service application

More information

Office 365 Licenties

Office 365 Licenties Office 365 Licenties Tim ter Haar Microsoft Licensing Consultant Software Solutions Group Tim.ter.Haar@Copaco.com a-titerh@microsoft.com 06-27861357 Office 365 Pro Plus Exchange Online Lync Online Sharepoint

More information

Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum!

Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum! Session Overview Andy Malone (Scotland, UK) Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum! Worldwide Event Speaker Winner:

More information

The Cloud App Visibility Blind Spot

The Cloud App Visibility Blind Spot WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments

More information

Protecting and empowering your connected organization. with Microsoft Enterprise Mobility Suite (EMS)

Protecting and empowering your connected organization. with Microsoft Enterprise Mobility Suite (EMS) Protecting and empowering your connected organization with Microsoft Enterprise Mobility Suite (EMS) Contents Executive summary... 3 What s next: control in the cloud... 4 Examining the change: why is

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Top Five Security Must-Haves for Office 365 Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Today s Agenda Introductions & Company Overview Cloud App Trends, Risks

More information

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich

More information

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect

More information

THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD

THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD Security Intelligence: THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD Brought to you by Introduction 3 Data Theft from Cloud Systems of Record 5 6-Step Process to Protect Data from Insider

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Protection Against Advanced Persistent Threats

Protection Against Advanced Persistent Threats Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are

More information

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services Building High Growth Services on the Microsoft Cloud Platform Rich Cannon Senior Director, US Partner and Cloud Services Momentum 35% YoY revenue growth Hosters are largest contributor across all partner

More information

Cloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security

Cloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security Cloud aber Sicher Florian van Keulen Senior Consultant Cloud & Security BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Since

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

Getting Started. HitmanPro.Alert Getting Started 1.1 Page 1

Getting Started. HitmanPro.Alert Getting Started 1.1 Page 1 Getting Started HitmanPro.Alert Getting Started 1.1 Page 1 1 Introduction HitmanPro.Alert is a solution that provides real-time protection for home and business PCs to guard against prevalent and zero-day

More information

Securing the mobile enterprise with IBM Security solutions

Securing the mobile enterprise with IBM Security solutions Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks

More information

Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You

Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats Windows XP Support Has Ended Why It Concerns You Protect Detect Respond 1 02 Windows XP support has ended Windows XP support

More information

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond

More information

Security Best Practices for Microsoft Azure Applications

Security Best Practices for Microsoft Azure Applications Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure

More information

Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten?

Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten? Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten? 22 Maart Aarle-Rixtel Hans van Oorschot hans.van.oorschot@caldoo.nl +31 6 2124 7424 Charles

More information

About the Authors About the Technical Editor

About the Authors About the Technical Editor Acknowledgments p. xiii About the Authors p. xv About the Technical Editor p. xix Foreword p. xxi Planning Platform Security p. 1 Reviewing the Gore Security Principles p. 2 Planning a Secure Platform

More information

CyberArk Privileged Threat Analytics. Solution Brief

CyberArk Privileged Threat Analytics. Solution Brief CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect

More information

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016 Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious

More information

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

July 2015. Bytes are an Award Winning Microsoft Partner

July 2015. Bytes are an Award Winning Microsoft Partner July Bytes are an Award Winning Microsoft Partner Licensing changes Windows, MDOP, ECS and EMS 2 Licensing changes Bridge CAL, System Center, Azure 3 Licensing changes How to benefit your organisation

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

Microsoft Enterprise Mobility and Client Futures

Microsoft Enterprise Mobility and Client Futures Microsoft Enterprise Mobility and Client Futures Steve Newby& Andy Taylor Device & Mobility TSPs Microsoft UK 66% 18% 33% of employees use personal devices for work purposes.* of all software spending

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile M. Asif Riaz, CISM, CISSP, CEH Agenda Users are demanding access to applications and services from wherever they are, whenever they

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

Risks and Challenges

Risks and Challenges Cloud and Mobile Security: Risks and Challenges Chong Sau Wei (CISM) chong@scan associates.net General Manager Managed Security Services SCAN Associates Berhad Seminar e Kerajaan Negeri Pulau Pinang 14

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

MICROSOFT LICENSING: WHAT'S INCLUDED

MICROSOFT LICENSING: WHAT'S INCLUDED MICROSOFT LICENSING: WHAT'S INCLUDED Larry Kuhn, Account Technology Strategist, Microsoft David Putlak, Account Executive, Microsoft #ILTA15 #085 LICENSING OPTIONS BY BUSINESS SIZE 5 or fewer licenses

More information

MS 20687 Configuring Windows 8.1

MS 20687 Configuring Windows 8.1 P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Information Rights Management in SharePoint. by André Vala

Information Rights Management in SharePoint. by André Vala Information Rights Management in SharePoint by André Vala About Me... André Vala SharePoint Solutions Architect Office & SharePoint Solutions Team Leader andre.vala@create.pt @atomicvee http://blogit.create.pt/andrevala

More information

SINGLE & SAME SIGN-ON ASPECTS

SINGLE & SAME SIGN-ON ASPECTS SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education Harold.baele@realdolmen.com - @hbaele

More information

Dynamic Security for the Hybrid Cloud

Dynamic Security for the Hybrid Cloud Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security

More information

Windows XP Support stops on 8. April 2014

Windows XP Support stops on 8. April 2014 Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats 1 Windows XP Support stops on 8. April 2014 Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats

More information

21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage

21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage ITRC 在 挑 雲 戰 計 Forum 算 年 代 竭 2015 力 保 護 身 份 和 端 點 的 Understanding the Challenges of Protecting Identities and Endpoints in an increasingly Mobile and Cloud-based world Agenda Cloud Trend 2015 What measures

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Securing the Cloud: Making Cloud an Opportunity to Enhance Security Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised

More information

INFORMATION PROTECTION

INFORMATION PROTECTION INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary

More information

Introducing Microsoft Lumia with Windows 10.

Introducing Microsoft Lumia with Windows 10. Introducing Microsoft Lumia with Windows 10. Your business. Mobile. 104901-054_MSG_Lumia_A5 Overview Brochure_Print_a1.indd 1 20/10/2015 14:42 Contents Your business. Mobile.... 4 Windows 10 for phone....

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Place partner logo and/or Microsoft Partner Program logo here

Place partner logo and/or Microsoft Partner Program logo here Place partner logo and/or Microsoft Partner Program logo here TODAY, WE RE EXPERIENCING A REVOLUTION OF CYBER-THREATS THE REVOLUTION CYBER-CRIME CYBER-ESPIONAGE CYBER-WARFARE CYBER-TERROR THE REVOLUTION

More information

* Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden All results are final, prices are examples

* Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden All results are final, prices are examples * Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden All results are final, prices are examples Laat ons weten wat u vindt van deze sessie! Vul de evaluatie in via www.techdaysapp.nl

More information

Bespaar tijd en moeite met Microsoft s Management en Security.

Bespaar tijd en moeite met Microsoft s Management en Security. Bespaar tijd en moeite met Microsoft s Management en Security. Joeri D hont Sales manager IT1 Dendermonde - Gent FUTURE-PROOF PEOPLE-CENTRIC Infrastructuur diensten cloudservices software hardware Our

More information

Oversight Management: een zinvolle aanvulling!

Oversight Management: een zinvolle aanvulling! Oversight Management: een zinvolle aanvulling! Houfhoff Pension Fund Academy Christiaan Tromp info@fiduciaryservices.eu April 2012 1 Agenda The Fiduciary Management promise The evolution of Pension Fund

More information

Session ID: Session Classification:

Session ID: Session Classification: Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market

More information

Discovering Azure AD Premium.

Discovering Azure AD Premium. Discovering Azure AD Premium. In this section we will start using AD Premium features, and see how it add value to our Company. Some Useful info for this article and related components. Lab Company Name:

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Small Business (1-25) Midsize Business (1-300) Enterprise (unlimited)

Small Business (1-25) Midsize Business (1-300) Enterprise (unlimited) Small Business (1-25) Midsize Business (1-300) Enterprise (unlimited) Simplified admin experience Full Enterprise admin experience Full Enterprise admin experience Business Core needs Enterprise Advanced

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Microsoft IoT Channel Overview

Microsoft IoT Channel Overview Microsoft IoT Channel Overview Martin.grossen@silica.com Martin Grossen, Franchise Manager for Microsoft IoT EMEA 2 Microsoft Industrial Channel Rebranding 3 Microsoft Industrial Channel Microsoft Industrial

More information

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo.

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo. Embracing BYOD Without Compromising Security or Compliance The Mobile Risk Management Company Sheldon Hebert SVP Enterprise Accounts, Fixmo Sheldon.Hebert@fixmo.com New Realities of Enterprise Mobility

More information

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware

More information

Compliance series Guide to the NIST Cybersecurity Framework

Compliance series Guide to the NIST Cybersecurity Framework Compliance series Guide to the NIST Cybersecurity Framework avecto.com In this paper, Avecto looks at the role least privilege security and application control play in the National Institute of Standards

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Security Best Practices for Mobile Devices

Security Best Practices for Mobile Devices Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices

More information

Driving principals of cloud adoption

Driving principals of cloud adoption Driving principals of cloud adoption Speed ability to capitalize on new opportunities and to respond to changes in business demand. Deploy applications faster and more efficiently. Deliver solutions that

More information

5 Tips to Help Protect Your Data

5 Tips to Help Protect Your Data 5 Tips to Help Protect Your Data From passive monitoring to proactive protection Table of Contents Modern Data Protection Challenges....3 1. Identify a Corporate Champion in the Business, not in IT...4

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Security Intelligence

Security Intelligence IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers

More information

Windows Phone 8 Security Overview

Windows Phone 8 Security Overview Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

Deploying an Access Database to the Enterprise through Access Services in SharePoint 2013

Deploying an Access Database to the Enterprise through Access Services in SharePoint 2013 Deploying an Access Database to the Enterprise through Access Services in SharePoint 2013 Brian Fitch SharePoint & Application Development Practice Lead @ GNet Group Brian.Fitch@GNetGroup.com Tejpal Thatte

More information

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line

More information

Data platform evolution

Data platform evolution 2 Data platform evolution Top Reasons Reasons to to upgrade 1) End of extended support 2) Enhanced SQL Server 2014 features and performance 3) Impact on security and compliance 4) Cloud strategy Top Blockers

More information

Cloud. Transformatie. Cases.

Cloud. Transformatie. Cases. Cloud. Transformatie. Cases. Dé cloud bestaat niet. maakt cloud concreet 2 IT Transformatie. Cloud? De vraag is niet of we gaan, maar wanneer en hoe #sogetidoethet Matthias Radder Cloud Consultant 3 In

More information

SIEM is only as good as the data it consumes

SIEM is only as good as the data it consumes SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

More information

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2 Mobile Security Agenda John Veldhuis, Sophos The playing field Threats Mobile Device Management Pagina 2 The Changing Mobile World Powerful devices Access everywhere Mixed ownership User in charge Powerful

More information

McAfee Enterprise Mobility

McAfee Enterprise Mobility McAfee Enterprise Mobility Bringing Mobile Devices into the Security Infrastructure John Dasher 14 September 2011 Devices/Users (MM in Log Scale) Hypergrowth in Mobile Devices Computing Cycles in Perspective

More information