SECURITY. Becoming a Security Hero: defending your users from rogue attacks
|
|
- Marilyn Nelson
- 7 years ago
- Views:
Transcription
1 Becoming a Security Hero: defending your users from rogue attacks Erik Ronny de
2 Agenda Understand how Microsoft protects your company from rogue attacks Understand which security solutions fits best your needs Learn the key considerations and deployment steps
3 Sinterklaas and the stolen wish lists
4
5 Anatomy of an attack Hulppiet ontvangt en opent het verlanglijstje Verlanglijstje met macro ENTER Hulp piet Elevated permissions MS Lateral movement Sinterklaas PC wordt gehackt Inlog gegevens van Sinterklaas worden achterhaald Kernel Exploits Kernel-mode Malware Pass-the-Hash EXPAND Sinterklaas SharePoint ESTABLISH Verlanglijstjes worden gedownload van SharePoint Macro opent backdoor naar hacker PC Browser or Doc Exploit Execution Malicious Attachment Execution Stolen Credential Use ENDGAME BUSINESS DISRUPTION LOST PRODUCTIVITY DATA THEFT ESPIONAGE, LOSS OF IP RANSOM
6 Demo set-up
7 Een mooie klus voor Security Piet
8 How to detect threats in your blind spots? Windows Defender Advanced Threat Analytics (ATP) Microsoft Operations Management Suite (OMS) Microsoft Cloud App Security (CAS)
9 Operations Managemen Suite Security & Compliance Microsoft Cloud App Security Advanced Threat Analytics Zero-day s (MS16-032) Misconfiguratie (LAPS) Windows Defender ATP EDP, Device Guard, Passport, Credential Guard
10 Windows Defender ATP
11 Adding a post-breach mindset PRE-BREACH POST-BREACH Device Device protection protection Threat Identity resistance protection Information Identity protection Information Threat protection resistance Breach detection Breach detection investigation & investigation & response response Device Health Attestation attestation Device Guard Device Control Security policies SmartScreen Built-in 2FA Account AppLocker lockdown Credential Device Guard Windows Microsoft Defender Passport Network/Firewall Windows Hello :) Device Built-in protection 2FA / Account Drive encryption lockdown Windows Credential Information Guard Microsoft Protection Passport Conditional Windows Hello access ;) Device SmartScreen protection / Drive AppLocker encryption Enterprise Device Guard Data Protection Windows Defender Conditional access Network/Firewall Windows Defender ATP Advanced Threat Protection (ATP)
12 Windows Defender ATP Provide insights to cybersecurity threats in your organization Detect signs of attacks Quickly understand how attacks entered Determine impact (damage) of attacks Enables you to respond Available from Windows 10 Anniversary Update Professional Enterprise Education Uses Windows Telemetry (security) 3 rd party antimalware must Windows Defender ELAM driver compatible
13 Demo Windows Defender Advanced Threat Protection
14 Operations Management Suite
15 Operations Management Suite Provide insights to cybersecurity threats in your organization Detect signs of attacks Quickly understand how attacks entered Determine impact (damage) of attacks Enables you to respond Available from Windows 10 Anniversary Update Professional Enterprise Education Uses Windows Telemetry (security) 3 rd party antimalware must Windows Defender ELAM driver compatible
16 Analyse Security Piet Wat er is gebeurd Op welke machine Hoe laat Met welke tool
17 Demo Operations Management Suite Security & Compliance
18 Cloud App Security
19 Cloud App Security Breach detection investigation & response in the cloud Ensure appropriate access to cloud apps Know if my users have been breached Gain visibility into cloud apps and usage Know what apps are used in my environment Prevent data leakage
20 Operations Managemen Suite Secrity & Compliance Extend enterprise-grade security to your cloud and SaaS apps OM+S EM+S C & E E5 Windows 10 E5 Microsoft Cloud App Security Windows Defender ATP EDP, Device Guard, Passport, Credential Guard Azure Active Directory Identity Protection Protect your data, everywhere Azure Information Protection Protect your users, devices, and apps Detect problems early with visibility and threat analytics Advanced Threat Analytics
21 Detect attacks before they cause damage On-premises detection Detection in the cloud Microsoft Advanced Threat Analytics (ATA) Cloud App Security + Azure Active Directory Premium Behavioral Analytics Behavioral analytics Detection of known malicious attacks Anomaly detection Detection of known security issues Security reporting and monitoring
22 Analyse Security Piet Inlog gegevens Sinterklaas zijn gestolen Waarmee OneDrive is geopend Laten we naar Cloud App Security kijken wat we daar zien
23 Demo Cloud App Security
24 Recap
25 Operations Management Suite Provide insights to cybersecurity threats in your organization Provides a holistic approach to security challenges in a mobile-first, cloud-first world Helps you to protect and identify breaches before they cause damage Adopt a POST-breach mindset based upon knowledge of how attackers change their playbook
26 Vragen?
27 17:15 18:15 Closing Note Hasain Alshakarti & Marcus Murray
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
More informationOverview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
More informationCloud App Security. Tiberio Molino Sales Engineer
Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or
More informationConditional Access and Mobile Application Management explained
Conditional Access and Mobile Application Management explained Peter van der Woude AZURE OFFICE 365 ENTERPRISE MOBILITY SUITE OPERATIONS MANAGEMENT SUITE AZURE STACK HYPERV WINDOWS Peter van der Woude
More informationWindows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile.
Core features Familar, and better than ever Home Pro Education Customizable Start Menu Windows Defender & Windows firewall N/A 1 N/A Fast start up with Hiberboot and InstantGo 2 N/A N/A TPM support 3 Battery
More informationSAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES
SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES Netskope 2015 Enterprises are rapidly adopting Microsoft Office 365. According to the Netskope Cloud Report, the suite is among the top
More informationv-fspuls@microsoft.com
v-fspuls@microsoft.com Agenda Get Current Upgrade Plan Segment Current OS Upgrade To RTW RTW + 1 year Consumer Commercial Windows 8/8.1 Windows 7 Home Basic, Home Premium Windows 8/8.1 Pro Windows 7
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationRegistrazione partecipanti e caffè di benvenuto
Registrazione partecipanti e caffè di benvenuto Alignment with Business Strategy MB 81% SB 73% AMI-Partners GM 2H 2013 97M devices in 2013 Growing to 147M in 2018 55% SMBs support a mobile workforce AMI-Partners
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationThe Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationOffice 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
More informationOffice 365 Licenties
Office 365 Licenties Tim ter Haar Microsoft Licensing Consultant Software Solutions Group Tim.ter.Haar@Copaco.com a-titerh@microsoft.com 06-27861357 Office 365 Pro Plus Exchange Online Lync Online Sharepoint
More informationWebinar Self-service in Microsoft Azure AD Premium
Webinar Self-service in Microsoft Azure AD Premium Hugh Simpson-Wells : CEO Agenda What is Azure Active Directory Premium? Self-service demo basis Self-service security groups Self-service application
More informationThe Cloud App Visibility Blind Spot
WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments
More informationMicrosoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum!
Session Overview Andy Malone (Scotland, UK) Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum! Worldwide Event Speaker Winner:
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More informationTop Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering
Top Five Security Must-Haves for Office 365 Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Today s Agenda Introductions & Company Overview Cloud App Trends, Risks
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More informationProtecting and empowering your connected organization. with Microsoft Enterprise Mobility Suite (EMS)
Protecting and empowering your connected organization with Microsoft Enterprise Mobility Suite (EMS) Contents Executive summary... 3 What s next: control in the cloud... 4 Examining the change: why is
More informationSecuring and Monitoring Access to Office 365
WHITE PAPER Securing and Monitoring Access to Office 365 Introduction Enterprises of all sizes are considering moving some or all of their business-critical applications, such as email, CRM, or collaboration,
More informationProtecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!
We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationAddressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
More informationTHE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD
Security Intelligence: THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD Brought to you by Introduction 3 Data Theft from Cloud Systems of Record 5 6-Step Process to Protect Data from Insider
More informationHow we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
More informationMod 2: User Management
Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule
More informationBuilding High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services
Building High Growth Services on the Microsoft Cloud Platform Rich Cannon Senior Director, US Partner and Cloud Services Momentum 35% YoY revenue growth Hosters are largest contributor across all partner
More informationProtection Against Advanced Persistent Threats
Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are
More informationSecuring the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
More informationCloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security
Cloud aber Sicher Florian van Keulen Senior Consultant Cloud & Security BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Since
More information2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
More informationElements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You
Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats Windows XP Support Has Ended Why It Concerns You Protect Detect Respond 1 02 Windows XP support has ended Windows XP support
More informationHoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten?
Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten? 22 Maart Aarle-Rixtel Hans van Oorschot hans.van.oorschot@caldoo.nl +31 6 2124 7424 Charles
More informationSecurity Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
More informationEnterprise Mobility Suite Overview. Joe Kuster Catapult Systems
Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationJuly 2015. Bytes are an Award Winning Microsoft Partner
July Bytes are an Award Winning Microsoft Partner Licensing changes Windows, MDOP, ECS and EMS 2 Licensing changes Bridge CAL, System Center, Azure 3 Licensing changes How to benefit your organisation
More informationNokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More informationThe Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
More informationMicrosoft Enterprise Mobility and Client Futures
Microsoft Enterprise Mobility and Client Futures Steve Newby& Andy Taylor Device & Mobility TSPs Microsoft UK 66% 18% 33% of employees use personal devices for work purposes.* of all software spending
More informationCisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
More informationRisks and Challenges
Cloud and Mobile Security: Risks and Challenges Chong Sau Wei (CISM) chong@scan associates.net General Manager Managed Security Services SCAN Associates Berhad Seminar e Kerajaan Negeri Pulau Pinang 14
More informationWhy a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
More informationMS 20687 Configuring Windows 8.1
P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course
More informationMICROSOFT LICENSING: WHAT'S INCLUDED
MICROSOFT LICENSING: WHAT'S INCLUDED Larry Kuhn, Account Technology Strategist, Microsoft David Putlak, Account Executive, Microsoft #ILTA15 #085 LICENSING OPTIONS BY BUSINESS SIZE 5 or fewer licenses
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationCyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
More informationDynamic Security for the Hybrid Cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
More informationZak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
More informationCloudLink CypherX - A Defendection
Introduction Enterprises and governments most valuable commodities are their data. Sensitive information is the lifeblood of enterprises everywhere, but it is also coveted by those of malicious intent
More informationAbout the Authors About the Technical Editor
Acknowledgments p. xiii About the Authors p. xv About the Technical Editor p. xix Foreword p. xxi Planning Platform Security p. 1 Reviewing the Gore Security Principles p. 2 Planning a Secure Platform
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationINFORMATION PROTECTION
INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary
More informationSINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education Harold.baele@realdolmen.com - @hbaele
More informationOversight Management: een zinvolle aanvulling!
Oversight Management: een zinvolle aanvulling! Houfhoff Pension Fund Academy Christiaan Tromp info@fiduciaryservices.eu April 2012 1 Agenda The Fiduciary Management promise The evolution of Pension Fund
More informationEnterprise Global Security in an era of Hybrid Cloud and Smart Mobile
Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile M. Asif Riaz, CISM, CISSP, CEH Agenda Users are demanding access to applications and services from wherever they are, whenever they
More information21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage
ITRC 在 挑 雲 戰 計 Forum 算 年 代 竭 2015 力 保 護 身 份 和 端 點 的 Understanding the Challenges of Protecting Identities and Endpoints in an increasingly Mobile and Cloud-based world Agenda Cloud Trend 2015 What measures
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationSecuring the Cloud: Making Cloud an Opportunity to Enhance Security
Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised
More informationWebroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
More information* Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden All results are final, prices are examples
* Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden All results are final, prices are examples Laat ons weten wat u vindt van deze sessie! Vul de evaluatie in via www.techdaysapp.nl
More informationSmall Business (1-25) Midsize Business (1-300) Enterprise (unlimited)
Small Business (1-25) Midsize Business (1-300) Enterprise (unlimited) Simplified admin experience Full Enterprise admin experience Full Enterprise admin experience Business Core needs Enterprise Advanced
More informationIntroducing Microsoft Lumia with Windows 10.
Introducing Microsoft Lumia with Windows 10. Your business. Mobile. 104901-054_MSG_Lumia_A5 Overview Brochure_Print_a1.indd 1 20/10/2015 14:42 Contents Your business. Mobile.... 4 Windows 10 for phone....
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
More informationPlace partner logo and/or Microsoft Partner Program logo here
Place partner logo and/or Microsoft Partner Program logo here TODAY, WE RE EXPERIENCING A REVOLUTION OF CYBER-THREATS THE REVOLUTION CYBER-CRIME CYBER-ESPIONAGE CYBER-WARFARE CYBER-TERROR THE REVOLUTION
More informationBespaar tijd en moeite met Microsoft s Management en Security.
Bespaar tijd en moeite met Microsoft s Management en Security. Joeri D hont Sales manager IT1 Dendermonde - Gent FUTURE-PROOF PEOPLE-CENTRIC Infrastructuur diensten cloudservices software hardware Our
More informationSession ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
More informationVisibility and Control for Sanctioned & Unsanctioned Cloud Apps
Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market
More informationThe Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationDriving principals of cloud adoption
Driving principals of cloud adoption Speed ability to capitalize on new opportunities and to respond to changes in business demand. Deploy applications faster and more efficiently. Deliver solutions that
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationSymantec Enterprise Security: Strategy and Roadmap Galin Grozev
Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationEmbracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo.
Embracing BYOD Without Compromising Security or Compliance The Mobile Risk Management Company Sheldon Hebert SVP Enterprise Accounts, Fixmo Sheldon.Hebert@fixmo.com New Realities of Enterprise Mobility
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationSecurity Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
More informationDefending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
More informationData platform evolution
2 Data platform evolution Top Reasons Reasons to to upgrade 1) End of extended support 2) Enhanced SQL Server 2014 features and performance 3) Impact on security and compliance 4) Cloud strategy Top Blockers
More informationCisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
More informationSecurity Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
More informationMcAfee Enterprise Mobility
McAfee Enterprise Mobility Bringing Mobile Devices into the Security Infrastructure John Dasher 14 September 2011 Devices/Users (MM in Log Scale) Hypergrowth in Mobile Devices Computing Cycles in Perspective
More informationCloud. Transformatie. Cases.
Cloud. Transformatie. Cases. Dé cloud bestaat niet. maakt cloud concreet 2 IT Transformatie. Cloud? De vraag is niet of we gaan, maar wanneer en hoe #sogetidoethet Matthias Radder Cloud Consultant 3 In
More informationWindows XP Support stops on 8. April 2014
Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats 1 Windows XP Support stops on 8. April 2014 Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats
More informationInformation Rights Management in SharePoint. by André Vala
Information Rights Management in SharePoint by André Vala About Me... André Vala SharePoint Solutions Architect Office & SharePoint Solutions Team Leader andre.vala@create.pt @atomicvee http://blogit.create.pt/andrevala
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More information11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives
Cyber Risk as a Component of Business Risk: Communicating with the C-Suite Jigar Kadakia DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily
More informationFidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
More informationSupporting Cloud Services
Supporting Cloud Services Tim Beamer, MCSA, MCSE Microsoft Cloud Engineer, Plus Consulting tim.beamer@plusconsulting.com Agenda + Introductions + The Cloud is changing everything! + Cloud Support + Cloud
More informationDETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
More informationAnalytics: The Future of Security
Analytics: The Future of Security Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction: Security Analytics Usher Analytics What is Usher Analytics?
More informationSSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
More informationPivoting to Data-less Endpoints with High Security and Cloud Services. Robert Pell, Principal Architect, East Region Code42 Software
Pivoting to Data-less Endpoints with High Security and Cloud Services Robert Pell, Principal Architect, East Region Code42 Software Trend 1: Secure Cloud Storage Services On-premise Security Unlimited
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More information