SlideShare a Scribd company logo
Threat Management Lifecycle
Antonio Formato – Threat Management
antonio.formato@microsoft.com
+39 331 7350 247
@anformato
User opens email
attachment or
clicks on a URL
DETECT
Attacker steals
sensitive data
Exploitation of
the endpoint
Malicious apps
and data
Advanced threats and
abnormal behavior
Compromised
user credentials
Advanced threats
to hybrid workloads
Attacker installs
backdoor to
gains persistency
Escalates privileges,
steels credentials
Attackers explores the
network and moves
to find sensitive data
Attacker accesses
sensitive data
User inserts USB drive
Browse to a website
User browses
to a website
User runs a
program
Office 365 ATP
Email protection
User receives
an email
Opens an
attachment
Clicks on a URL
+
Windows Defender ATP
End Point protection
Brute force
an account
Reconnaissance
Lateral
Movement
Domain
Dominance
ATA +Azure ATP
Identity protection
Maximize detection coverage
throughout the attack stages
!
!
!
Exploitation Installation
Command and
Control channel
C:
Office 365 Advanced Threat Protection
Protect your data
Advanced threat protection: Time of click protection for malicious links
Web servers
perform latest URL
reputation check
Rewriting URLs to
redirect to a web
server.
User clicking URL is
taken to EOP web
servers for the latest
check at the “time-
of-click”
Protect your data
Advanced threat protection: Sandboxing technology for malicious attachments
Sandboxing
Protect your data
Advanced threat protection: URL detonation
SandboxingEmail with link Link added to
reputation server
Protect your data
Threat protection extends to your
entire Office 365 ecosystem
Email is only one attack vector
Threat protection has
extended coverage
Microsoft enables security for
multiple office workloads
Office 365
Protect your data
Advanced threat protection for your collaboration workloads
Sandboxing
and detonation
• anonymous links
• companywide sharing
• explicit sharing
• guest user activity
collaboration signals
• malware in email + SPO
• Windows Defender
• Windows Defender ATP
• suspicious logins
• risky IP addresses
• irregular file activity
threat feeds
• users
• IPs
• On-demand patterns
(e.g. WannaCry)
activity watch lists
Leverage Signals
Apply Smart Heuristics
Files in SPO, ODB
and Teams
1st and 3rd
party reputation
Multiple AV
engines
SharePoint OneDrive Microsoft Teams
Protect your data
Advanced security for your desktop clients
Improve your security against advanced
threats, unknown malware, and zero-day
attacks
Protect users from malicious links with
time-of-click protection
Safeguard your environment from
malicious documents using virtual
environments
Word Excel PowerPoint
Unified Platform for Endpoint
Security
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
*AV-TEST and AV-Comparatives
Threat management lifecycle in ottica GDPR
*Listed as one of the leaders in the “Ovum Decision Matrix”
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Advanced Threat Analytics
Behavioral Analytics
(Interaction Map)
Detection for known
attacks and issues
Advanced Threat
Detection
Piattaforma on-premise per il rilevamento di attacchi avanzati prima che essi causino danni
Threat management lifecycle in ottica GDPR
Abnormal resource access
Account enumeration
Net Session enumeration
DNS enumeration
SAM-R Enumeration
Abnormal working hours
Brute force using NTLM, Kerberos, or LDAP
Sensitive accounts exposed in plain text
authentication
Service accounts exposed in plain text
authentication
Honey Token account suspicious activities
Unusual protocol implementation
Malicious Data Protection Private Information
(DPAPI) Request
Abnormal VPN
Abnormal authentication requests
Abnormal resource access
Pass-the-Ticket
Pass-the-Hash
Overpass-the-Hash
Malicious service creation
MS14-068 exploit
(Forged PAC)
MS11-013 exploit (Silver
PAC)
Skeleton key malware
Golden ticket
Remote execution
Malicious replication requests
Abnormal Modification of
Sensitive Groups
Advanced Threat Analytics
Reconnaissance
!
!
!
Compromised
Credential
Lateral
Movement
Privilege
Escalation
Domain
Dominance
Abnormal Behavior
 Anomalous logins
 Remote execution
 Suspicious activity
Security issues and risks
 Broken trust
 Weak protocols
 Known protocol vulnerabilities
Malicious attacks
 Pass-the-Ticket (PtT)
 Pass-the-Hash (PtH)
 Overpass-the-Hash
 Forged PAC (MS14-068)
 Golden Ticket
 Skeleton key malware
 Reconnaissance
 BruteForce
 Unknown threats
 Password sharing
 Lateral movement
INTERNET
ATA GATEWAY 1
VPN
DMZ
Web
Port mirroring
Syslog forwarding
SIEM
Fileserver
DC1
DC2
DC3
DC4
ATA CENTER
DB
Fileserver
ATA
Lightweight
Gateway
:// DNS
Cloud App Security
A comprehensive, intelligent security solution that brings the visibility, real-time control,
and security you have in your on-premises network to your cloud applications.
ControlDiscover Protect
Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
Discover and
assess risks
Protect your
information
Detect
threats
Control access
in real time
Identify cloud apps on your
network, gain visibility into shadow
IT, and get risk assessments and
ongoing analytics.
Get granular control over data
and use built-in or custom
policies for data sharing and
data loss prevention.
Identify high-risk usage and
detect unusual behavior using
Microsoft threat intelligence
and research.
Manage and limit cloud app
access based on conditions and
session context, including user
identity, device, and location.
101010101
010101010
101010101
01011010
10101
Threat management lifecycle in ottica GDPR

More Related Content

PPT
Port of seattle security presentation david morris
Emily2014
 
PDF
Web application sec_3
vhimsikal
 
PDF
Security Implications of the Cloud
Alert Logic
 
PDF
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
PDF
Web Application Security 101
Cybersecurity Education and Research Centre
 
PPTX
Security Testing For Web Applications
Vladimir Soghoyan
 
PPTX
SSRF exploit the trust relationship
n|u - The Open Security Community
 
PPT
Network security
MD. IFTEKARUL ALAM
 
Port of seattle security presentation david morris
Emily2014
 
Web application sec_3
vhimsikal
 
Security Implications of the Cloud
Alert Logic
 
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
Web Application Security 101
Cybersecurity Education and Research Centre
 
Security Testing For Web Applications
Vladimir Soghoyan
 
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Network security
MD. IFTEKARUL ALAM
 

What's hot (20)

PDF
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
BeyondTrust
 
PPT
New definition for APT
Richard Stiennon
 
PPTX
PASTA: Risk-centric Threat Modeling
Craig Walker, CISSP
 
PPT
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
 
PPTX
Computer virus
Ankita Shirke
 
PPTX
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PPTX
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
PDF
Realities of Security in the Cloud
Alert Logic
 
PPTX
Security hole #5 application security science or quality assurance
Tjylen Veselyj
 
PPTX
00. introduction to app sec v3
Eoin Keary
 
PPTX
Mobile security services 2012
Tjylen Veselyj
 
PPTX
Threat modelling with_sample_application
Umut IŞIK
 
PDF
Realities of Security in the Cloud - CSS ATX 2017
Alert Logic
 
PPTX
Application Security Vulnerabilities: OWASP Top 10 -2007
Vaibhav Gupta
 
PPT
Web Application Security
Abdul Wahid
 
PDF
Reducing Your Attack Surface
Alert Logic
 
PDF
Stories from the Security Operations Center
Alert Logic
 
PDF
Stories from the Security Operations Center (S.O.C.)
Alert Logic
 
PPTX
Pentesting Android Apps
Abdelhamid Limami
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
BeyondTrust
 
New definition for APT
Richard Stiennon
 
PASTA: Risk-centric Threat Modeling
Craig Walker, CISSP
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
 
Computer virus
Ankita Shirke
 
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
 
Realities of Security in the Cloud
Alert Logic
 
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
Realities of Security in the Cloud
Alert Logic
 
Security hole #5 application security science or quality assurance
Tjylen Veselyj
 
00. introduction to app sec v3
Eoin Keary
 
Mobile security services 2012
Tjylen Veselyj
 
Threat modelling with_sample_application
Umut IŞIK
 
Realities of Security in the Cloud - CSS ATX 2017
Alert Logic
 
Application Security Vulnerabilities: OWASP Top 10 -2007
Vaibhav Gupta
 
Web Application Security
Abdul Wahid
 
Reducing Your Attack Surface
Alert Logic
 
Stories from the Security Operations Center
Alert Logic
 
Stories from the Security Operations Center (S.O.C.)
Alert Logic
 
Pentesting Android Apps
Abdelhamid Limami
 
Ad

Similar to Threat management lifecycle in ottica GDPR (20)

PDF
How to protect your corporate from advanced attacks
Microsoft
 
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Paula Januszkiewicz
 
PPT
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
PPT
Network Security Attacks, and Solutions.
gregtap1
 
PPT
Network Security. Different aspects of Network Security.
gregtap1
 
PPT
Network security
Akhilesh Jain
 
PDF
CSF18 - Incident Response in the Cloud - Yuri Diogenes
NCCOMMS
 
PDF
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
PPT
Volume And Vectors 090416
Anthony Arrott
 
ODP
Risk assesment IT Security project
Stefan Fodor
 
PPTX
Presentation for information security & hacking
faizanmalik255119
 
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
PPTX
Week Topic Code Access vs Event Based.pptx
ArjayBalberan1
 
PPT
Software Security Testing
srivinayak
 
PPTX
Seceon’s Comprehensive Cybersecurity Platform - Seceon.pptx
CompanySeceon
 
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
PPTX
3rd Party Cyber Security: Manage your ecosystem!
NormShield, Inc.
 
PPT
Exchange Conference (Philadelphia) - Exchange 2007 Security
Harold Wong
 
PPT
Ironport Data Loss Prevention
dkaya
 
How to protect your corporate from advanced attacks
Microsoft
 
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Paula Januszkiewicz
 
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Network Security Attacks, and Solutions.
gregtap1
 
Network Security. Different aspects of Network Security.
gregtap1
 
Network security
Akhilesh Jain
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
NCCOMMS
 
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
Volume And Vectors 090416
Anthony Arrott
 
Risk assesment IT Security project
Stefan Fodor
 
Presentation for information security & hacking
faizanmalik255119
 
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Week Topic Code Access vs Event Based.pptx
ArjayBalberan1
 
Software Security Testing
srivinayak
 
Seceon’s Comprehensive Cybersecurity Platform - Seceon.pptx
CompanySeceon
 
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
3rd Party Cyber Security: Manage your ecosystem!
NormShield, Inc.
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Harold Wong
 
Ironport Data Loss Prevention
dkaya
 
Ad

More from Jürgen Ambrosi (20)

PDF
Discover AI with Microsoft Azure
Jürgen Ambrosi
 
PDF
IBM Cloud Platform
Jürgen Ambrosi
 
PDF
Laboratori virtuali
Jürgen Ambrosi
 
PDF
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Jürgen Ambrosi
 
PDF
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
Jürgen Ambrosi
 
PDF
Power BI Overview e la soluzione SCA per gli Atenei
Jürgen Ambrosi
 
PDF
HPC on Azure for Reserach
Jürgen Ambrosi
 
PPTX
Gruppo di lavoro ICT - attività 2019
Jürgen Ambrosi
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PPTX
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Jürgen Ambrosi
 
PPTX
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Jürgen Ambrosi
 
PPTX
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Jürgen Ambrosi
 
PPTX
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Jürgen Ambrosi
 
PPTX
Le soluzioni tecnologiche per il disaster recovery e business continuity
Jürgen Ambrosi
 
PPTX
Le soluzioni tecnologiche per il Copy Data Management
Jürgen Ambrosi
 
PDF
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
Jürgen Ambrosi
 
PPTX
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
Jürgen Ambrosi
 
PDF
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Jürgen Ambrosi
 
PPTX
Veritas - Software Defined Storage
Jürgen Ambrosi
 
PPTX
Le soluzioni tecnologiche a supporto della normativa GDPR
Jürgen Ambrosi
 
Discover AI with Microsoft Azure
Jürgen Ambrosi
 
IBM Cloud Platform
Jürgen Ambrosi
 
Laboratori virtuali
Jürgen Ambrosi
 
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Jürgen Ambrosi
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
Jürgen Ambrosi
 
Power BI Overview e la soluzione SCA per gli Atenei
Jürgen Ambrosi
 
HPC on Azure for Reserach
Jürgen Ambrosi
 
Gruppo di lavoro ICT - attività 2019
Jürgen Ambrosi
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Jürgen Ambrosi
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Jürgen Ambrosi
 
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Jürgen Ambrosi
 
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Jürgen Ambrosi
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Jürgen Ambrosi
 
Le soluzioni tecnologiche per il Copy Data Management
Jürgen Ambrosi
 
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
Jürgen Ambrosi
 
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
Jürgen Ambrosi
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Jürgen Ambrosi
 
Veritas - Software Defined Storage
Jürgen Ambrosi
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Jürgen Ambrosi
 

Recently uploaded (20)

PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
PPTX
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
CDH. pptx
AneetaSharma15
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 

Threat management lifecycle in ottica GDPR

  • 1. Threat Management Lifecycle Antonio Formato – Threat Management [email protected] +39 331 7350 247 @anformato
  • 2. User opens email attachment or clicks on a URL DETECT Attacker steals sensitive data Exploitation of the endpoint Malicious apps and data Advanced threats and abnormal behavior Compromised user credentials Advanced threats to hybrid workloads Attacker installs backdoor to gains persistency Escalates privileges, steels credentials Attackers explores the network and moves to find sensitive data Attacker accesses sensitive data User inserts USB drive Browse to a website
  • 3. User browses to a website User runs a program Office 365 ATP Email protection User receives an email Opens an attachment Clicks on a URL + Windows Defender ATP End Point protection Brute force an account Reconnaissance Lateral Movement Domain Dominance ATA +Azure ATP Identity protection Maximize detection coverage throughout the attack stages ! ! ! Exploitation Installation Command and Control channel C:
  • 4. Office 365 Advanced Threat Protection
  • 5. Protect your data Advanced threat protection: Time of click protection for malicious links Web servers perform latest URL reputation check Rewriting URLs to redirect to a web server. User clicking URL is taken to EOP web servers for the latest check at the “time- of-click”
  • 6. Protect your data Advanced threat protection: Sandboxing technology for malicious attachments Sandboxing
  • 7. Protect your data Advanced threat protection: URL detonation SandboxingEmail with link Link added to reputation server
  • 8. Protect your data Threat protection extends to your entire Office 365 ecosystem Email is only one attack vector Threat protection has extended coverage Microsoft enables security for multiple office workloads Office 365
  • 9. Protect your data Advanced threat protection for your collaboration workloads Sandboxing and detonation • anonymous links • companywide sharing • explicit sharing • guest user activity collaboration signals • malware in email + SPO • Windows Defender • Windows Defender ATP • suspicious logins • risky IP addresses • irregular file activity threat feeds • users • IPs • On-demand patterns (e.g. WannaCry) activity watch lists Leverage Signals Apply Smart Heuristics Files in SPO, ODB and Teams 1st and 3rd party reputation Multiple AV engines SharePoint OneDrive Microsoft Teams
  • 10. Protect your data Advanced security for your desktop clients Improve your security against advanced threats, unknown malware, and zero-day attacks Protect users from malicious links with time-of-click protection Safeguard your environment from malicious documents using virtual environments Word Excel PowerPoint
  • 11. Unified Platform for Endpoint Security
  • 18. *Listed as one of the leaders in the “Ovum Decision Matrix”
  • 27. Behavioral Analytics (Interaction Map) Detection for known attacks and issues Advanced Threat Detection Piattaforma on-premise per il rilevamento di attacchi avanzati prima che essi causino danni
  • 29. Abnormal resource access Account enumeration Net Session enumeration DNS enumeration SAM-R Enumeration Abnormal working hours Brute force using NTLM, Kerberos, or LDAP Sensitive accounts exposed in plain text authentication Service accounts exposed in plain text authentication Honey Token account suspicious activities Unusual protocol implementation Malicious Data Protection Private Information (DPAPI) Request Abnormal VPN Abnormal authentication requests Abnormal resource access Pass-the-Ticket Pass-the-Hash Overpass-the-Hash Malicious service creation MS14-068 exploit (Forged PAC) MS11-013 exploit (Silver PAC) Skeleton key malware Golden ticket Remote execution Malicious replication requests Abnormal Modification of Sensitive Groups Advanced Threat Analytics Reconnaissance ! ! ! Compromised Credential Lateral Movement Privilege Escalation Domain Dominance
  • 30. Abnormal Behavior  Anomalous logins  Remote execution  Suspicious activity Security issues and risks  Broken trust  Weak protocols  Known protocol vulnerabilities Malicious attacks  Pass-the-Ticket (PtT)  Pass-the-Hash (PtH)  Overpass-the-Hash  Forged PAC (MS14-068)  Golden Ticket  Skeleton key malware  Reconnaissance  BruteForce  Unknown threats  Password sharing  Lateral movement
  • 31. INTERNET ATA GATEWAY 1 VPN DMZ Web Port mirroring Syslog forwarding SIEM Fileserver DC1 DC2 DC3 DC4 ATA CENTER DB Fileserver ATA Lightweight Gateway :// DNS
  • 33. A comprehensive, intelligent security solution that brings the visibility, real-time control, and security you have in your on-premises network to your cloud applications. ControlDiscover Protect Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
  • 34. Discover and assess risks Protect your information Detect threats Control access in real time Identify cloud apps on your network, gain visibility into shadow IT, and get risk assessments and ongoing analytics. Get granular control over data and use built-in or custom policies for data sharing and data loss prevention. Identify high-risk usage and detect unusual behavior using Microsoft threat intelligence and research. Manage and limit cloud app access based on conditions and session context, including user identity, device, and location. 101010101 010101010 101010101 01011010 10101