26
Conférence sur la Transformation Numérique par le Cloud The Cloud Digital Transformation Summit Montréal, 16 juin 2016 – Montreal, June 16 2016 Présenté par

Stratégies de croissance via la mobilité (ems)

Embed Size (px)

Citation preview

Page 1: Stratégies de croissance via la mobilité (ems)

Conférence sur la Transformation Numérique par le CloudThe Cloud Digital Transformation SummitMontréal, 16 juin 2016 – Montreal, June 16 2016

Présenté par

Page 2: Stratégies de croissance via la mobilité (ems)

Session 4

STRATÉGIES DE CROISSANCE VIA LA MOBILITÉ (EMS)GROWTH STRATEGY USING ENTERPRISE MOBILITY SUITE (EMS)Jérôme Bousquet Ayman YassaSSP Mobility TSP MobilityMicrosoft Microsoft

Page 3: Stratégies de croissance via la mobilité (ems)

The state of security today

Enterprise security has failed to keep

up

$400B in annual

damages

Cybercriminals have evolved

$ $

$

$$$

$

$

$$ $$

$$

Page 4: Stratégies de croissance via la mobilité (ems)

of employees use personal devices for work purposes.*

of employees that typically work on employer premises, also frequently work away from their desks.***

of all software will be available on a SaaS delivery by 2020.**

Mobility is the new normal66% 25% 33%

*CEB The Future of Corporate ITL: 203-2017. 2013.**Forrester Application Adoption Trends: The Rise Of SaaS***CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.

Page 5: Stratégies de croissance via la mobilité (ems)

Is it possible to keep up?

Employees

Business partners

Customers

Is it possible to stay secure?

Apps

Devices

Data

Users

Data leaks

Lost device

Compromised identity

Stolen credentials

Page 6: Stratégies de croissance via la mobilité (ems)

Is it possible to keep up?

Employees Business partners Customers

Microsoft’s vision

Access everything from everything

Manage and secure productivity

Integrate with what you haveApps

Devices

Data

Users

Page 7: Stratégies de croissance via la mobilité (ems)

Protecting data in a mobile-first, cloud-first world

Enterprise Mobility Suite

Access control and data protection integrated natively in the apps, devices, and the cloud

DataUsersDevice

sApps

Managed cloud

SharePointOnline

ExchangeOnline

On-premises

Page 8: Stratégies de croissance via la mobilité (ems)

Enterprise Mobility Suite

Microsoft Azure Active Directory Premium

Microsoft Azure Rights Management

PremiumAdvanced Threat

Analytics

Easily manage identities across on-premises and cloud

Single sign-on and self-service for corporate resources

Leverage PC management, MDM, and MAM to protect corporate apps and data on almost any device

Encryption, identity, and authorization to secure corporate files and email across phones, tablets, and PCs

Identify suspicious activities and advanced threats in near real time with simple, actionable reporting

Behavior-based threat

analytics

Information protection

Identity and access

management

Device and app

managementMicrosoft IntuneSystem Center Configuration

Manager

Page 9: Stratégies de croissance via la mobilité (ems)

One vendor. Unified solutions.

Making it easier to deliver a great brand experience

Keeping the selling workforce productive

Bringing a new level of efficiency to management

Page 10: Stratégies de croissance via la mobilité (ems)

Our Grow

th Lead with Security

243 average days an attacker resides within a victims network

76% network intrusions due to compromised user credentials

90%+ Business use

>1 Billion Auths per day

520M User Accounts

86% Fortune 500

ADFoundational

Current Investment

MUCHintegrationMaintain Active

Directory

Expand to Azure AD

Transforming Identity

Page 11: Stratégies de croissance via la mobilité (ems)

Single sign-on

Self-service experiences

Common identity

Conditional access

SaaS applications

One user. One identity. Everywhere.

Desktop Virtualization

Access & information protection

Mobile device & application management

Hybrididentity

Page 12: Stratégies de croissance via la mobilité (ems)

On-premises applications

APPLICATIONPer app policy Type of client (Web Rich, mobile)

OTHERLocation (IP Range)Risk Profile

DEVICESAre domain joinedAre compliantPlatform type (Windows, iOS, Android)

USER ATTRIBUTESUser identity Group membershipsAuthentication strength

Identity-driven security: conditional access

• Allow• Enforce MFA• Block

Page 13: Stratégies de croissance via la mobilité (ems)

Introducing Microsoft Advanced Threat Analytics

Behavioral Analytics

Detection for known attacks and issues

Advanced Threat Detection

An on-premises platform to identify advanced security attacks before they cause damage

Page 14: Stratégies de croissance via la mobilité (ems)

Advanced Threat Analytics Benefits

Detect threats fast with Behavioral Analytics

Adapt as fast as your enemies

Focus on what is important fast using the simple attack timeline

Reduce the fatigue of false positives

Prioritize and plan for next steps

No need for creating rules, fine-tuning or monitoring a flood of security reports, the intelligence needed is ready to analyze and self-learning.

ATA continuously learns from the organizational entity behavior (users, devices, and resources) and adjusts itself to reflect the changes in your rapidly-evolving enterprise.

The attack timeline is a clear, efficient, and convenient feed that surfaces the right things on a timeline, giving you the power of perspective on the “who-what-when-and how” of your enterprise.

Alerts only happen once suspicious activities are contextually aggregated, not only comparing the entity’s behavior to its own behavior, but also to the profiles of other entities in its interaction path.

For each suspicious activity or known attack identified, ATA provides recommendations for the investigation and remediation.

Page 15: Stratégies de croissance via la mobilité (ems)

How Microsoft Advanced Threat Analytics works

Abnormal Behavior Anomalous

logins Remote

execution Suspicious

activity

Security issues and risks Broken trust Weak protocols Known protocol

vulnerabilities

Malicious attacks Pass-the-Ticket (PtT) Pass-the-Hash (PtH) Overpass-the-Hash Forged PAC (MS14-

068)

Golden Ticket Skeleton key

malware Reconnaissance BruteForce

Unknown threats Password sharing Lateral

movement

Page 16: Stratégies de croissance via la mobilité (ems)

Device choice. Simplified management.

Desktop Virtualization

Access & information protection

Mobile device & application management

Hybrididentity

Consistent user experienceSimplified device enrollment and registrationSingle console to manage devices

Page 17: Stratégies de croissance via la mobilité (ems)

Mobile application management

PC managementMobile device management

ITUser

Microsoft Intune

Intune helps organizations provide their employees with access to corporate applications, data, and resources from virtually

anywhere on almost any device, while helping to keep corporate information secure.

Enterprise mobility management with Intune

Page 18: Stratégies de croissance via la mobilité (ems)

Mobile app managementMANAGED MOBILE PRODUCTIVITY

Managed apps

Personal apps

Personal apps

Managed apps Corporate

data

Personal data

Multi-identity policy

Personal apps

Managed apps

Copy Paste Save

Save to personal storage

Paste to personal app

Email attachment

Page 19: Stratégies de croissance via la mobilité (ems)

Managed email and productivity

Identity

Application

Device (optional)

Data

Page 20: Stratégies de croissance via la mobilité (ems)

Right info. Right person. Right device.

Desktop Virtualization

Access & information protection

Mobile device & application management

Hybrididentity

Dynamic Access Control

Rights management

Secure access to work files

FPO

Page 21: Stratégies de croissance via la mobilité (ems)

Data-level protection for secure sharing

COMPREHENSIVE SOLUTION

Any device/ any platform

• Data-level encryption

• All file types• LOB app protection

Protect Share Track and revoke

External user

*******

Internal user

*******

• Timeline view• Map view• Access and denials

Page 22: Stratégies de croissance via la mobilité (ems)

Microsoft Cloud app securityEnterprise-grade security to your cloud apps

Security-as-a-service extending visibility and control to cloud appsComprehensive and proven protectionBased on Adallom acquisitionCommitted to support third-party appsDiscovery – Data Control – Threat Protection

Page 23: Stratégies de croissance via la mobilité (ems)

Always up to date• Real-time updates• Keep up with new

apps and devices

Works with what you

have• Support multiple platforms

• Use existing investments

Simple to set

up and connect

• Easy, secure connections

• Simplified management

Flexible architecture that just works

COMPREHENSIVE SOLUTION

Page 24: Stratégies de croissance via la mobilité (ems)

EMS BenefitsImproved end user productivity getting access and logging into SAAS applications

Security cost risk avoidance

Reduced legacy license and infrastructure costs for enterprise mobility management

Reduction in call volume to help desk resulting cost savings

Improved mobile device registry and access, reducing work for the business and IT

Reduced administrative efforts for IT staff managing mobile devices

Page 25: Stratégies de croissance via la mobilité (ems)

© 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Page 26: Stratégies de croissance via la mobilité (ems)

MERCI / THANK YOUN’oubliez pas de compléter votre évaluation et de visiter le stand

Vidéo

Don’t forget to complete your evaluation and visit the Video booth

Conférence sur la Transformation Numérique par le CloudThe Cloud Digital Transformation Summit

Présenté par