Post on 06-Apr-2018
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 1/19
Presenter
Title
Date
Business Ready Security SolutionsInformation Protection
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 2/19
Agenda
Business Needs and IT Challenges
Business Ready Security
Information Protection
Customer Testimonial
The Road Ahead
Getting Started
Summary
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 3/19
³Information Privacy is the most important security concern in the enterprise, outranking
malware in 2007 for the first time´
³Information Privacy is the most important security concern in the enterprise, outranking
malware in 2007 for the first time´
Customer Problem and Pains
Personal Information Loss-Sci-tech today 06/21/07
Ohio state government loses 269,000
confidential information of taxpayers
and employees. See more«
IP2, National Security-Sci-techtoday 06/15/07
A consultant from Los Alamos sent an
e-mail containing highly classified,
non-encrypted nuclear weapons to
several board members who
forwarded it to other members
see more«
Personal Information Loss-www.privacyrights.org,August 2008
A flash drive with Social Security
numbers and other personal
information was removed from the
unattended laptop of a state employee.
Significant financial, business, and reputation loss due to regulatory
compliance violations and intellectual property leaks
Significant financial, business, and reputation loss due to regulatory
compliance violations and intellectual property leaks
Other high-profile incidents:
1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M
2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M
3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined
Source: Ohio Data Loss Scope Broadens. Sci-Tech
Today.com, June 2007. http://www.sci-tech-
today.com/story.xhtml?story_id=53225
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 4/19
Business Needs and IT Challenges
Agility and Flexibility Control
BUSINESS Needs IT Needs
Discover and classify
information based on businessimportance
Secure sensitive information
while in use, in motion,
and at rest
Enable simplified access toinformation from anywhere
Demonstrate compliance with
information control policies
Multiple locations and devices
Sensitive information stored
in multiple locations
Difficulty in discovering and
securing information
Easy access to sensitive
information on multiple devices
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 5/19
Protect everywhere,Protect everywhere,
access anywhereaccess anywhere
Simplify the securitySimplify the securityexperience,experience,
manage compliancemanage compliance
Block
f rom:
Enable
Cost Value
Siloed Seamless
to:
Business Ready SecurityH elp securely enable business by managing risk and empowering people
Integrate and extendIntegrate and extend
security across thesecurity across theenterpriseenterprise
Highly SecureHighly Secure & Interoperable Platform& Interoperable Platform
IdentityIdentity
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 6/19
Business Ready Security Solutions
Information Protection
Information Protection
Identity and Access Management
Identity and Access Management
Secure Messaging
Secure Messaging Secure Endpoint
Secure EndpointSecure Collaboration
Secure Collaboration
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 7/19
Protect critical data
wherever It goes
Protect data wherever itresides
Secure endpoints to
reduce risk
PROTECTPROTECT everywhereeverywhere
ACCESSACCESS anywhereanywhere
SIMPLIFYSIMPLIFY security,security,
MANAGEMANAGE compliancecompliance
Extend confidential
communication topartners
Built into the Windowsplatform and
applications
Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
INTEGRATEINTEGRATE andand
EXTENDEXTEND securitysecurity
Simplify deployment
and ongoing management
Enable compliance withinformation policy
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 8/19
Protect Critical Information Wherever It Goes
SSN# 0000SSN# 0000SSN# 0000
Automatically protect sensitive
e-mail with Active Directory
Rights Management Services
Filter message body and subject
based on content criteria
Policy-based restricted usage of
e-mail attachments
³³Source: F ood Distributor Deploys Enterprise Rig hts Management to H elp Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 9/19
³³
Protect Information Wherever It Resides
Automatically discover and
classify sensitive information
Protect information based on
content, context, and identity
Ensure only authorized usage
through persistent policies
Restricts users from sharing
inappropriate content
Source: Microsof t, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RS A-Partner-to-Develop-NextGen-Data-Loss-Prevention/
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 10/19
³³
Secure Endpoints to Reduce Risk
Access policy for removable mediaAccess policy for removable media
Reduce information lossrisk through integrated
disk encryption
Reduce information lossrisk through integrated
disk encryption
Classify and protectinformation withbuilt-in AD RMS
Classify and protectinformation withbuilt-in AD RMS
BitLocker Device Control
Source: C ustoms Service Improves Reporting wit hSimpli f ied, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 11/19
Enable Secure, Seamless Access to
Information
³³
Ability to move seamlessly between
applications
Eliminate the need to manage external
accounts
Simplified and flexible claims-based
federation
Simplified partner on-boarding through
administrative tools and wizards
Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 12/19
³³
Automatically apply information policies
from within Microsoft Office
SharePoint® Server and Microsoft
Exchange Server Demonstrate compliance with logging
and auditing tools
Simplify management by centrally
applying information protection
templates
Simplify Management
Source: F ood Distributor Deploys Enterprise Rig hts Management to H elp Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 13/19
Current SituationDiscovery, classi f ication, and protection of sensitive inf ormation is
expensive
Limited to no access
Limited to no access
Sensitive information is sent via e-
mail because partners do not have
access to collaboration site
SSN# 0000SSN# 0000SSN# 0000
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 14/19
Information Protection SolutionEnterprise-wide classi f ication, discovery, and protection
SSN# 0000SSN# 0000SSN# 0000
Classification and protection
built into platform
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 15/19
³³
A global leader in silicon-based technology and innovation through a joint
venture between Corning and Dow Chemical
A global leader in silicon-based technology and innovation through a joint
venture between Corning and Dow Chemical
With 4,000 patents globally,protecting its intellectualproperty (IP) is a businessimperative
More specifically, Dow Corning wanted to institutionalize how itprotected IP in a way that could
be scaled across the enterprise
BUSINESS SITUATIONBUSINESS SITUATION
The company deployed ActiveDirectory Rights ManagementServices in Windows Server 2008, which enables users to
limit how others can open,modify, print, forward, or takeother actions with content
Ease of use and management
Minimal additional infrastructureand complexity
Extensibility to businesspartners
Full corporate control andauditability
Low total cost of ownership
BENEFITS PROVIDEDBENEFITS PROVIDEDSOLUTIONSOLUTION
Customer TestimonialDow C orning uses enterprise rig hts management to help protect intellectual property
Source: Dow C orning Uses Enterprise Rig hts Management to H elp Protect Intellectual Property . Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 16/19
Data Protection UsingData Protection UsingRights ManagementRights Management
ServicesServices
Secure RemoteSecure RemoteApplication PublishingApplication Publishing
Operations GuidesOperations Guides
Administrator GuidesAdministrator Guides
Troubleshooting GuidesTroubleshooting Guides
HandsHands--on Labs and VMson Labs and VMs
Evaluation GuidesEvaluation Guides
Proof of ConceptsProof of Concepts
Getting Started
Architecture PlanningArchitecture Planningand Design Guidesand Design Guides
Infrastructure PlanningInfrastructure PlanningGuideGuide
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 17/19
M a n a g e m e n t
P r o t e c t i o n &
A c c e s s
S o l u t i o n s
P l a t f o r m
Subject to Change
The Road Ahead
Management Consoles
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 18/19
Protect critical data
wherever It goes
Protect data wherever itresides
Secure endpoints to
reduce risk
PROTECTPROTECT everywhereeverywhere
ACCESSACCESS anywhereanywhere
SIMPLIFYSIMPLIFY security,security,
MANAGEMANAGE compliancecompliance
Extend confidential
communication topartners
Built into the Windowsplatform and
applications
Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
INTEGRATEINTEGRATE andand
EXTENDEXTEND securitysecurity
Simplify deployment
and ongoing management
Enable compliance withinformation policy
Learn more at: www.microsoft.com/forefrontLearn more at: www.microsoft.com/forefront
8/3/2019 Information Protection Deck
http://slidepdf.com/reader/full/information-protection-deck 19/19
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be
registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date
of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a
commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT M AKES NO W ARR ANTIES, EXPRESSED, IMPLIED OR ST ATUTORY, AS TO THE INFORM ATION IN THISPRESENT ATION.