Security For Your Digital Transformation: Rennex Callaghan Microsoft Jamaica Cloud Specialist

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Security for your digital

transformation
Rennex Callaghan
Microsoft Jamaica Cloud Specialist
OUR COMMITMENT
TO YOU

SECURITY

PRIVACY & CONTROL

COMPLIANCE

TRANSPARENCY

RELIABILITY
Microsoft Secure
Ensuring security to enable your digital
transformation through a comprehensive
platform, unique intelligence, and broad
partnerships
Smart cities
Sensors

Vehicles
Partners
Energy systems
Cloud

Equipment
On-premises
YOUR YOUR
IT ENVIRONMENT OPPORTUNITY
Mobile devices

Manufacturers Marketplaces

Citizens

Supply Chains
Customers
YOUR
IT ENVIRONMENT
OUR UNIQUE APPROACH

Platform Intelligence Partners


Physical
security

Operational
security
SECURE
Platform FOUNDATION

Global
datacenter
Platform
Identity & access
management

Threat
protection

BUILT IN
SECURITY Platform Information
protection

Security
management
IDENTITY & ACCESS MANAGEMENT
Prove users are authorized and secure before granting access to apps and data

Protect at the Simplify access to Safeguard your


front door devices and apps credentials
THREAT PROTECTION
Protect against advanced attacks; detect and respond quickly if breached

PROTECT DETECT RESPOND


organizations from malicious activities to threats quickly
advanced cyber attacks
INFORMATION PROTECTION
Protect sensitive data throughout the lifecycle – inside and outside the organization

Detect Classify Protect Monitor

DEVICES CLOUD ON PREMISES


IDENTITY DEVICES APPS / DATA INFRASTRUCTURE

INTELLIGENT SECURITY
MANAGEMENT
IDENTITY DEVICES APPS / DATA INFRASTRUCTURE

Powered by the
Intelligent Security Graph

VISIBILITY CONTROL GUIDANCE


Understand the security Define consistent security Enhance security through
state and risks across policies and enable built-in intelligence and
resources controls recommendations
Identity & access Threat Information Security
management protection protection management
Protect users’ identities &
Protect against advanced Ensure documents and emails
control access to valuable Gain visibility and control
threats and recover quickly are seen only by authorized
resources based on user risk over security tools
when attacked people
level

Azure Active Directory Advanced Threat Analytics Azure Information Protection Azure Security Center
Conditional Access Windows Defender Office 365 Data Loss Prevention Office 365 Security Center
Windows Hello Advanced Threat Protection Windows Information Protection Windows Defender Security Center
Windows Credential Guard Office 365 Advanced Threat Microsoft Cloud App Security
Protection
Office 365 Advanced Security Mgmt.
Office 365 Threat Intelligence
Microsoft Intune
Identity & access
management
Protect users’ identities &
control access to valuable
resources based on user risk
level
Multi-factor authentication

Data encryption

User accounts

Device log-ins
Malware
Unauthorized data access

Attacks

INTELLIGENCE
User log-ins

Phishing Denial of service

Spam

System updates
Enterprise security
Microsoft Secure
Ensuring security to enable your digital
transformation through a comprehensive
platform, unique intelligence, and broad
partnerships

You might also like