Information Protection Deck

19
Presenter Title Date Business Ready Security Solutions Information Protection

Transcript of Information Protection Deck

Page 1: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 1/19

Presenter 

Title

Date

Business Ready Security SolutionsInformation Protection

Page 2: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 2/19

 Agenda

Business Needs and IT Challenges

Business Ready Security

Information Protection

Customer Testimonial

The Road Ahead

Getting Started

Summary

Page 3: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 3/19

³Information Privacy is the most important security concern in the enterprise, outranking 

malware in 2007 for the first time´

³Information Privacy is the most important security concern in the enterprise, outranking 

malware in 2007 for the first time´

Customer Problem and Pains

Personal Information Loss-Sci-tech today 06/21/07

Ohio state government loses 269,000

confidential information of taxpayers

and employees. See more«

IP2, National Security-Sci-techtoday 06/15/07

A consultant from Los Alamos sent an

e-mail containing highly classified,

non-encrypted nuclear weapons to

several board members who

forwarded it to other members

see more«

Personal Information Loss-www.privacyrights.org,August 2008

A flash drive with Social Security

numbers and other personal

information was removed from the

unattended laptop of a state employee.

Significant financial, business, and reputation loss due to regulatory

compliance violations and intellectual property leaks

Significant financial, business, and reputation loss due to regulatory

compliance violations and intellectual property leaks

Other high-profile incidents:

1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M

2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M

3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined

Source: Ohio Data Loss Scope Broadens. Sci-Tech

Today.com, June 2007. http://www.sci-tech-

today.com/story.xhtml?story_id=53225

Page 4: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 4/19

Business Needs and IT Challenges

Agility and Flexibility Control

BUSINESS Needs IT Needs

 Discover and classify

information based on businessimportance

 Secure sensitive information

while in use, in motion,

and at rest

 Enable simplified access toinformation from anywhere

 Demonstrate compliance with

information control policies

 Multiple locations and devices

 Sensitive information stored

in multiple locations

 Difficulty in discovering and

securing information

 Easy access to sensitive

information on multiple devices

Page 5: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 5/19

Protect everywhere,Protect everywhere,

access anywhereaccess anywhere

Simplify the securitySimplify the securityexperience,experience,

manage compliancemanage compliance

Block

f rom:

Enable

Cost Value

Siloed Seamless

to:

Business Ready SecurityH elp securely enable business by managing risk and empowering people

Integrate and extendIntegrate and extend

security across thesecurity across theenterpriseenterprise

Highly SecureHighly Secure & Interoperable Platform& Interoperable Platform

IdentityIdentity

Page 6: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 6/19

Business Ready Security Solutions

Information Protection

Information Protection

Identity and Access Management

Identity and Access Management

Secure Messaging

Secure Messaging Secure Endpoint

Secure EndpointSecure Collaboration

Secure Collaboration

Page 7: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 7/19

Protect critical data

wherever It goes

Protect data wherever itresides

Secure endpoints to

reduce risk

PROTECTPROTECT everywhereeverywhere

ACCESSACCESS anywhereanywhere

SIMPLIFYSIMPLIFY security,security,

MANAGEMANAGE compliancecompliance

Extend confidential

communication topartners

Built into the Windowsplatform and

applications

Information Protection

Discover, protect, and manage confidential data throughout your business with a

comprehensive solution integrated with the computing platform and applications

Discover, protect, and manage confidential data throughout your business with a

comprehensive solution integrated with the computing platform and applications

INTEGRATEINTEGRATE andand

EXTENDEXTEND securitysecurity

Simplify deployment

and ongoing management

Enable compliance withinformation policy

Page 8: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 8/19

Protect Critical Information Wherever It Goes

SSN# 0000SSN# 0000SSN# 0000

Automatically protect sensitive

e-mail with Active Directory

Rights Management Services

Filter message body and subject

based on content criteria

Policy-based restricted usage of 

e-mail attachments

³³Source: F ood Distributor Deploys Enterprise Rig hts Management to H elp Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482

Page 9: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 9/19

³³

Protect Information Wherever It Resides

Automatically discover and

classify sensitive information

Protect information based on

content, context, and identity

Ensure only authorized usage

through persistent policies

Restricts users from sharing 

inappropriate content

Source: Microsof t, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RS A-Partner-to-Develop-NextGen-Data-Loss-Prevention/

Page 10: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 10/19

³³

Secure Endpoints to Reduce Risk

Access policy for removable mediaAccess policy for removable media

Reduce information lossrisk through integrated

disk encryption

Reduce information lossrisk through integrated

disk encryption

Classify and protectinformation withbuilt-in AD RMS

Classify and protectinformation withbuilt-in AD RMS

BitLocker Device Control

Source: C ustoms Service Improves Reporting wit hSimpli f ied, Integrated Antivirus Solution. Microsoft case study,  April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402

Page 11: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 11/19

Enable Secure, Seamless Access to

Information

³³

Ability to move seamlessly between

applications

Eliminate the need to manage external

accounts

Simplified and flexible claims-based

federation

Simplified partner on-boarding through

administrative tools and wizards

Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm

Page 12: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 12/19

³³

Automatically apply information policies

from within Microsoft Office

SharePoint® Server and Microsoft

Exchange Server  Demonstrate compliance with logging 

and auditing tools

Simplify management by centrally

applying information protection

templates

Simplify Management

Source: F ood Distributor Deploys Enterprise Rig hts Management to H elp Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482

Page 13: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 13/19

Current SituationDiscovery, classi f ication, and protection of sensitive inf ormation is

expensive

Limited to no access

 Limited to no access

 Sensitive information is sent via e-

mail because partners do not have

access to collaboration site

SSN# 0000SSN# 0000SSN# 0000

Page 14: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 14/19

Information Protection SolutionEnterprise-wide classi f ication, discovery, and protection

SSN# 0000SSN# 0000SSN# 0000

 Classification and protection

built into platform

Page 15: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 15/19

³³

 A global leader in silicon-based technology and innovation through a joint

venture between Corning and Dow Chemical

 A global leader in silicon-based technology and innovation through a joint

venture between Corning and Dow Chemical

  With 4,000 patents globally,protecting its intellectualproperty (IP) is a businessimperative

More specifically, Dow Corning wanted to institutionalize how itprotected IP in a way that could

be scaled across the enterprise

BUSINESS SITUATIONBUSINESS SITUATION

  The company deployed  ActiveDirectory Rights ManagementServices in Windows Server 2008, which enables users to

limit how others can open,modify, print, forward, or takeother actions with content

  Ease of use and management

Minimal additional infrastructureand complexity

Extensibility to businesspartners

Full corporate control andauditability

Low total cost of ownership

BENEFITS PROVIDEDBENEFITS PROVIDEDSOLUTIONSOLUTION

Customer TestimonialDow C orning uses enterprise rig hts management to help protect intellectual property 

Source: Dow C orning Uses Enterprise Rig hts Management to H elp Protect Intellectual Property . Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501

Page 16: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 16/19

 Data Protection UsingData Protection UsingRights ManagementRights Management

ServicesServices

 Secure RemoteSecure RemoteApplication PublishingApplication Publishing

 Operations GuidesOperations Guides

 Administrator GuidesAdministrator Guides

Troubleshooting GuidesTroubleshooting Guides

HandsHands--on Labs and VMson Labs and VMs

 Evaluation GuidesEvaluation Guides

Proof of ConceptsProof of Concepts

Getting Started

 Architecture PlanningArchitecture Planningand Design Guidesand Design Guides

 Infrastructure PlanningInfrastructure PlanningGuideGuide

Page 17: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 17/19

   M  a  n  a    g  e  m  e  n   t

   P  r  o   t  e  c   t   i  o  n   &

      A  c  c  e  s  s

   S  o   l  u   t   i  o  n  s

   P   l  a   t   f  o  r  m

Subject to Change

The Road Ahead

Management Consoles

Page 18: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 18/19

Protect critical data

wherever It goes

Protect data wherever itresides

Secure endpoints to

reduce risk

PROTECTPROTECT everywhereeverywhere

ACCESSACCESS anywhereanywhere

SIMPLIFYSIMPLIFY security,security,

MANAGEMANAGE compliancecompliance

Extend confidential

communication topartners

Built into the Windowsplatform and

applications

Information Protection

Discover, protect, and manage confidential data throughout your business with a

comprehensive solution integrated with the computing platform and applications

Discover, protect, and manage confidential data throughout your business with a

comprehensive solution integrated with the computing platform and applications

INTEGRATEINTEGRATE andand

EXTENDEXTEND securitysecurity

Simplify deployment

and ongoing management

Enable compliance withinformation policy

Learn more at: www.microsoft.com/forefrontLearn more at: www.microsoft.com/forefront

Page 19: Information Protection Deck

8/3/2019 Information Protection Deck

http://slidepdf.com/reader/full/information-protection-deck 19/19

© 2009 Microsoft Corporation.  All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be

registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date

of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a

commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.

MICROSOFT M AKES NO W ARR ANTIES, EXPRESSED, IMPLIED OR ST ATUTORY, AS TO THE INFORM ATION IN THISPRESENT ATION.