Professional Documents
Culture Documents
Enterprise-Mobility-Security
Enterprise-Mobility-Security
Enterprise-Mobility-Security
#GlobalAzure
Johannesburg Cape Town
Corporate Hill, 3012 William Nicol Dr Mowbray Golf Park, Engen Place, Raapenberg Rd
Bryanston, Johannesburg, GP, 2031 Pinelands, Cape Town, Western Cape , 7785
Thank you to our sponsors:
Thank you to our digital sponsors:
Sponsor Offering
Cloudmonix offers a $300 off any paid plan for Azure
Cloudmonix monitoring!
https://cloudmonix.com
http://bit.ly/gab2018-cloudmonix Code: GAB2018
Raffle winners will receive a voucher with a code from the local organizers.
Enterprise Mobility
+ Security
Matthew Levy
https://mattchatt.co.za/blog
#GlobalAzure
Digital Transformation is driving change
• 41 % of employees say mobile apps change how they work
• 85% of Enterprise Organisations keep sensitive information in the
cloud
Identity
Identity Devices
Devices Apps
Apps Data
Data
On-premises
On-premises
Cloud is changing the security perimeter
On-premises
Microsoft Enterprise Mobility + Security
Location Trusted/Untrusted IP
Define policies that provide Policies adapt to real time Risks are calculated based
contextual controls at the user, conditions based on on advanced Microsoft
location, device, and app levels. monitoring of perceived risks. machine learning.
CA Demo
Control what happens after the data is accessed
Hybrid Relationship
Data cache
All
Outlook REST Office 365 EAS Exchange
Device API mailboxes Server
Stateless protocol
GA: 2
translator (Azure) Exchange April 2018
Online
Pass Through
Brand New
Microsoft Enterprise Mobility + Security
MICROSOFT INTUNE MICROSOFT CLOUD
APP SECURITY
Make sure your devices are
compliant and secure, while Gain deep visibility, strong
protecting data at the controls and enhanced
application level threat protection for data
stored in cloud apps
Classify
CONDITIONAL
ACCESS AZURE INFORMATION
PROTECTION
Location Classify, label, protect and
audit data for persistent
Access
granted security throughout the
Apps
to data complete data lifecycle
! Risk
Audit !
Label
Device
!
Protect
!
AZURE ACTIVE
MICROSOFT ADVANCED
DIRECTORY
THREAT ANALYTICS
Ensure only authorized
users are granted access Detect breaches before they
to personal data using cause damage by identifying
risk-based conditional abnormal behavior, known
access malicious attacks and security
issues
Contact me:
Matthew@nbconsult.co.za
Blog: https://mattchatt.co.za/blog
Twitter: @skrods
Please evaluate the
https://tinyurl.com/y74b798l