SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Go mobile.
Stay in control.
David J. Rosenthal, CEO, Atidan
August 20, 2016
Microsoft Briefing Center, NYC
EMPOWER ENTERPRISE MOBILITY
Mobile-first, cloud-first reality
Exploited
credentials
More than 75 percent of network
intrusions exploit weak or
stolen credentials.
75% 15%
Mobile security
governance
By the end of 2015 only 15 percent
of large organizations will have
adequate mobile security
governance for process and policy.
Unsecured
apps
More than 80 percent of employees
admit to using non-approved
software as a service (SaaS)
applications in their jobs.
80%
Is it possible to keep up?
Employees
Business partners
Customers
Is it possible to stay secure?
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
Is it possible to keep up?
Employees Business partners Customers
Microsoft’s vision
Access everything from everything
Manage and secure productivity
Integrate with what you have
Apps
Devices
Data
Users
Access to everything
from everything
Secure devices, apps,
and data
Preserve existing
invesments
Customers need
Integrated,
secure identity
It protects
Office better
It just works
Microsoft’s Solution
EMPOWER ENTERPRISE MOBILITY
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
EMPOWER ENTERPRISE MOBILITY
Integrated identity
Exploited
credentials 75%
One common identity
Simplify management
Improve security
IDENTITY-DRIVEN SECURITY
IDENTITY-DRIVEN SECURITY
Self-service
capabilities
• Password reset
• Group membership
• MyApps portal
Manage
everything
• Dynamic groups
• Provisioning
• B2B collaboration
Single
sign-on
• Easy connection to
existing assets
• Unified experience
across user devices
IDENTITY-DRIVEN SECURITY
Guard
apps
• Conditional access
• Secure remote access
Intelligent
analysis
• Machine learning
• Security reports
• User behavior analysis
Protect
users
• Multi-factor
authentication
• Leaked credentials
reporting
IDENTITY-DRIVEN SECURITY
ATA
Devices
and servers
Behavioral
analytics
Forensics for
known attacks
and issues
Advanced
Threat Analytics
Profile normal
entity behavior
(normal versus
abnormal)
Search for known
security attacks
and issues
Detect suspicious
user activities,
known attacks,
and issues
SIEM Active
Directory
Integrated identity
Conditional access
to all apps,
resources, and
self-service tools
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
EMPOWER ENTERPRISE MOBILITY
Managed mobile productivity
Unsecured
apps 80%
Manage and secure devices
Office mobile apps
Data-level protection
MANAGED MOBILE PRODUCTIVITY
MANAGED MOBILE PRODUCTIVITY
• Conditional access
• Compliance enforcement
• Multi-identity support
Access
management
• Mobile app management (w
& w/o a device enrollment)
• File and data encryption
Built-in
security
• Office mobile apps
• Familiar and trusted
Gold
standard
MANAGED MOBILE PRODUCTIVITY
Managed
apps
Personal
apps
Personal apps
Managed apps
Corporate
data
Personal
data
Multi-identity policy
Personal apps
Managed
apps
Copy Paste Save
Save to
personal storage
Paste to
personal
app
Email
attachment
MANAGED MOBILE PRODUCTIVITY
Integrated
use
• Works across all platforms
• Free content consumption
• Consistent user experience
• Integrate into common
apps and services
Persistent
protection
• Storage-independent
• Permit all companies to
authenticate
• Enforce authorization
policies
Tracking and
compliance
• Powerful logging and reporting
• Use/abuse tracking
• Kill documents remotely
• IT can reason over data
COMPREHENSIVE SOLUTION
Any device/
any platform
• Data-level encryption
• All file types
• LOB app protection
Protect Share Track and revoke
External user
*******
Internal user
*******
• Timeline view
• Map view
• Access and denials
MANAGED MOBILE PRODUCTIVITY
Centralized,
secure data
• No local access or storage
• Apps and data stay in
the cloud
No app
rewriting
• Deliver apps as is
• O365 integration
• Simplified updates
Simplified
scaling
• Scale to seasonal need
• Cloud flexibility
• File and data encryption
Managed mobile productivity
Protected mobile
users, devices,
apps, and data—
everywhere
Identity-driven
security
Comprehensive
solution
Managed mobile
productivity
EMPOWER ENTERPRISE MOBILITY
Comprehensive solution
Minimum dedicated
budget expected for
EMM by 2017
25%
COMPREHENSIVE SOLUTION
Easy to maintain
Integrates with what you have
Saves you money
Always
up to date
• Real-time updates
• Keep up with new
apps and devices
Works with
what you have
• Support multiple platforms
• Use existing investments
Simple to set
up and connect
• Easy, secure connections
• Simplified management
COMPREHENSIVE SOLUTION
Microsoft EMS Other vendors
Identity and access
management
Included $8
1
Mobile device and
application management
Included $10
2
Data protection Included No similar products
Advanced threat detection Included No similar products
Total cost
(per user/month)
Microsoft EMS
$8.75
3
Other vendors
$18
COMPREHENSIVE SOLUTION
Comprehensive solution
Stay secure and cut
your budget in half
Spend up to 50 percent less
than buying standalone
solutions from other vendors
COMPREHENSIVE SOLUTION
EMPOWER ENTERPRISE MOBILITY
Identity-based security for
greater control and visibility.
Identity-driven
security
Manage your mobile and
on-premises environment across
devices and operating systems.
Comprehensive
solution
Encourage secure work habits
by providing the best apps
with built-in security.
Managed mobile
productivity
Enterprise Mobility Suite
Microsoft Intune
Microsoft Azure Active
Directory Premium
Microsoft Azure Rights
Management Premium
Advanced Threat
Analytics
Easily manage identities
across on-premises and cloud
Single sign-on and self-service
for corporate resources
Leverage MDM and MAM to
protect corporate apps and
data on almost any device
Encryption, identity, and
authorization to secure
corporate files and email across
phones, tablets, and PCs
Identify suspicious activities
and advanced threats in near
real time with simple,
actionable reporting
Behavior-based
threat analytics
Information
protection
Identity and access
management
Mobile device and
app management
Integrated solutions across your enterprise
OFFICE 365
ENTERPRISE
MOBILITY SUITE
WINDOWS+ +
Enterprise
Mobility
Suite
Mobile device and app
management
Access and information
protection
Basic identity mgmt.
via Azure AD for O365:
• Single sign-on for O365
• Basic multi-factor authentication (MFA)
for O365
Basic mobile device management
via MDM for O365
• Device settings management
• Selective wipe
• Built into O365 management console
RMS protection
via RMS for O365
• Protection for content stored in Office
(on-premises or O365)
• Access to RMS SDK
• Bring your own key
Azure AD for O365+
• Single sign-on for all cloud apps
• Advanced MFA for all workloads
• Self-service group management and
password reset with write back to
on-premises directory
• Advanced security reports
• FIM (Server + CAL)
MDM for O365+
• PC management
• Mobile app management
(prevent cut/copy/paste/save as from
corporate apps to personal apps)
• Secure content viewers
• Certificate provisioning
• System Center integration
RMS for O365+
• Protection for on-premises Windows
Server file shares
• Email notifications when sharing
documents
• Email notifications when shared
documents are forwarded
Hybrid identity
management
Windows 10
Enterprise
Mobility
Suite
Mobile device and app
management
Information
protection
• Single sign-on for business cloud apps
• Device setup and registration for
Windows devices
• Windows Store for Business
• Traditional domain join manageability
• Manageability via MDM and MAM
• Encryption for data at rest and
generated on device
• Encryption for data included in
roaming settings
• Conditional access policies for
enhanced single sign-on security
• MDM auto-enrollment
• Self-service group and application
management
• Password reset with write back to
on-premises directory
• Cloud-based advanced security reports
• Microsoft Identity Manager
• Mobile device management
• Mobile app management
• Secure content viewer
• Certificate, Wi-Fi, VPN, email profile
provisioning
• Agent-based management of Windows
devices (domain-joined via ConfigMgr
and internet-based via Intune)
• Tracking and notifications for shared
documents
• Protection for content stored in Office
and Office 365
• Protection for on-premises Windows
Server file shares
• Behavioral analytics for advanced
threat detection
• Detection for known malicious attacks
and security issues
Identity and access
management
David J. Rosenthal, CEO
David.Rosenthal@Atidan.com
1-215-825-5045 ex. 5001

Más contenido relacionado

La actualidad más candente

Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 

La actualidad más candente (20)

Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 

Destacado

Final powerpoint alshifa
Final powerpoint alshifaFinal powerpoint alshifa
Final powerpoint alshifa
salscalvo
 

Destacado (13)

Magazine 2-3
Magazine 2-3Magazine 2-3
Magazine 2-3
 
[7] kkm pai sma
[7] kkm pai sma[7] kkm pai sma
[7] kkm pai sma
 
Jens resume
Jens resumeJens resume
Jens resume
 
Simple finance Training | SAP Training
Simple finance Training | SAP TrainingSimple finance Training | SAP Training
Simple finance Training | SAP Training
 
Рейтинг найсумнівніших рішень українських суддів стосовно корупційних злочинів
Рейтинг найсумнівніших рішень українських суддів стосовно корупційних злочинівРейтинг найсумнівніших рішень українських суддів стосовно корупційних злочинів
Рейтинг найсумнівніших рішень українських суддів стосовно корупційних злочинів
 
MicroEJ, the OS for IoT
MicroEJ, the OS for IoTMicroEJ, the OS for IoT
MicroEJ, the OS for IoT
 
Basic mental health nursing concepts chp 1
Basic mental health nursing concepts chp 1Basic mental health nursing concepts chp 1
Basic mental health nursing concepts chp 1
 
Static analysis for security
Static analysis for securityStatic analysis for security
Static analysis for security
 
Chapter 1 Integrating Internet Marketing into the Marketing Communications Mix
Chapter 1 Integrating Internet Marketing into the Marketing Communications MixChapter 1 Integrating Internet Marketing into the Marketing Communications Mix
Chapter 1 Integrating Internet Marketing into the Marketing Communications Mix
 
2016年12月冥炎強化月間
2016年12月冥炎強化月間2016年12月冥炎強化月間
2016年12月冥炎強化月間
 
Presentation1
Presentation1Presentation1
Presentation1
 
Simple test on soil
Simple test on soilSimple test on soil
Simple test on soil
 
Final powerpoint alshifa
Final powerpoint alshifaFinal powerpoint alshifa
Final powerpoint alshifa
 

Similar a Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan

05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 

Similar a Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan (20)

Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 

Más de David J Rosenthal

Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
David J Rosenthal
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
David J Rosenthal
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
David J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 

Más de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan

  • 1. Go mobile. Stay in control. David J. Rosenthal, CEO, Atidan August 20, 2016 Microsoft Briefing Center, NYC EMPOWER ENTERPRISE MOBILITY
  • 2. Mobile-first, cloud-first reality Exploited credentials More than 75 percent of network intrusions exploit weak or stolen credentials. 75% 15% Mobile security governance By the end of 2015 only 15 percent of large organizations will have adequate mobile security governance for process and policy. Unsecured apps More than 80 percent of employees admit to using non-approved software as a service (SaaS) applications in their jobs. 80%
  • 3. Is it possible to keep up? Employees Business partners Customers Is it possible to stay secure? Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 4. Is it possible to keep up? Employees Business partners Customers Microsoft’s vision Access everything from everything Manage and secure productivity Integrate with what you have Apps Devices Data Users
  • 5. Access to everything from everything Secure devices, apps, and data Preserve existing invesments Customers need Integrated, secure identity It protects Office better It just works Microsoft’s Solution EMPOWER ENTERPRISE MOBILITY Identity-driven security Comprehensive solution Managed mobile productivity
  • 8. One common identity Simplify management Improve security IDENTITY-DRIVEN SECURITY
  • 9. IDENTITY-DRIVEN SECURITY Self-service capabilities • Password reset • Group membership • MyApps portal Manage everything • Dynamic groups • Provisioning • B2B collaboration Single sign-on • Easy connection to existing assets • Unified experience across user devices
  • 10. IDENTITY-DRIVEN SECURITY Guard apps • Conditional access • Secure remote access Intelligent analysis • Machine learning • Security reports • User behavior analysis Protect users • Multi-factor authentication • Leaked credentials reporting
  • 11. IDENTITY-DRIVEN SECURITY ATA Devices and servers Behavioral analytics Forensics for known attacks and issues Advanced Threat Analytics Profile normal entity behavior (normal versus abnormal) Search for known security attacks and issues Detect suspicious user activities, known attacks, and issues SIEM Active Directory
  • 12. Integrated identity Conditional access to all apps, resources, and self-service tools
  • 15. Manage and secure devices Office mobile apps Data-level protection MANAGED MOBILE PRODUCTIVITY
  • 16. MANAGED MOBILE PRODUCTIVITY • Conditional access • Compliance enforcement • Multi-identity support Access management • Mobile app management (w & w/o a device enrollment) • File and data encryption Built-in security • Office mobile apps • Familiar and trusted Gold standard
  • 17. MANAGED MOBILE PRODUCTIVITY Managed apps Personal apps Personal apps Managed apps Corporate data Personal data Multi-identity policy Personal apps Managed apps Copy Paste Save Save to personal storage Paste to personal app Email attachment
  • 18. MANAGED MOBILE PRODUCTIVITY Integrated use • Works across all platforms • Free content consumption • Consistent user experience • Integrate into common apps and services Persistent protection • Storage-independent • Permit all companies to authenticate • Enforce authorization policies Tracking and compliance • Powerful logging and reporting • Use/abuse tracking • Kill documents remotely • IT can reason over data
  • 19. COMPREHENSIVE SOLUTION Any device/ any platform • Data-level encryption • All file types • LOB app protection Protect Share Track and revoke External user ******* Internal user ******* • Timeline view • Map view • Access and denials
  • 20. MANAGED MOBILE PRODUCTIVITY Centralized, secure data • No local access or storage • Apps and data stay in the cloud No app rewriting • Deliver apps as is • O365 integration • Simplified updates Simplified scaling • Scale to seasonal need • Cloud flexibility • File and data encryption
  • 21. Managed mobile productivity Protected mobile users, devices, apps, and data— everywhere
  • 23. Comprehensive solution Minimum dedicated budget expected for EMM by 2017 25%
  • 24. COMPREHENSIVE SOLUTION Easy to maintain Integrates with what you have Saves you money
  • 25. Always up to date • Real-time updates • Keep up with new apps and devices Works with what you have • Support multiple platforms • Use existing investments Simple to set up and connect • Easy, secure connections • Simplified management COMPREHENSIVE SOLUTION
  • 26. Microsoft EMS Other vendors Identity and access management Included $8 1 Mobile device and application management Included $10 2 Data protection Included No similar products Advanced threat detection Included No similar products Total cost (per user/month) Microsoft EMS $8.75 3 Other vendors $18 COMPREHENSIVE SOLUTION
  • 27. Comprehensive solution Stay secure and cut your budget in half Spend up to 50 percent less than buying standalone solutions from other vendors COMPREHENSIVE SOLUTION
  • 28. EMPOWER ENTERPRISE MOBILITY Identity-based security for greater control and visibility. Identity-driven security Manage your mobile and on-premises environment across devices and operating systems. Comprehensive solution Encourage secure work habits by providing the best apps with built-in security. Managed mobile productivity
  • 29. Enterprise Mobility Suite Microsoft Intune Microsoft Azure Active Directory Premium Microsoft Azure Rights Management Premium Advanced Threat Analytics Easily manage identities across on-premises and cloud Single sign-on and self-service for corporate resources Leverage MDM and MAM to protect corporate apps and data on almost any device Encryption, identity, and authorization to secure corporate files and email across phones, tablets, and PCs Identify suspicious activities and advanced threats in near real time with simple, actionable reporting Behavior-based threat analytics Information protection Identity and access management Mobile device and app management
  • 30. Integrated solutions across your enterprise OFFICE 365 ENTERPRISE MOBILITY SUITE WINDOWS+ +
  • 31. Enterprise Mobility Suite Mobile device and app management Access and information protection Basic identity mgmt. via Azure AD for O365: • Single sign-on for O365 • Basic multi-factor authentication (MFA) for O365 Basic mobile device management via MDM for O365 • Device settings management • Selective wipe • Built into O365 management console RMS protection via RMS for O365 • Protection for content stored in Office (on-premises or O365) • Access to RMS SDK • Bring your own key Azure AD for O365+ • Single sign-on for all cloud apps • Advanced MFA for all workloads • Self-service group management and password reset with write back to on-premises directory • Advanced security reports • FIM (Server + CAL) MDM for O365+ • PC management • Mobile app management (prevent cut/copy/paste/save as from corporate apps to personal apps) • Secure content viewers • Certificate provisioning • System Center integration RMS for O365+ • Protection for on-premises Windows Server file shares • Email notifications when sharing documents • Email notifications when shared documents are forwarded Hybrid identity management
  • 32. Windows 10 Enterprise Mobility Suite Mobile device and app management Information protection • Single sign-on for business cloud apps • Device setup and registration for Windows devices • Windows Store for Business • Traditional domain join manageability • Manageability via MDM and MAM • Encryption for data at rest and generated on device • Encryption for data included in roaming settings • Conditional access policies for enhanced single sign-on security • MDM auto-enrollment • Self-service group and application management • Password reset with write back to on-premises directory • Cloud-based advanced security reports • Microsoft Identity Manager • Mobile device management • Mobile app management • Secure content viewer • Certificate, Wi-Fi, VPN, email profile provisioning • Agent-based management of Windows devices (domain-joined via ConfigMgr and internet-based via Intune) • Tracking and notifications for shared documents • Protection for content stored in Office and Office 365 • Protection for on-premises Windows Server file shares • Behavioral analytics for advanced threat detection • Detection for known malicious attacks and security issues Identity and access management
  • 33. David J. Rosenthal, CEO David.Rosenthal@Atidan.com 1-215-825-5045 ex. 5001