Microsoft India - Forefront Information Protection Deck Presentation
-
Upload
microsoft-private-cloud -
Category
Technology
-
view
622 -
download
1
description
Transcript of Microsoft India - Forefront Information Protection Deck Presentation
PresenterTitleDate
Business Ready Security Solutions
Information Protection
Agenda
• Business Needs and IT Challenges
• Business Ready Security
• Information Protection
• Customer Testimonial
• The Road Ahead
• Getting Started
• Summary
“Information Privacy is the most important security concern in the enterprise, outranking
malware in 2007 for the first time”
Customer Problem and Pains
Personal Information Loss-Sci-tech today 06/21/07
Ohio state government loses 269,000
confidential information of taxpayers
and employees. See more…
IP2, National Security-Sci-tech today 06/15/07
A consultant from Los Alamos sent an
e-mail containing highly classified,
non-encrypted nuclear weapons to
several board members who
forwarded it to other members
see more…
Personal Information Loss-www.privacyrights.org, August 2008
A flash drive with Social Security
numbers and other personal
information was removed from the
unattended laptop of a state employee.
Significant financial, business, and reputation loss due to regulatory
compliance violations and intellectual property leaks
Other high-profile incidents:
1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M
2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M
3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined
Source: Ohio Data Loss Scope Broadens. Sci-Tech Today.com, June 2007. http://www.sci-tech-today.com/story.xhtml?story_id=53225
Business Needs and IT Challenges
Agility and Flexibility ControlBUSINESS Needs IT Needs
Discover and classify information based on business importance
Secure sensitive information while in use, in motion,
and at rest
Enable simplified access to
information from anywhere
Demonstrate compliance with
information control policies
Multiple locations and devices
Sensitive information stored
in multiple locations
Difficulty in discovering and
securing information
Easy access to sensitive
information on multiple devices
Protect everywhere,access anywhere
Simplify the security experience,
manage compliance
Block
from:
Enable
Cost Value
Siloed Seamless
to:
Business Ready SecurityHelp securely enable business by managing risk and empowering people
Integrate and extendsecurity across the
enterprise
Highly Secure & Interoperable Platform
Identity
Business Ready Security Solutions
Information Protection
Identity and Access Management
Secure Messaging Secure EndpointSecure Collaboration
• Protect critical data wherever It goes
• Protect data wherever it resides
• Secure endpoints to reduce risk
PROTECT everywhere
ACCESS anywhere
SIMPLIFY security,
MANAGE compliance
• Extend confidential communication to partners
• Built into the Windows platform and applications
Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
INTEGRATE and
EXTEND security
• Simplify deployment and ongoing management
• Enable compliance with information policy
Protect Critical Information Wherever It Goes
SSN# 0000
• Automatically protect sensitive e-mail with Active Directory Rights Management Services
• Filter message body and subject based on content criteria
• Policy-based restricted usage of e-mail attachments
“Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
“
Protect Information Wherever It Resides
• Automatically discover and classify sensitive information
• Protect information based on content, context, and identity
• Ensure only authorized usage through persistent policies
• Restricts users from sharing inappropriate content
Source: Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RSA-Partner-to-Develop-NextGen-Data-Loss-Prevention/
“
Secure Endpoints to Reduce Risk
Access policy for removable media
Reduce information loss risk through integrated disk
encryption
Classify and protect information with built-in AD RMS
BitLockerDevice Control
Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
Enable Secure, Seamless Access to Information
“
• Ability to move seamlessly between applications
• Eliminate the need to manage external accounts
• Simplified and flexible claims-based federation
• Simplified partner on-boarding through administrative tools and wizards
Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
“
• Automatically apply information policies from within Microsoft Office SharePoint®
Server and Microsoft Exchange Server
• Demonstrate compliance with logging and auditing tools
• Simplify management by centrally applying information protection templates
Simplify Management
Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
Current SituationDiscovery, classification, and protection of sensitive information is expensive
Limited to no access
Limited to no access
Sensitive information is sent via e-mail
because partners do not have access
to collaboration site
SSN# 0000
Information Protection SolutionEnterprise-wide classification, discovery, and protection
SSN# 0000
Classification and protection
built into platform
“
A global leader in silicon-based technology and innovation through a joint
venture between Corning and Dow Chemical
• With 4,000 patents globally, protecting its intellectual property (IP) is a business imperative
• More specifically, Dow Corning wanted to institutionalize how it protected IP in a way that could be scaled across the enterprise
BUSINESS SITUATION
• The company deployed Active Directory Rights Management Services in Windows Server 2008, which enables users to limit how others can open, modify, print, forward, or take other actions with content
• Ease of use and management
• Minimal additional infrastructure and complexity
• Extensibility to business partners
• Full corporate control and auditability
• Low total cost of ownership
BENEFITS PROVIDEDSOLUTION
Customer TestimonialDow Corning uses enterprise rights management to help protect intellectual property
Source: Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
Data Protection Using Rights Management Services
Secure Remote Application Publishing
Operations Guides
Administrator Guides
Troubleshooting Guides
Hands-on Labs and VMs
Evaluation Guides
Proof of Concepts
Getting Started
Architecture Planning and Design Guides
Infrastructure Planning Guide
Man
ag
em
en
tP
rote
ctio
n &
A
ccess
So
luti
on
sP
latf
orm
Subject to Change
The Road Ahead
Management Consoles
• Protect critical data wherever It goes
• Protect data wherever it resides
• Secure endpoints to reduce risk
PROTECT everywhere
ACCESS anywhere
SIMPLIFY security,
MANAGE compliance
• Extend confidential communication to partners
• Built into the Windows platform and applications
Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
INTEGRATE and
EXTEND security
• Simplify deployment and ongoing management
• Enable compliance with information policy
Learn more at: www.microsoft.com/forefront
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date ofthis presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESSED, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.