Upload
elastica-inc
View
89
Download
3
Tags:
Embed Size (px)
Citation preview
PROTECTING YOUR DATA IN OFFICE 365
Office 365 Security 2
Cloud apps are becoming an essential part of business
Cost effective
Remote access
Agility and speed
Improved Productivity
Better collaboration
...That result from your unauthorized action or lack of action when required, or from your employees, agents, contractors, or vendors, or anyone gaining access to our network by means of your passwords or equipment, or otherwise resulting from your failure to follow appropriate security practices...
Microsoft’s Policy
Microsoft will not take responsibility for your user behavior
(or security of your infrastructure or users).
(the fine print)
Security In The Cloud is a Shared Responsibility
Office 365 Security 3
4
What could go wrong?
• 1.34% of accounts were compromised
• Compromised means: account takeover, rogue (bad actor) insider, malicious data destruction, etc.
• Report highlighted threshold triggers (static) and anomalous behavior (data science) — just a sample out of 60+ factors
• This malicious activity would apply regardless of SaaS app or storage provider used, even Office 365/OneDrive
From Elastica’s Q2 2015 Shadow Data Report:
Malicious Use% of total
compromised accounts
Office 365 Security
90%of organizations lost sensitive data via file sharing
Shadow DataUse of sanctioned apps in unsanctioned ways
average cost of data breach for storage SaaS providers/company
Shadow Data
All the potentially risky data exposures lurking in sanctioned cloud apps, due to lack of knowledge of the type of data being uploaded, and how it is being shared. This can directly lead to compliance violations or sensitive data loss.
Shadow IT All the potentially risky unsanctioned Cloud Apps used in your organization, without the knowledge of IT.
Source: Elastica Q2 2015
Source: Ponemon
$13.8M
What is Shadow Data?
Office 365 Security
Who Controls Sharing?
Sharing has become democratized (no longer top-down controls)
Even file owners no longer fully control how their files are shared
Alice shares a file with Bob
Bob shares that file publicly without Alice’s knowledge
Shadow Data Goes Viral
Office 365 Security
files per user are broadly shared (average)
12.5%contain compliance related data
Shadow Data
25%Of total files stored in the cloud per user (average)
of these files
Office 365 Security
Email• S/MIME
• SSL
• A/V Scanning
Leverage O365 email to another email that supports S/MIME. However, you are also encrypting infected file attachments.
8
What about protection for:▪ Non MSFT Users▪ BYOD (non-
Windows Mobile)▪ SaaS apps/storage▪ Contractors▪ Vendors/Suppliers▪ Malware/Botnets▪ EU Directives
At-Rest Data• CCM/SOC
certifications
• Process/infrastructure
• “Lockbox”
Storage and handling data (at rest) defined by various certifications. However, does not apply to docs and data leaving O365 servers (your destination, your computer).
Doc. Control• IMS/RMS
• Containers
• Pre-file crypto
Build a security wrapper around documents. But requires same O/S and agent on both sides. Requires special client.
Scope of Office 365 Security
Office 365 Security
9
Office 365 provides base security, but you still need…
User visibility and control
Analysis of risky behavior
Automated classification
Data protection / attack mitigation
REQUIREMENT BECAUSE HOW
Compliance mandates require identification of sensitive data
Users are the biggest threat that can bypass your security controls
This is not readily seen just by A/V scanning or APT systems
Before, during, and after a breach requires fast response
Leverage data science to automatically understand content without involving humans
Real-time awareness of access and actions
Per user-graph of “normal” behavior vs. risky behavior
Complete lifecycle solution
Office 365 Security
Alice
Shared
Payroll.docxwith Bob
Using Office 365
?? ? ?
?? Alice is anExternal Collaborator
From anUnmanaged Device
The File ContainsPII Risk
From anAnomalous Location
But it’s not that simple
Data Visibility and Control
Office 365 Security
Data Science Powered™ CLOUD APP SECURITY
befo
red
uri
ng
aft
er
Office 365 Security
External and public content exposures, including compliance risks
Inbound risky content shared with employees (e.g. malware, IP, etc)
Risky users and user activities
Get a Free Shadow Data Risk Assessment
Office 365 Security
Thank You!Take the free Shadow
Data Risk Assessment
Visit us to learn how you can find risks and protect critical content in your file sharing apps.
Elastica.net
Granular Event Extraction
StreamIQ™
Inspect (even in SSL traffic) and determine specific actions being taken—all in real-time.
Slideshow Title 15
Every time you adopt a new technology, you have to secure it
You wouldn’t run your business without email…
…and you wouldn’t use email without security
As business adopts cloud apps…
…you must secure them
Automatically classify, detect and remediate content uploaded to cloud apps
17
Who Controls Sharing?
Alice shares a file with Bob
Shadow Data Goes Viral —No Way!
You Do
Office 365 Security
Who Controls Sharing?
Even file owners no longer fully control how their files are shared
Alice shares a file with Bob
Bob shares that file publicly without Alice’s knowledge
Shadow Data Goes Viral — No Way!
Office 365 Security