SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Aptera Presents:
Security and
Compliance in
Office 365
Mark Gordon
Enterprise Architect
How storing your data in the cloud
can be even more secure than
storing them on premises
Agenda
• Businesses Security and Compliance needs
• Office 365 Security and Compliance
• Demonstration of Compliance Capabilities
• Next Steps
Common Examples of Compliance Regulations
Transparency/Audit
• 21 CFR Part 11 AuditTrail
• SEC
• SAS 70Type I andType II
Privacy/Non Disclosure
•HIPAA
•ITAR
•FISMA
•FERPA
•EU model clauses
•Gramm-Leach-Blily
Legal
• Hold and E Discovery
• Three common types of
compliance concerns
• Most businesses will have
some of all three
• Office 365 can be part of
compliant solutions for these
regulations
Common Compliance Requirements that can be met in Office
365
SeeTHIS link for a framework to build your compliance plan
Healthcare
• HIPAA
• FISMA
• Legal Discovery
• 21 CFR Part 11 AuditTrail
HighTech/Manufacturing
• ITAR
• ISO 27001
• Legal Discovery
• EU Model Clauses
Finance
• PCI
• Gramm–Leach–Bliley Act
• Legal Discovery
• Internal/External Audit
• Compliance starts with and is
most importantly corporate
policy
• Compliance is implemented
through IT systems
• If your technology is not
compliant you are not compliant
• Just because your technology is
compliant does not make you
compliant
Office 365Trust Center – http:trustoffice365.com
Office 365 Compliance
• HIPAA Business Associate Agreement
• ISO 27001
• EU Model Clauses
• DPA-Data Processing Agreement
• FISMA
• ITAR
• FERPA
• External Audit
Office 365 Security
• Modular Datacenters
– No access to individual computing
components
– Very small IT staff onsite
• PhysicalAccess Controls
– Biometric
– RFID – Location known and recorded
at all times
• Physical Security
• Redundancy and Disaster Recovery
• Network
SecurityThreats and Countermeasures
Threats
• Stolen Password
• Data Leakage
• UnsecureTransport
• Lost Devices
– Computer
– Mobile
– USB Drive
• Disk Failures
• Internal theft of Data
• Blind Subpoena
• DOS / Unavailability
Countermeasures
• Two FactorAuthentication
• Mail Encryption
• DLP Policy
• Remote DeviceWipe
• Hard Drive Encryption
• Portable File Encryption
• Redundant Storage
• Physical and Employee Security
• Encryption inTransit
• Encryption at Rest
• Throttling / 99.98 quarterly uptime
Protecting from Stolen Passwords:
Multi-factor Authentication
Implementation
• Built in to Office 365
• Works with your locally managed AD
accounts
• Simple to implement
• Implement forGlobal Administrators
or any other users who have access
to high risk information
• User can change 2nd factor method
Requirements
• Access to phone or mobile device
• Options
– Text
– Application
– Phone Call
Multi-factor Authentication
Demo
Protecting e-mail and documents in transit:
Encryption Options
• E-mail
– Office 365 Mail Encryption
– TLSTransport Rules
• Documents/Communications
– All client traffic encrypted
• Lync
• Outlook
• Office
• Browser
• Encrypted mail is hosted on a
web server from the Microsoft
Datacenter
• Recipients get e-mail with a
link to the message
• TLS is easier for the recipient
and can be secure
DLP - Encrypted E-mail andTLS
Demo
Protecting against lost or stolen devices
Device Security Policy
• Device Password
• Remote DeviceWipe
• Bad Password Count Lockout
• Bad Password Count Reset
RemoteWipe
• Can be done from any browser
by the device owner or an
administrator
Remote DeviceWipe
Demo
Protecting Files on any media or device
Information Rights Management
• Portable Encryption
– Works on any device or storage medium
• Access to document can be revoked
– Person leaves company or project
– Document can expire
• Granular access rights
– Read
– Copy
– Print
– Forward
Portable File Encryption
Demo
E-Discovery – Hold – Retention Policy
E-Discovery
• DiscoveryAgents
• Email, Documents, Lync
• Search options
• Exporting results
In Place Hold
• By search criteria
• Mailbox legal hold
– Retention period
Retention Policy
• Defines when items are destroyed or
moved
• Can be managed by user and/or set by
policy
Discovery-Hold-Retention
Demo
Encryption at Rest
BYOE – BringYour Own Encryption
Provider Encryption at Rest
• Protects against
– Physical access to disks
• Does not protect against
– Blind Subpoena
– Programmatic Access to your Data
– Administrator Access to your Data
• Native Support for
– Read/Write
– Search and Index
– Remote Access
BYOE
• Protects against
– Physical access to disks
– Blind Subpoena
– Programmatic Access to your Data
– Administrator Access to your Data
• Must Allow Support for
– Read/Write
– Search and Index
– Remote Access
BYOE Architecture e-mail
From: Mia To:Vincent
Vincent, attached is the
customer’s SSN and Credit-
Card information.
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
From: Mia To:Vincent
Vincent, attached is the
customer’s SSN and Credit-
Card information.
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
Action Plan
Identify Owners for
• Document/mail retention
• Legal Hold/Discovery
• Compliance
• Security Policy
• Disaster Recovery
Define your Corporate
• Compliance requirements
• Security Policy
• Retention Policy
• Legal/Discovery-Hold Policy
• Disaster Recovery Plan
Match against currently
systems
• Compliance capabilities
• Security capabilities
• Retention capabilities
• Legal/Discovery-Hold capabilities
Evaluate Office 365 Capabilities
• Compliance
• Security
• Availability/Recovery
• Retention
• Legal
Next Step:
Free Aptera
Compliance and
Security Strategy
Review
SurfaceWinner!
Questions?
Email:
secure@apterainc.com
Phone:
260-739-1949
References
• Free 30 day Office 365Trial
• Office 365 Service Updates
• Office 365 Service Descriptions
• Office 365 Privacy, Security and Compliance
• Office 365 security white paper

Más contenido relacionado

La actualidad más candente

Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Avi Networks
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceMatthew R. Barrett
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaAlibaba Cloud
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираMetamorphosis
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionCipherCloud
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Bitglass
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaPatrick Sklodowski
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAmazon Web Services
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensBitglass
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 

La actualidad más candente (20)

Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
SIEM & IAM
SIEM & IAMSIEM & IAM
SIEM & IAM
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 

Similar a Office 365 Security and Compliance Presentation

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...Health IT Conference – iHT2
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutQuest
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 

Similar a Office 365 Security and Compliance Presentation (20)

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 

Más de Aptera Inc

Gdd geoff daigle-june2016
Gdd geoff daigle-june2016Gdd geoff daigle-june2016
Gdd geoff daigle-june2016Aptera Inc
 
Theres no quick fix to your seo
Theres no quick fix to your seoTheres no quick fix to your seo
Theres no quick fix to your seoAptera Inc
 
Enterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that WorksEnterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that WorksAptera Inc
 
Designing your Website to Match Business Goals
Designing your Website to Match Business GoalsDesigning your Website to Match Business Goals
Designing your Website to Match Business GoalsAptera Inc
 
SharePoint Governance with Aptera
SharePoint Governance with ApteraSharePoint Governance with Aptera
SharePoint Governance with ApteraAptera Inc
 
How to Capitalize on the Growth of Data
How to Capitalize on the Growth of DataHow to Capitalize on the Growth of Data
How to Capitalize on the Growth of DataAptera Inc
 
6 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 20156 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 2015Aptera Inc
 
Inbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing SuccessInbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing SuccessAptera Inc
 
How to Encourage SharePoint User Adoption
How to Encourage SharePoint User AdoptionHow to Encourage SharePoint User Adoption
How to Encourage SharePoint User AdoptionAptera Inc
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BIAptera Inc
 
Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013Aptera Inc
 
Little Steps to BIG Data
Little Steps to BIG DataLittle Steps to BIG Data
Little Steps to BIG DataAptera Inc
 
OneDrive to Rule Them All
OneDrive to Rule Them AllOneDrive to Rule Them All
OneDrive to Rule Them AllAptera Inc
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureAptera Inc
 
What is Office 365? A Simple Answer
What is Office 365? A Simple AnswerWhat is Office 365? A Simple Answer
What is Office 365? A Simple AnswerAptera Inc
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraAptera Inc
 
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt NoggleAptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt NoggleAptera Inc
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Inc
 
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy MillerAptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy MillerAptera Inc
 
New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013Aptera Inc
 

Más de Aptera Inc (20)

Gdd geoff daigle-june2016
Gdd geoff daigle-june2016Gdd geoff daigle-june2016
Gdd geoff daigle-june2016
 
Theres no quick fix to your seo
Theres no quick fix to your seoTheres no quick fix to your seo
Theres no quick fix to your seo
 
Enterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that WorksEnterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that Works
 
Designing your Website to Match Business Goals
Designing your Website to Match Business GoalsDesigning your Website to Match Business Goals
Designing your Website to Match Business Goals
 
SharePoint Governance with Aptera
SharePoint Governance with ApteraSharePoint Governance with Aptera
SharePoint Governance with Aptera
 
How to Capitalize on the Growth of Data
How to Capitalize on the Growth of DataHow to Capitalize on the Growth of Data
How to Capitalize on the Growth of Data
 
6 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 20156 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 2015
 
Inbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing SuccessInbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing Success
 
How to Encourage SharePoint User Adoption
How to Encourage SharePoint User AdoptionHow to Encourage SharePoint User Adoption
How to Encourage SharePoint User Adoption
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
 
Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013
 
Little Steps to BIG Data
Little Steps to BIG DataLittle Steps to BIG Data
Little Steps to BIG Data
 
OneDrive to Rule Them All
OneDrive to Rule Them AllOneDrive to Rule Them All
OneDrive to Rule Them All
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
What is Office 365? A Simple Answer
What is Office 365? A Simple AnswerWhat is Office 365? A Simple Answer
What is Office 365? A Simple Answer
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt NoggleAptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
 
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy MillerAptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
 
New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013
 

Último

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Último (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Office 365 Security and Compliance Presentation

  • 1. Aptera Presents: Security and Compliance in Office 365 Mark Gordon Enterprise Architect How storing your data in the cloud can be even more secure than storing them on premises
  • 2. Agenda • Businesses Security and Compliance needs • Office 365 Security and Compliance • Demonstration of Compliance Capabilities • Next Steps
  • 3. Common Examples of Compliance Regulations Transparency/Audit • 21 CFR Part 11 AuditTrail • SEC • SAS 70Type I andType II Privacy/Non Disclosure •HIPAA •ITAR •FISMA •FERPA •EU model clauses •Gramm-Leach-Blily Legal • Hold and E Discovery • Three common types of compliance concerns • Most businesses will have some of all three • Office 365 can be part of compliant solutions for these regulations
  • 4. Common Compliance Requirements that can be met in Office 365 SeeTHIS link for a framework to build your compliance plan Healthcare • HIPAA • FISMA • Legal Discovery • 21 CFR Part 11 AuditTrail HighTech/Manufacturing • ITAR • ISO 27001 • Legal Discovery • EU Model Clauses Finance • PCI • Gramm–Leach–Bliley Act • Legal Discovery • Internal/External Audit • Compliance starts with and is most importantly corporate policy • Compliance is implemented through IT systems • If your technology is not compliant you are not compliant • Just because your technology is compliant does not make you compliant
  • 5. Office 365Trust Center – http:trustoffice365.com Office 365 Compliance • HIPAA Business Associate Agreement • ISO 27001 • EU Model Clauses • DPA-Data Processing Agreement • FISMA • ITAR • FERPA • External Audit
  • 6. Office 365 Security • Modular Datacenters – No access to individual computing components – Very small IT staff onsite • PhysicalAccess Controls – Biometric – RFID – Location known and recorded at all times • Physical Security • Redundancy and Disaster Recovery • Network
  • 7. SecurityThreats and Countermeasures Threats • Stolen Password • Data Leakage • UnsecureTransport • Lost Devices – Computer – Mobile – USB Drive • Disk Failures • Internal theft of Data • Blind Subpoena • DOS / Unavailability Countermeasures • Two FactorAuthentication • Mail Encryption • DLP Policy • Remote DeviceWipe • Hard Drive Encryption • Portable File Encryption • Redundant Storage • Physical and Employee Security • Encryption inTransit • Encryption at Rest • Throttling / 99.98 quarterly uptime
  • 8. Protecting from Stolen Passwords: Multi-factor Authentication Implementation • Built in to Office 365 • Works with your locally managed AD accounts • Simple to implement • Implement forGlobal Administrators or any other users who have access to high risk information • User can change 2nd factor method Requirements • Access to phone or mobile device • Options – Text – Application – Phone Call
  • 10. Protecting e-mail and documents in transit: Encryption Options • E-mail – Office 365 Mail Encryption – TLSTransport Rules • Documents/Communications – All client traffic encrypted • Lync • Outlook • Office • Browser • Encrypted mail is hosted on a web server from the Microsoft Datacenter • Recipients get e-mail with a link to the message • TLS is easier for the recipient and can be secure
  • 11. DLP - Encrypted E-mail andTLS Demo
  • 12. Protecting against lost or stolen devices Device Security Policy • Device Password • Remote DeviceWipe • Bad Password Count Lockout • Bad Password Count Reset RemoteWipe • Can be done from any browser by the device owner or an administrator
  • 14. Protecting Files on any media or device Information Rights Management • Portable Encryption – Works on any device or storage medium • Access to document can be revoked – Person leaves company or project – Document can expire • Granular access rights – Read – Copy – Print – Forward
  • 16. E-Discovery – Hold – Retention Policy E-Discovery • DiscoveryAgents • Email, Documents, Lync • Search options • Exporting results In Place Hold • By search criteria • Mailbox legal hold – Retention period Retention Policy • Defines when items are destroyed or moved • Can be managed by user and/or set by policy
  • 18. Encryption at Rest BYOE – BringYour Own Encryption Provider Encryption at Rest • Protects against – Physical access to disks • Does not protect against – Blind Subpoena – Programmatic Access to your Data – Administrator Access to your Data • Native Support for – Read/Write – Search and Index – Remote Access BYOE • Protects against – Physical access to disks – Blind Subpoena – Programmatic Access to your Data – Administrator Access to your Data • Must Allow Support for – Read/Write – Search and Index – Remote Access
  • 19. BYOE Architecture e-mail From: Mia To:Vincent Vincent, attached is the customer’s SSN and Credit- Card information. From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚 From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚 From: Mia To:Vincent Vincent, attached is the customer’s SSN and Credit- Card information. From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚
  • 20. Action Plan Identify Owners for • Document/mail retention • Legal Hold/Discovery • Compliance • Security Policy • Disaster Recovery Define your Corporate • Compliance requirements • Security Policy • Retention Policy • Legal/Discovery-Hold Policy • Disaster Recovery Plan Match against currently systems • Compliance capabilities • Security capabilities • Retention capabilities • Legal/Discovery-Hold capabilities Evaluate Office 365 Capabilities • Compliance • Security • Availability/Recovery • Retention • Legal
  • 21. Next Step: Free Aptera Compliance and Security Strategy Review SurfaceWinner! Questions? Email: secure@apterainc.com Phone: 260-739-1949
  • 22. References • Free 30 day Office 365Trial • Office 365 Service Updates • Office 365 Service Descriptions • Office 365 Privacy, Security and Compliance • Office 365 security white paper