SlideShare a Scribd company logo
Become Azure
Cloud Security
Rockstar
AmmarHasayen
April2017
JoTechies
www.jotechies.com
Ammar Hasayen
• 13 years of experience in
Information Technology
• CCNA, ITIL, MCP,
MCSA,MCSE, MCITP,
MCTS,ISO/IEC 27001
• Publications
• Blog since 2008
• TechNet Gallery
AmmarHasayen@outlook.com
@AmmarHasayen
www.linkedin.com/in/
ammarhasayen/
AmmarHasayen.com
AmmarHasayen
Ammar Hasayen
Jo Techies
JoTechies is a Tech community that
provides education, help and social
events for IT professional in Jordan
and helps you network with local IT
peers.
@JoTechies
JoTechies
www.JoTechies.com
What’s Happening ?
Still on premise?
• People believe cloud security is
applicable only for cloud workloads
• They invest thousands on security
boxes and solutions.
• Disconnected security systems and
lots of logs, diskspace, and resources.
Security vs Information Security vs
Government
• Different perspectives
• Different teams
What is trending nowadays?
• DLP
• EDR – Endpoint detect and
Respond
• Behavioral analytics
Era of Disruption
Challenges
• Hybrid is missy.
• Cloud comes with challenges
• We still have on premise.
• Attacks are smarter.
• Security expenses are high.
• Mobiles and devices everywhere
Era of Disruption
Challenges
Era of Disruption
Data breaches
63% of confirmed data breaches
involve weak, default, or stolen
passwords.
63% 0.6%
IT Budget growth
Gartner predicts global IT spend
will grow only 0.6% in 2016.
Shadow IT
More than 80 percent of employees
admit to using non-approved
software as a service (SaaS)
applications in their jobs.
80%
Microsoft Security
Graph
Azure Cloud Security
Azure Cloud Security
Azure Cloud Security
Navigating IT Complexity in the Modern WorkplaceEnablinggreatuserexperienceswithsecurityandcontrol
Enable strong
authentication
encryption and access
controls
Manage devices and
apps for PC’s Mobile
devices
Leverage existing
investments for identity
& device management
Provide users with tools
to stay in sync anytime,
anywhere
IT Manageability
User Productivity
Devices
Azure Cloud Security
Azure Cloud Security
Azure Active Directory
Seamless identity and authentication management = single sign-on for all apps, no matter where they live.
Azure Active Directory
Azure Active Directory
Intune
Intune
• Protect information on your
devices.
• BYOD strategy.
• New MAM policies
• Windows 10 management
You own the
device
BYOD
Personal vs
Corporate data
Managed
apps
Personal
apps
Personal apps
Managed apps
Corporate
data
Personal
data
Multi-identity policy
Personal apps
Managed
apps
Copy Paste Save
Save to
personal storage
Paste to
personal
app
Email
attachment
Intune
OMS
Azure Cloud Security
Azure Cloud Security
Azure Information
Protection
RMS IN THE
CLOUD - &
MORE
Azure Cloud Security
Azure Cloud Security
IDENTITY
PROTECTION
Azure Cloud Security
Thank You
JoTechies
www.jotechies.com
Q&A
JoTechies
www.jotechies.com
Event Sessions

More Related Content

PPTX
UAE Microsoft MVPs - How To become Microsoft MVP
PPTX
The Emerge Of The Modern Workplace
PPTX
How to plan your Modern Workplace Project - SPS Denver October 2018
PPTX
Microsoft 365 Threat Management and security - EMS E5
PPTX
Era of disruption with Microsoft 365
PPTX
Secure Modern Workplace With Microsoft 365 Threat Protection
PPTX
Microsoft 365 Certification - How to become Enterprise Administrator Expert
PDF
Dell EMC Spanning
UAE Microsoft MVPs - How To become Microsoft MVP
The Emerge Of The Modern Workplace
How to plan your Modern Workplace Project - SPS Denver October 2018
Microsoft 365 Threat Management and security - EMS E5
Era of disruption with Microsoft 365
Secure Modern Workplace With Microsoft 365 Threat Protection
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Dell EMC Spanning

What's hot (20)

PPTX
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
PPTX
Microsoft 365 Virtual 2020 Spain - Microsoft Graph Search API
PPTX
Modern Workplace - Shift to Cloud
PPTX
Securing Governing and Protecting Your Office 365 Investments
PDF
Introduction to Microsoft 365 Business
PDF
Microsoft EMS Enterprise Mobility and Security Architecture Poster
PPTX
CollabDays BeNeLux Sensitivity labels: what's new
PPTX
Azure cloud
PDF
Pitching Microsoft 365
PPTX
Microsoft ecosystem 2021
PDF
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
PPTX
Shift to a modern desktop with microsoft 365
PPTX
Modern Workplace with Microsoft 365
PDF
Introducing Microsoft 365 for Business
PDF
Microsoft Office 365
PDF
XenMobile Datasheet
PDF
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
PPTX
Concurrency Modern Workplace 2017
PDF
Webinar: Protect your teams work across office 365
PDF
Being more secure using Microsoft 365 Business
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Microsoft 365 Virtual 2020 Spain - Microsoft Graph Search API
Modern Workplace - Shift to Cloud
Securing Governing and Protecting Your Office 365 Investments
Introduction to Microsoft 365 Business
Microsoft EMS Enterprise Mobility and Security Architecture Poster
CollabDays BeNeLux Sensitivity labels: what's new
Azure cloud
Pitching Microsoft 365
Microsoft ecosystem 2021
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
Shift to a modern desktop with microsoft 365
Modern Workplace with Microsoft 365
Introducing Microsoft 365 for Business
Microsoft Office 365
XenMobile Datasheet
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
Concurrency Modern Workplace 2017
Webinar: Protect your teams work across office 365
Being more secure using Microsoft 365 Business
Ad

Similar to Azure Cloud Security (20)

PPTX
ICT and Cybersecurity for Lawyers August 2021
PPTX
A look back A look ahead at Nonprofit Technology
PPTX
Shadow IT Risk and Reward
PDF
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
PPTX
Community IT Innovators Technology Trends Round Table 2019
PPTX
The Connected Workplace
PPTX
An introduction of cloud storage
PPTX
Nonprofit IT Trends 2018
PPTX
TBR IT Trends Study
PDF
Applied mobile chaos theory
PDF
Semantic Computing Executive Briefing
PDF
Semantic Computing Executive Briefing
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
PDF
Community IT Innovators - IT Security Best Practices
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PPTX
JoTechies - Infrastructure as a Service IaaS
PPT
Data Architecture for Data Governance
PPTX
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
PPTX
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
PPTX
Meeting the Demands of an On-Demand World
ICT and Cybersecurity for Lawyers August 2021
A look back A look ahead at Nonprofit Technology
Shadow IT Risk and Reward
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
Community IT Innovators Technology Trends Round Table 2019
The Connected Workplace
An introduction of cloud storage
Nonprofit IT Trends 2018
TBR IT Trends Study
Applied mobile chaos theory
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Community IT Innovators - IT Security Best Practices
Better to Ask Permission? Best Practices for Privacy and Security
JoTechies - Infrastructure as a Service IaaS
Data Architecture for Data Governance
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
Meeting the Demands of an On-Demand World
Ad

More from Ammar Hasayen (19)

PPTX
Cloud Reference Architecture - Part 1 Foundation
PPTX
Introducing Azure Bastion
PPTX
Windows Advance Threats - BSides Amman 2019
PDF
Microsoft Cloud App Security CASB
PPTX
Office 365 periodic table - editable
PDF
Migrating your certification authority hashing algorithm from sha 1 to sha-2
PDF
Strict KDC Validation
PDF
Modern Workplace Deep Dive infographic
PDF
Email edge security architecture EOP
PPTX
What is microsoft 365
PDF
Exchange Online Protection EOP headers
PDF
Malware and malicious programs
PDF
The journey to the cloud from business perspective
PDF
Exchange UM Voice Mail, OVA and Auto-Attendant
PDF
Exchange UM architecture exchange UM dial plan
PPTX
Introducing office 365
DOCX
Install offline Root CA Server 2003
DOCX
Ammar hasayen microsoft ILM/FIM 2007 guide
PPTX
Malware - Why and How I Get Hacked?
Cloud Reference Architecture - Part 1 Foundation
Introducing Azure Bastion
Windows Advance Threats - BSides Amman 2019
Microsoft Cloud App Security CASB
Office 365 periodic table - editable
Migrating your certification authority hashing algorithm from sha 1 to sha-2
Strict KDC Validation
Modern Workplace Deep Dive infographic
Email edge security architecture EOP
What is microsoft 365
Exchange Online Protection EOP headers
Malware and malicious programs
The journey to the cloud from business perspective
Exchange UM Voice Mail, OVA and Auto-Attendant
Exchange UM architecture exchange UM dial plan
Introducing office 365
Install offline Root CA Server 2003
Ammar hasayen microsoft ILM/FIM 2007 guide
Malware - Why and How I Get Hacked?

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Azure Cloud Security