0% found this document useful (0 votes)
68 views17 pages

Security For Your Digital Transformation: Rennex Callaghan Microsoft Jamaica Cloud Specialist

This document discusses Microsoft's approach to security for digital transformation. It highlights that Microsoft Secure provides a comprehensive security platform, unique intelligence, and partnerships. The platform includes identity and access management, threat protection, and information protection capabilities. It leverages the Intelligent Security Graph and tools like Azure Active Directory, Windows Defender, and Azure Security Center to provide visibility, control, and guidance for security.

Uploaded by

Pravin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views17 pages

Security For Your Digital Transformation: Rennex Callaghan Microsoft Jamaica Cloud Specialist

This document discusses Microsoft's approach to security for digital transformation. It highlights that Microsoft Secure provides a comprehensive security platform, unique intelligence, and partnerships. The platform includes identity and access management, threat protection, and information protection capabilities. It leverages the Intelligent Security Graph and tools like Azure Active Directory, Windows Defender, and Azure Security Center to provide visibility, control, and guidance for security.

Uploaded by

Pravin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Security for your digital

transformation
Rennex Callaghan
Microsoft Jamaica Cloud Specialist
OUR COMMITMENT
TO YOU

SECURITY

PRIVACY & CONTROL

COMPLIANCE

TRANSPARENCY

RELIABILITY
Microsoft Secure
Ensuring security to enable your digital
transformation through a comprehensive
platform, unique intelligence, and broad
partnerships
Smart cities
Sensors

Vehicles
Partners
Energy systems
Cloud

Equipment
On-premises
YOUR YOUR
IT ENVIRONMENT OPPORTUNITY
Mobile devices

Manufacturers Marketplaces

Citizens

Supply Chains
Customers
YOUR
IT ENVIRONMENT
OUR UNIQUE APPROACH

Platform Intelligence Partners


Physical
security

Operational
security
SECURE
Platform FOUNDATION

Global
datacenter
Platform
Identity & access
management

Threat
protection

BUILT IN
SECURITY Platform Information
protection

Security
management
IDENTITY & ACCESS MANAGEMENT
Prove users are authorized and secure before granting access to apps and data

Protect at the Simplify access to Safeguard your


front door devices and apps credentials
THREAT PROTECTION
Protect against advanced attacks; detect and respond quickly if breached

PROTECT DETECT RESPOND


organizations from malicious activities to threats quickly
advanced cyber attacks
INFORMATION PROTECTION
Protect sensitive data throughout the lifecycle – inside and outside the organization

Detect Classify Protect Monitor

DEVICES CLOUD ON PREMISES


IDENTITY DEVICES APPS / DATA INFRASTRUCTURE

INTELLIGENT SECURITY
MANAGEMENT
IDENTITY DEVICES APPS / DATA INFRASTRUCTURE

Powered by the
Intelligent Security Graph

VISIBILITY CONTROL GUIDANCE


Understand the security Define consistent security Enhance security through
state and risks across policies and enable built-in intelligence and
resources controls recommendations
Identity & access Threat Information Security
management protection protection management
Protect users’ identities &
Protect against advanced Ensure documents and emails
control access to valuable Gain visibility and control
threats and recover quickly are seen only by authorized
resources based on user risk over security tools
when attacked people
level

Azure Active Directory Advanced Threat Analytics Azure Information Protection Azure Security Center
Conditional Access Windows Defender Office 365 Data Loss Prevention Office 365 Security Center
Windows Hello Advanced Threat Protection Windows Information Protection Windows Defender Security Center
Windows Credential Guard Office 365 Advanced Threat Microsoft Cloud App Security
Protection
Office 365 Advanced Security Mgmt.
Office 365 Threat Intelligence
Microsoft Intune
Identity & access
management
Protect users’ identities &
control access to valuable
resources based on user risk
level
Multi-factor authentication

Data encryption

User accounts

Device log-ins
Malware
Unauthorized data access

Attacks

INTELLIGENCE
User log-ins

Phishing Denial of service

Spam

System updates
Enterprise security
Microsoft Secure
Ensuring security to enable your digital
transformation through a comprehensive
platform, unique intelligence, and broad
partnerships

You might also like