SlideShare a Scribd company logo
webinar
sept 28
2016
bridging the
o365 security
gap
STORYBOAR
office 365 is the leading SaaS productivity suite:
market share has tripled year over year
2014 2015
google apps
office 365
other
16.3%
7.7%
76%
22.8%
25.2%52%
poll:
what are your
office 365
migration plans?
STORYBOAR
the traditional
approach to
security is
inadequate
STORYBOAR
the data blind spot:
enterprises can’t rely solely on native app security
enterprise
(CASB)
end-user devices
visibility & analytics
data protection
identity & access control
application
storage
servers
network
5
STORYBOAR
a security balancing act:
empower users, maintain control
■ Visibility and control over corporate data in Office 365
■ Prevent unauthorized access
■ Limit external sharing
■ Restrict access on unmanaged devices
○ Managing OneDrive sync, access in risky contexts,
more
STORYBOAR
components
of o365
security
identity
cloud
access
mobile
STORYBOAR
cloud:
protect data-at-rest in o365
■ External sharing opens the door to
unintended leaks
○ API-based controls can restrict sharing
of sensitive data
■ User behavior analytics, logging
○ Little in-app visibility, no cross-app
visibility
○ Third-party solutions are built with
compliance in mind
STORYBOAR
access:
native security provides limited visibility
■ More access, greater risk of data leakage
○ Granular access controls can limit risky
access
■ DLP is critical to securing sensitive data in
risky contexts
○ Complete security solutions should be
content-aware, apply DLP at access
STORYBOAR
mobile:
distinguish between managed and unmanaged devices
■ Employees have rejected MDM and MAM
■ IT must securely enable access to
frequently used apps
■ Allow different levels of mobile access
based on device type, user, etc.
STORYBOAR
identity:
centralized identity management is key to securing data
■ Cloud app identity management should
maintain the best practices of on-prem
identity
■ O365 can identify some but not all high-
risk logins
■ Prevent use of compromised credentials
with cross-app IAM, step-up MFA
STORYBOAR
■ BYOD blindspot - O365 DLP is not geared toward protecting data on BYOD
■ High operational overhead - Complex to configure and maintain
■ Difficult deployment - Sharepoint/OneDrive DLP integration requires Office 2016
on PCs
■ High cost - Must have top of the line license
■ Point solution - Support focused on Office 365, what about other cloud apps?
office 365 native dlp:
complex, costly, and doesn’t work across apps
poll:
what cloud security
functions are most
important?
STORYBOAR
casb security:
a data-centric approach
o365 requires a new security architecture
■ Cross-device, cross-application agentless
data security
■ Real-time data protection
■ Limit high-risk activities like external file
sharing, unmanaged access
■ User behavior analytics
STORYBOAR
managed
devices
application access mode data protection
unmanaged
devices &
mobiles
in the cloud
● profile-agent
● VPN+IP-restriction
● DLP/DRM/encryption
● Device controls, e.g PIN
● Agentless Selective wipe
● Client apps: allow/block
● OneDrive
● Sharepoint
● API
● Quarantine DLP
● Block external shares
● Alert on DLP events
office 365 use case:
real-time inline data protection on any device
Legacy Auth Apps
e.g Office 2010
● Full access
Modern Auth Apps
e.g Office 2013+
● profile agent
● VPN+IP-restriction
● certificates
● Full access
● Browser
● ActiveSync Mail
● Client apps
● Reverse-proxy + AJAX-VM
● ActiveSync Proxy
15
STORYBOAR
client
■ 180,000 employees
■ Among the largest US healthcare orgs
challenge
■ HIPAA Compliant cloud and mobile
■ Controlled access to Office 365 from managed &
unmanaged devices
■ Control external sharing
■ Real-time inline data protection
solution
■ Real-time inline protection on any device
■ Contextual access control on managed &
unmanaged devices (Omni)
■ Real-time DLP on any device
■ API control in the cloud
■ Agentless BYOD with selective wipe
■ Enterprise-wide for all SaaS apps
secure
office 365
+ byod
major
healthcare
firm
STORYBOAR
secure
salesforce +
office 365
17
client
■ 20,000 employees
■ Global presence
■ $6T in assets under management
challenge
■ Needed complete CASB for enterprise-wide
migration to SaaS
■ Security for Office 365
■ Encryption of data-at-rest in Salesforce
solution
■ Searchable true encryption of data in Salesforce
■ Real-time inline DLP on any device (Citadel)
■ Contextual access control on managed &
unmanaged devices (Omni)
■ API control in the cloud
■ Discover breach & Shadow IT
financial
services
client
STORYBOAR
our
mission
total
data
protection est. jan
2013
200+
customer
s
tier 1
VCs
resources:
more info about office 365 security
■ whitepaper: definitive guide to casbs
■ case study: fortune 100 healthcare firm secures o365
■ video: securing office 365
STORYBOAR
bitglass.com
@bitglass

More Related Content

PPTX
4 Essential Components of Office 365 Security
PPTX
O365 security and privacy de_novo_event_july2014
PPTX
Office 365 Security: How to Safeguard Your Data
PPTX
CASBs - A New Hope
PPTX
5 Security Questions To Ask When Deploying O365
PPTX
CASBs: Real World Use Cases
PPTX
CASBs: Critical Capabilities - in partnership with ISC(2)
PPTX
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
4 Essential Components of Office 365 Security
O365 security and privacy de_novo_event_july2014
Office 365 Security: How to Safeguard Your Data
CASBs - A New Hope
5 Security Questions To Ask When Deploying O365
CASBs: Real World Use Cases
CASBs: Critical Capabilities - in partnership with ISC(2)
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases

What's hot (20)

PPTX
securing the cloud for financial services
PPTX
Developing a Secure and Compliant Cloud Strategy for Financial Services
PPTX
Empowering the Cloud Through G Suite
PPTX
Webinar bitglass - complete deck-2
PPTX
CASBs and Office 365 (with Argyle)
PPTX
The Four Horsemen of the O365 Apocalypse
PPTX
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
PPTX
Security and Accountability in the Cloud (in partnership with SANS)
PPTX
CASBs and Office 365: The Security Menace
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PPTX
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
PPTX
Webinar Express: What is a CASB?
PDF
Learning about Security and Compliance in Office 365
PPTX
Webinar - Bitglass and CyberEdge - Hidden Security Threats
PPTX
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
PPTX
Bitglass Webinar - Top 6 CASB Use Cases
PPTX
Bitglass Webinar - A Primer on CASBs and Cloud Security
PPTX
The Security Gap: Protecting Healthcare Data in Office 365
PPTX
AzureThursday Mirabeau - Azure Information Protection
securing the cloud for financial services
Developing a Secure and Compliant Cloud Strategy for Financial Services
Empowering the Cloud Through G Suite
Webinar bitglass - complete deck-2
CASBs and Office 365 (with Argyle)
The Four Horsemen of the O365 Apocalypse
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Security and Accountability in the Cloud (in partnership with SANS)
CASBs and Office 365: The Security Menace
The Future of CASBs - A Cloud Security Force Awakens
CASB Cases: How Your Peers are Securing the Cloud
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Webinar Express: What is a CASB?
Learning about Security and Compliance in Office 365
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - A Primer on CASBs and Cloud Security
The Security Gap: Protecting Healthcare Data in Office 365
AzureThursday Mirabeau - Azure Information Protection
Ad

Viewers also liked (19)

PDF
Curriculum_Vitae
PPTX
Houses blown by Yolanda Typhoon and their respective owners
PDF
459 john landon bp
PPTX
Hellaflush
PPTX
Kejohanan mini olimpik
PDF
Jennifer King Residence
DOC
Prestige song of the south
PPS
日本柰良
PPT
το πυρηνικό ατύχημα στο Chernobyl
PPTX
Webinar Express: Securing BYOD without MDM
DOCX
Francis-T.-Lorenzana
PPTX
344 移动互联 “住家菜”app商业计划书 - c2-c o2o 社交 - 大梦科技 3
PDF
Enzimas Y Vitaminas Bioquímica
DOCX
Cabang Filsafat Pendidikan
PDF
Risalah aswaja
PPTX
Master seller hgmp
DOCX
Aswaja tugas uts khusnul kotimah
PPT
MIGUEL HERNÁNDEZ
PDF
Incredible India - Amazing Photographs
Curriculum_Vitae
Houses blown by Yolanda Typhoon and their respective owners
459 john landon bp
Hellaflush
Kejohanan mini olimpik
Jennifer King Residence
Prestige song of the south
日本柰良
το πυρηνικό ατύχημα στο Chernobyl
Webinar Express: Securing BYOD without MDM
Francis-T.-Lorenzana
344 移动互联 “住家菜”app商业计划书 - c2-c o2o 社交 - 大梦科技 3
Enzimas Y Vitaminas Bioquímica
Cabang Filsafat Pendidikan
Risalah aswaja
Master seller hgmp
Aswaja tugas uts khusnul kotimah
MIGUEL HERNÁNDEZ
Incredible India - Amazing Photographs
Ad

Similar to Bridging the Office 365 Security Gap - Redmond Media (18)

PPTX
Webinar: are casbs ready for primetime?
PPTX
8 questions to ask when evaluating a Cloud Access Security Broker
PPTX
Top 5 Cloud Security Threats in Healthcare
PPTX
Securing IaaS Applications
PPTX
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PDF
O365Engage17 - Protecting O365 Data in a Modern World
PDF
Top Five Security Must-Haves for Office 365
PPTX
Mitigating the Top 5 Cloud Security Threats
PPTX
What is Microsoft Enterprise Mobility Suite and how to deploy it
PPTX
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
PDF
Proven Practices for Office 365 Deployment, Security and Management
PPTX
10 Things Many IT Professionals Don’t Know About Office 365
PPTX
Security and Compliance with SharePoint and Office 365
PDF
BYOD for your business with WSO2 Enterprise Mobility Manager
PPTX
Data-Centric Protection: The Future of BYOD Security
PPTX
Major Trends Transforming BYOD Security
PDF
Office 365 smb guidelines for pure bookkeeping (slideshare)
Webinar: are casbs ready for primetime?
8 questions to ask when evaluating a Cloud Access Security Broker
Top 5 Cloud Security Threats in Healthcare
Securing IaaS Applications
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
5 Highest-Impact CASB Use Cases - Office 365
O365Engage17 - Protecting O365 Data in a Modern World
Top Five Security Must-Haves for Office 365
Mitigating the Top 5 Cloud Security Threats
What is Microsoft Enterprise Mobility Suite and how to deploy it
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
Proven Practices for Office 365 Deployment, Security and Management
10 Things Many IT Professionals Don’t Know About Office 365
Security and Compliance with SharePoint and Office 365
BYOD for your business with WSO2 Enterprise Mobility Manager
Data-Centric Protection: The Future of BYOD Security
Major Trends Transforming BYOD Security
Office 365 smb guidelines for pure bookkeeping (slideshare)

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Understanding_Digital_Forensics_Presentation.pptx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Bridging the Office 365 Security Gap - Redmond Media

  • 2. STORYBOAR office 365 is the leading SaaS productivity suite: market share has tripled year over year 2014 2015 google apps office 365 other 16.3% 7.7% 76% 22.8% 25.2%52%
  • 3. poll: what are your office 365 migration plans?
  • 5. STORYBOAR the data blind spot: enterprises can’t rely solely on native app security enterprise (CASB) end-user devices visibility & analytics data protection identity & access control application storage servers network 5
  • 6. STORYBOAR a security balancing act: empower users, maintain control ■ Visibility and control over corporate data in Office 365 ■ Prevent unauthorized access ■ Limit external sharing ■ Restrict access on unmanaged devices ○ Managing OneDrive sync, access in risky contexts, more
  • 8. STORYBOAR cloud: protect data-at-rest in o365 ■ External sharing opens the door to unintended leaks ○ API-based controls can restrict sharing of sensitive data ■ User behavior analytics, logging ○ Little in-app visibility, no cross-app visibility ○ Third-party solutions are built with compliance in mind
  • 9. STORYBOAR access: native security provides limited visibility ■ More access, greater risk of data leakage ○ Granular access controls can limit risky access ■ DLP is critical to securing sensitive data in risky contexts ○ Complete security solutions should be content-aware, apply DLP at access
  • 10. STORYBOAR mobile: distinguish between managed and unmanaged devices ■ Employees have rejected MDM and MAM ■ IT must securely enable access to frequently used apps ■ Allow different levels of mobile access based on device type, user, etc.
  • 11. STORYBOAR identity: centralized identity management is key to securing data ■ Cloud app identity management should maintain the best practices of on-prem identity ■ O365 can identify some but not all high- risk logins ■ Prevent use of compromised credentials with cross-app IAM, step-up MFA
  • 12. STORYBOAR ■ BYOD blindspot - O365 DLP is not geared toward protecting data on BYOD ■ High operational overhead - Complex to configure and maintain ■ Difficult deployment - Sharepoint/OneDrive DLP integration requires Office 2016 on PCs ■ High cost - Must have top of the line license ■ Point solution - Support focused on Office 365, what about other cloud apps? office 365 native dlp: complex, costly, and doesn’t work across apps
  • 13. poll: what cloud security functions are most important?
  • 14. STORYBOAR casb security: a data-centric approach o365 requires a new security architecture ■ Cross-device, cross-application agentless data security ■ Real-time data protection ■ Limit high-risk activities like external file sharing, unmanaged access ■ User behavior analytics
  • 15. STORYBOAR managed devices application access mode data protection unmanaged devices & mobiles in the cloud ● profile-agent ● VPN+IP-restriction ● DLP/DRM/encryption ● Device controls, e.g PIN ● Agentless Selective wipe ● Client apps: allow/block ● OneDrive ● Sharepoint ● API ● Quarantine DLP ● Block external shares ● Alert on DLP events office 365 use case: real-time inline data protection on any device Legacy Auth Apps e.g Office 2010 ● Full access Modern Auth Apps e.g Office 2013+ ● profile agent ● VPN+IP-restriction ● certificates ● Full access ● Browser ● ActiveSync Mail ● Client apps ● Reverse-proxy + AJAX-VM ● ActiveSync Proxy 15
  • 16. STORYBOAR client ■ 180,000 employees ■ Among the largest US healthcare orgs challenge ■ HIPAA Compliant cloud and mobile ■ Controlled access to Office 365 from managed & unmanaged devices ■ Control external sharing ■ Real-time inline data protection solution ■ Real-time inline protection on any device ■ Contextual access control on managed & unmanaged devices (Omni) ■ Real-time DLP on any device ■ API control in the cloud ■ Agentless BYOD with selective wipe ■ Enterprise-wide for all SaaS apps secure office 365 + byod major healthcare firm
  • 17. STORYBOAR secure salesforce + office 365 17 client ■ 20,000 employees ■ Global presence ■ $6T in assets under management challenge ■ Needed complete CASB for enterprise-wide migration to SaaS ■ Security for Office 365 ■ Encryption of data-at-rest in Salesforce solution ■ Searchable true encryption of data in Salesforce ■ Real-time inline DLP on any device (Citadel) ■ Contextual access control on managed & unmanaged devices (Omni) ■ API control in the cloud ■ Discover breach & Shadow IT financial services client
  • 19. resources: more info about office 365 security ■ whitepaper: definitive guide to casbs ■ case study: fortune 100 healthcare firm secures o365 ■ video: securing office 365

Editor's Notes

  • #4: what are your office 365 migration plans? Already deployed Deployment in progress Plan to deploy in the next year No plans to deploy O365
  • #11: “By 2018, more than half of all bring your own device (BYOD) users that currently have an MDM agent will be managed by an agentless solution” - Gartner
  • #14: what cloud security functions are most important? Cross-app identity management Access controls Data leakage prevention Data protection for cloud data sync’d to devices Cloud encryption
  • #19: in: CA, NY, MA, IL, N