尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Microsoft Azure Security
Protect everything end to end
Aan Sulistiyo
Cloud Consultant
Security is shaping the world and impacting
every organization
Russian hackers are
preparing for a new
campaign in Ukraine
A spring cyber-offensive is about to be unleashed
Ransomware attacking companies (Indonesia)
Your enterprise is transforming
Data
Endpoints
Identities
Cloud apps
Workloads
Networks
Your enterprise is transforming
Cloud apps
Company-
owned devices
Identities
Remote
employees
Data
Endpoints
Customers
Home office
Personal device
Partner
device
Workloads
Partners
Networks
On-premises
Complexity requires advanced security
Cloud apps
Company-
owned devices
Identities
Remote
employees
Data
Endpoints
Customers
Home office
Personal device
Partner
device
Workloads
Partners
On-premises
!
!
!
!
Networks
Infrastructure is highly
distributed
Threats are not shared
across vendors
More vendors require
more people to manage
Tools are not integrated
nor interoperable
Multi-vendor costs are
unsustainable
We lead with end-to-end protection
Microsoft
Security
Multicloud
Security
services
Threat
protection
Cloud
security
Identity and access
management
Microsoft
Security
Network
access and
security
Data
security
Posture and risk
management
Endpoint
security and
management
Multiplatform
A Leader in Security
A Leader in four
Gartner® Magic
Quadrant™ reports
A Leader in six
Forrester Wave™ categories
A Leader in seven
IDC MarketScape reports
Gartner and Magic Quadrant are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization
and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment, Doc #US48306021. November 2021
IDC MarketScape: Worldwide Modern Endpoint Security for Small and Midsize Businesses 2021 Vendor Assessment, Doc #48304721. November 2021
IDC MarketScape: Worldwide Advanced Authentication for Identity Security 2021 Vendor Assessment, Doc #US46178720, July 2021
IDC MarketScape: Worldwide eDiscovery Early Case Assessment Software 2022 Vendor Assessment, Doc #US48970222, October 2022
The Microsoft difference
End-to-end protection
that is best of breed and best of suite
Industry-leading AI
that defends at machine speed and scale
World-class threat intelligence
driven by 65 trillion native signals
Driving business outcomes, securely
Maintain brand
reputation and
customer trust
Realize the value
of your security
investments
Optimize limited
resources and free
up your employees
Power your AI
transformation
by preventing
security breaches
through vendor
consolidation and
integrated solutions
by reducing
redundant capabilities
through automation
with cloud-native
solutions to scale
innovation
Let us help you on your journey
Microsoft
Security
Security
services
Threat
protection
Cloud
security
Identity and access
management
Microsoft
Security
Network
access and
security
Data
security
Posture and risk
management
Endpoint
security and
management
Next steps
We lead with end-to-end protection
Microsoft
Security
Copilot
Multicloud Multiplatform
The odds are against today’s defenders
4,000
Password attacks
per second
<90Mins
Median time for an attacker to
access your private data if you
fall victim to a phishing email
3.5M
Global shortage of
skilled cybersecurity
professionals
World-class threat intelligence
Driven by 65 trillion daily security signals
How Microsoft supports you:​
More than 10,000 defenders
Sec Ops Team
Disaster Recovery Team
SOC Analysts
Threat Intelligence team
Tracking 250+ unique nation-states,
cybercriminals, and other threat actors
Your enhanced security team
Cloud security Incident response
Microsoft and third-party
product vulnerabilities
Fraud
Nation-state threats
Malware
Botnet attacks
IoT Security
Global intelligence
Cybersecurity policies
Hardware security
Firmware security
Offensive security
Phishing
Breach recovery Ransomware
Increasing visibility to proactively identify threats
“Our entire estate is covered because of the telemetry we receive
across Microsoft 365. It’s all available through a single pane of
glass, and that has been critical to raising proactiveness and
improving our security posture.”
Piotr Pociecha
Product Owner
Read the customer stories for ING,
Investments in security
FY22 FY24 ++
Acquired
Refirm Labs,
CloudKnox,
RiskIQ
$20B
Cybersecurity
Investments over
5 years
Partnering
with White
House
Microsoft
Defender for
Endpoint
Microsoft
Priva
Launch
Microsoft
Purview
Launch
Microsoft
Security
Experts
Microsoft
Entra
Launch
Microsoft
Defender
for
Business
Microsoft
Defender Threat
Intelligence
Launch
Announced
$20B
moment
Microsoft
Secure
Microsoft
Security
Copilot
Launch
Microsoft
Security
Service Edge
Launch
XDR
Forrester
Wave
SIEM
Gartner MQ
Access
Management
Gartner MQ
Security Analytics
Platform
Forrester Wave
Endpoint
Protections
Platform
Gartner MQ
Sentinel SOAR
Leader
KuppingerCole
Identity and
Access
Management
Gartner MQ
Defender for
Cloud as CNAPP
representative
Gartner
Data Security
Platform
Forrester Wave
Cloud
Security
Forrester
Wave
Email Security
Forrester Wave
Endpoint
IDC Market Share
300+ product innovations in the past 12
months and counting
Transforming threat protection and
cloud security
Secure, connected endpoint
management and identity
Data security for today’s world
The AI-powered future of Security
Microsoft Defender Threat Intelligence
in Microsoft 365 Defender
Microsoft Intune Suite
Microsoft Entra governance controls
Adaptive protection in Microsoft Purview
Microsoft Security Copilot
We are the world leader in security
Achieving
$20B security revenue
in 2022
Protecting
860K organizations
in 120 countries
Analyzing
65T threat signals
every day
Investing
$20B
in cybersecurity
research and
development over
the next five years
Tracking
300+
unique nation-states,
cybercriminals, and
other threat actors
Blocked
70Battacks
last year
Microsoft
Defender +
Microsoft Sentinel
Stop
Microsoft is the only company that can bring
together threat protection (XDR + SIEM) and
cloud native security (CNAPP)
Microsoft Entra
Microsoft Purview
Microsoft Priva
Microsoft Intune
Microsoft
Security Copilot
Coming soon…
Microsoft
Security Copilot
Preview customer
“Microsoft is spearheading a transformative shift in security
operations center (SOC) processes and operations at a truly
remarkable speed. By fully integrating these cutting-edge AI
technologies, they are pioneering a leap so momentous that
by December 2024, SOC operations from 2021 may seem
prehistoric in comparison. The surge in productivity could be
unparalleled. At Bridgewater, we are thrilled to be helping
Microsoft on this voyage, collaboratively propelling Security
Copilot’s full potential to the forefront of the industry.”
—Igor Tsyganskiy, President, Bridgewater
Microsoft Security
Experts
Proactive, managed threat hunting
Managed XDR that goes beyond the
endpoint
• Assigned analyst from onboarding
through engagement
Expert help before, during and after
an attack
Microsoft Security
helps you protect more
with less
60%
savings by consolidating a
patchwork of vendors for a
comprehensive solution from
Microsoft*
Be more efficient
Unify your tools, consolidate your
licenses, and cast aside redundant
contracts and consultants.
Be more effective
AI and automation help you detect
and respond faster and more
accurately to attacks and insider risks.
Be more unified
Increase SecOps efficiency with a unified
SIEM and XDR experience that improves
visibility across identities and endpoints
* Savings based on publicly available estimated pricing for other vendor solutions and Web Direct/Base
Price shown for Microsoft offerings.
Getting to the up to 60% savings
Examples of multi-vendor standalones Microsoft Security
Compliance ($33)
Security ($30)
$63 per user
Identity and Access Management
Intrusion detection, investigation, prevention,
and threat intelligence
Email protection
Endpoint Protection and Response
Cloud Access Security Broker
Compliance Management
Search and eDiscovery; Auditing (Advanced)
Insider Risk Management; Access Control
Information Protection and Governance
$39 more
per user
$24 per user
Microsoft 365 E5 Compliance
add-on to Microsoft 365 E3
Microsoft 365 E5 Security
add-on to Microsoft 365 E3
Full suite Microsoft 365 E3
($12)
($12)
60% savings
Up to
Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
Power your AI transformation
with the Microsoft Cloud
Amplify human
ingenuity with a
copilot for everyone
Deliver
transformational
experiences by building
your own intelligent
apps
Safeguard your
business and data with
the most trusted AI
platform
Microsoft
Security Copilot
Best
practices
Microsoft
Security Copilot
Enable response
not hours
with natural
language prompts and easy reporting
with deeper
understanding of your enterprise
with cyber-trained generative AI
Security Copilot
boosting your SOC team
The Microsoft Security Copilot advantage
Security Copilot working with Microsoft Security
• Run queries using natural language
• Prepare reports, summaries, and graphs
• Upskill teams via prompts and guidance
• Reverse engineer malware
• Enrich alerts
• Enrich incidents • Enrich incidents
• Assess security posture of devices
Built with security,
privacy, and
compliance
Grounded in responsible AI principles
Microsoft’s
responsible AI
principles
Powered by data
that is unique to
you and
your organization
Operated with simple natural language queries
Built on AI model trained for security
Private preview customer feedback
“Security Copilot is allowing
us to re-envision security
operations. It will be critical
in helping us close the talent
gap.”
“Microsoft is spearheading a
transformative shift in SOC
processes and operations at
a truly remarkable speed.
The surge in productivity
could be unparalleled.”
“We are excited about what
we have seen from
Microsoft on Security
Copilot. These capabilities
can help companies stay
ahead of future threats.”
Thank you.

More Related Content

Similar to Microsoft Azure Security - Customer Deck.pptx

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
guestb099f64c
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
JenniferMete1
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdf
SerbanTeron
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
Robert Crane
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
SonaliG6
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft Azure
Francisco Ferreira
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ingrid Fernandez, PhD
 
Azure - a secure platform for source-to-pay
Azure - a secure platform for source-to-payAzure - a secure platform for source-to-pay
Azure - a secure platform for source-to-pay
OpusCapita
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tom Janetscheck
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
m12016changTIIMP
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
Adrian Dumitrescu
 

Similar to Microsoft Azure Security - Customer Deck.pptx (20)

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdf
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft Azure
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
Azure - a secure platform for source-to-pay
Azure - a secure platform for source-to-payAzure - a secure platform for source-to-pay
Azure - a secure platform for source-to-pay
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 

More from AanSulistiyo

Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
AanSulistiyo
 
Pure Optimization, SaaSops, FinOps for Cost Optimize
Pure Optimization, SaaSops, FinOps for Cost OptimizePure Optimization, SaaSops, FinOps for Cost Optimize
Pure Optimization, SaaSops, FinOps for Cost Optimize
AanSulistiyo
 
Cloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewCloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure Overview
AanSulistiyo
 
Hub_Spoke_v1.0.pptx
Hub_Spoke_v1.0.pptxHub_Spoke_v1.0.pptx
Hub_Spoke_v1.0.pptx
AanSulistiyo
 
20345-1B_02.pptx
20345-1B_02.pptx20345-1B_02.pptx
20345-1B_02.pptx
AanSulistiyo
 

More from AanSulistiyo (6)

Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Pure Optimization, SaaSops, FinOps for Cost Optimize
Pure Optimization, SaaSops, FinOps for Cost OptimizePure Optimization, SaaSops, FinOps for Cost Optimize
Pure Optimization, SaaSops, FinOps for Cost Optimize
 
Cloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewCloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure Overview
 
Hub_Spoke_v1.0.pptx
Hub_Spoke_v1.0.pptxHub_Spoke_v1.0.pptx
Hub_Spoke_v1.0.pptx
 
20345-1B_02.pptx
20345-1B_02.pptx20345-1B_02.pptx
20345-1B_02.pptx
 

Recently uploaded

Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
keshavtiwari584
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
alisha panday
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
Web Inspire
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
AkashKumar1733
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
APNIC
 
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetSeizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
APNIC
 
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Bert Blevins
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
graggunno
 
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl DelhiCall Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
alisha panday
 
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowTop UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Onepixll
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
monuc3758 $S2
 
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Lumiverse Solutions Pvt Ltd
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
adocd
 
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
tiktokhotymodel
 
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
tanichadda371 #v08
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
manalishivani8
 
40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions
mohammedbouna1
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceNashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
sabanasarkari36
 
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
hina sharma$A17
 

Recently uploaded (20)

Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
 
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetSeizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
 
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
 
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl DelhiCall Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
 
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowTop UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
 
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
 
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
 
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
 
40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceNashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
 
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
 

Microsoft Azure Security - Customer Deck.pptx

  • 1. Microsoft Azure Security Protect everything end to end Aan Sulistiyo Cloud Consultant
  • 2. Security is shaping the world and impacting every organization Russian hackers are preparing for a new campaign in Ukraine A spring cyber-offensive is about to be unleashed
  • 4. Your enterprise is transforming Data Endpoints Identities Cloud apps Workloads Networks
  • 5. Your enterprise is transforming Cloud apps Company- owned devices Identities Remote employees Data Endpoints Customers Home office Personal device Partner device Workloads Partners Networks On-premises
  • 6. Complexity requires advanced security Cloud apps Company- owned devices Identities Remote employees Data Endpoints Customers Home office Personal device Partner device Workloads Partners On-premises ! ! ! ! Networks Infrastructure is highly distributed Threats are not shared across vendors More vendors require more people to manage Tools are not integrated nor interoperable Multi-vendor costs are unsustainable
  • 7. We lead with end-to-end protection Microsoft Security Multicloud Security services Threat protection Cloud security Identity and access management Microsoft Security Network access and security Data security Posture and risk management Endpoint security and management Multiplatform
  • 8. A Leader in Security A Leader in four Gartner® Magic Quadrant™ reports A Leader in six Forrester Wave™ categories A Leader in seven IDC MarketScape reports Gartner and Magic Quadrant are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment, Doc #US48306021. November 2021 IDC MarketScape: Worldwide Modern Endpoint Security for Small and Midsize Businesses 2021 Vendor Assessment, Doc #48304721. November 2021 IDC MarketScape: Worldwide Advanced Authentication for Identity Security 2021 Vendor Assessment, Doc #US46178720, July 2021 IDC MarketScape: Worldwide eDiscovery Early Case Assessment Software 2022 Vendor Assessment, Doc #US48970222, October 2022
  • 9. The Microsoft difference End-to-end protection that is best of breed and best of suite Industry-leading AI that defends at machine speed and scale World-class threat intelligence driven by 65 trillion native signals
  • 10. Driving business outcomes, securely Maintain brand reputation and customer trust Realize the value of your security investments Optimize limited resources and free up your employees Power your AI transformation by preventing security breaches through vendor consolidation and integrated solutions by reducing redundant capabilities through automation with cloud-native solutions to scale innovation
  • 11. Let us help you on your journey Microsoft Security Security services Threat protection Cloud security Identity and access management Microsoft Security Network access and security Data security Posture and risk management Endpoint security and management
  • 13. We lead with end-to-end protection Microsoft Security Copilot Multicloud Multiplatform
  • 14. The odds are against today’s defenders 4,000 Password attacks per second <90Mins Median time for an attacker to access your private data if you fall victim to a phishing email 3.5M Global shortage of skilled cybersecurity professionals
  • 15. World-class threat intelligence Driven by 65 trillion daily security signals
  • 16. How Microsoft supports you:​ More than 10,000 defenders Sec Ops Team Disaster Recovery Team SOC Analysts Threat Intelligence team Tracking 250+ unique nation-states, cybercriminals, and other threat actors
  • 17. Your enhanced security team Cloud security Incident response Microsoft and third-party product vulnerabilities Fraud Nation-state threats Malware Botnet attacks IoT Security Global intelligence Cybersecurity policies Hardware security Firmware security Offensive security Phishing Breach recovery Ransomware
  • 18. Increasing visibility to proactively identify threats “Our entire estate is covered because of the telemetry we receive across Microsoft 365. It’s all available through a single pane of glass, and that has been critical to raising proactiveness and improving our security posture.” Piotr Pociecha Product Owner Read the customer stories for ING,
  • 19. Investments in security FY22 FY24 ++ Acquired Refirm Labs, CloudKnox, RiskIQ $20B Cybersecurity Investments over 5 years Partnering with White House Microsoft Defender for Endpoint Microsoft Priva Launch Microsoft Purview Launch Microsoft Security Experts Microsoft Entra Launch Microsoft Defender for Business Microsoft Defender Threat Intelligence Launch Announced $20B moment Microsoft Secure Microsoft Security Copilot Launch Microsoft Security Service Edge Launch XDR Forrester Wave SIEM Gartner MQ Access Management Gartner MQ Security Analytics Platform Forrester Wave Endpoint Protections Platform Gartner MQ Sentinel SOAR Leader KuppingerCole Identity and Access Management Gartner MQ Defender for Cloud as CNAPP representative Gartner Data Security Platform Forrester Wave Cloud Security Forrester Wave Email Security Forrester Wave Endpoint IDC Market Share
  • 20. 300+ product innovations in the past 12 months and counting Transforming threat protection and cloud security Secure, connected endpoint management and identity Data security for today’s world The AI-powered future of Security Microsoft Defender Threat Intelligence in Microsoft 365 Defender Microsoft Intune Suite Microsoft Entra governance controls Adaptive protection in Microsoft Purview Microsoft Security Copilot
  • 21. We are the world leader in security Achieving $20B security revenue in 2022 Protecting 860K organizations in 120 countries Analyzing 65T threat signals every day Investing $20B in cybersecurity research and development over the next five years Tracking 300+ unique nation-states, cybercriminals, and other threat actors Blocked 70Battacks last year
  • 22. Microsoft Defender + Microsoft Sentinel Stop Microsoft is the only company that can bring together threat protection (XDR + SIEM) and cloud native security (CNAPP)
  • 28. Microsoft Security Copilot Preview customer “Microsoft is spearheading a transformative shift in security operations center (SOC) processes and operations at a truly remarkable speed. By fully integrating these cutting-edge AI technologies, they are pioneering a leap so momentous that by December 2024, SOC operations from 2021 may seem prehistoric in comparison. The surge in productivity could be unparalleled. At Bridgewater, we are thrilled to be helping Microsoft on this voyage, collaboratively propelling Security Copilot’s full potential to the forefront of the industry.” —Igor Tsyganskiy, President, Bridgewater
  • 29. Microsoft Security Experts Proactive, managed threat hunting Managed XDR that goes beyond the endpoint • Assigned analyst from onboarding through engagement Expert help before, during and after an attack
  • 30. Microsoft Security helps you protect more with less 60% savings by consolidating a patchwork of vendors for a comprehensive solution from Microsoft* Be more efficient Unify your tools, consolidate your licenses, and cast aside redundant contracts and consultants. Be more effective AI and automation help you detect and respond faster and more accurately to attacks and insider risks. Be more unified Increase SecOps efficiency with a unified SIEM and XDR experience that improves visibility across identities and endpoints * Savings based on publicly available estimated pricing for other vendor solutions and Web Direct/Base Price shown for Microsoft offerings.
  • 31. Getting to the up to 60% savings Examples of multi-vendor standalones Microsoft Security Compliance ($33) Security ($30) $63 per user Identity and Access Management Intrusion detection, investigation, prevention, and threat intelligence Email protection Endpoint Protection and Response Cloud Access Security Broker Compliance Management Search and eDiscovery; Auditing (Advanced) Insider Risk Management; Access Control Information Protection and Governance $39 more per user $24 per user Microsoft 365 E5 Compliance add-on to Microsoft 365 E3 Microsoft 365 E5 Security add-on to Microsoft 365 E3 Full suite Microsoft 365 E3 ($12) ($12) 60% savings Up to Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
  • 32. Power your AI transformation with the Microsoft Cloud Amplify human ingenuity with a copilot for everyone Deliver transformational experiences by building your own intelligent apps Safeguard your business and data with the most trusted AI platform
  • 34. Microsoft Security Copilot Enable response not hours with natural language prompts and easy reporting with deeper understanding of your enterprise with cyber-trained generative AI
  • 36. The Microsoft Security Copilot advantage
  • 37. Security Copilot working with Microsoft Security • Run queries using natural language • Prepare reports, summaries, and graphs • Upskill teams via prompts and guidance • Reverse engineer malware • Enrich alerts • Enrich incidents • Enrich incidents • Assess security posture of devices
  • 39. Grounded in responsible AI principles Microsoft’s responsible AI principles
  • 40. Powered by data that is unique to you and your organization
  • 41. Operated with simple natural language queries
  • 42. Built on AI model trained for security
  • 43. Private preview customer feedback “Security Copilot is allowing us to re-envision security operations. It will be critical in helping us close the talent gap.” “Microsoft is spearheading a transformative shift in SOC processes and operations at a truly remarkable speed. The surge in productivity could be unparalleled.” “We are excited about what we have seen from Microsoft on Security Copilot. These capabilities can help companies stay ahead of future threats.”

Editor's Notes

  翻译: