Microsoft Azure Security Protect everything end to end Aan Sulistiyo Cloud Consultant
Security is shaping the world and impacting every organization Russian hackers are preparing for a new campaign in Ukraine A spring cyber-offensive is about to be unleashed
Ransomware attacking companies (Indonesia)
Your enterprise is transforming Data Endpoints Identities Cloud apps Workloads Networks
Your enterprise is transforming Cloud apps Company-owned devices Identities Remote employees Data Endpoints Customers Home office Personal device Partner device Workloads Partners Networks On-premises
Complexity requires advanced security Cloud apps Company-owned devices Identities Remote employees Data Endpoints Customers Home office Personal device Partner device Workloads Partners On-premises ! ! ! ! Networks Infrastructure is highly distributed Threats are not shared across vendors More vendors require more people to manage Tools are not integrated nor interoperable Multi-vendor costs are unsustainable
We lead with end-to-end protection Microsoft Security Cloud platforms Multicloud Rounded corner guide Security services Threat protection Cloud security Identity and access management Microsoft Security Network access and security Data security Posture and risk management Endpoint security and management Device OSs Multiplatform
A Leader in Security A Leader in four Gartner ® Magic Quadrant ™ reports A Leader in six Forrester Wave™ categories A Leader in seven IDC MarketScape reports Gartner and Magic Quadrant are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment, Doc #US48306021. November 2021 IDC MarketScape: Worldwide Modern Endpoint Security for Small and Midsize Businesses 2021 Vendor Assessment, Doc #48304721. November 2021 IDC MarketScape: Worldwide Advanced Authentication for Identity Security 2021 Vendor Assessment, Doc #US46178720, July 2021 I DC MarketScape: Worldwide eDiscovery Early Case Assessment Software 2022 Vendor Assessment, Doc #US48970222, October 2022
The Microsoft difference End-to-end protection that is best of breed and best of suite Industry-leading AI that defends at machine speed and scale World-class threat intelligence driven by 65 trillion native signals
Driving business outcomes, securely Maintain brand reputation and customer trust Realize the value of your security investments Optimize limited resources and free up your employees Power your AI transformation b y preventing security breaches through vendor consolidation and integrated solutions by reducing redundant capabilities through automation w ith cloud-native solutions to scale innovation
Let us help you on your journey Microsoft Security Security services Threat protection Cloud security Identity and access management Microsoft Security Network access and security Data security Posture and risk management Endpoint security and management
Next steps
We lead with end-to-end protection Microsoft Security Copilot Cloud platforms Multicloud Microsoft Defender Microsoft Sentinel Microsoft Entra Microsoft Purview Microsoft Priva Microsoft Intune Rounded corner guide Device OSs Multiplatform
The odds are against today’s defenders 4,000 Password attacks per second <90Mins Median time for an attacker to access your private data if you fall victim to a phishing email 3.5M Global shortage of skilled cybersecurity professionals
How Microsoft supports you: More than 10,000 defenders Sec Ops Team Disaster Recovery Team SOC Analysts Threat Intelligence team Tracking 250+ unique nation-states, cybercriminals, and other threat actors
Your enhanced security team Cloud security Incident response Microsoft and third-party product vulnerabilities Fraud Nation-state threats Malware Botnet attacks Security research and intelligence IoT Security Global intelligence Cybersecurity policies Hardware security Firmware security Offensive security Phishing Breach recovery Ransomware
Increasing visibility to proactively identify threats “Our entire estate is covered because of the telemetry we receive across Microsoft 365. It’s all available through a single pane of glass, and that has been critical to raising proactiveness and improving our security posture.” Piotr Pociecha Product Owner Read the customer stories for ING ,
Investments in security FY22 FY24 ++ Acquired Refirm Labs, CloudKnox , RiskIQ $20B Cybersecurity Investments over 5 years Partnering with White House Microsoft Defender for Endpoint Microsoft Priva Launch Microsoft Purview Launch Microsoft Security Experts Microsoft Entra Launch Microsoft Defender for Business Microsoft Defender Threat Intelligence L aunch Announced $20B moment Microsoft Secure Microsoft Security Copilot Launch Microsoft Security Service Edge Launch XDR Forrester Wave SIEM Gartner MQ Access Management Gartner MQ Security Analytics Platform For rester Wave Endpoint P rotections Platform Gartner MQ Sentinel SOAR Leader KuppingerCole Identity and Access Management Gartner MQ Defender for Cloud as CNAPP representative Gartner Data Security Platform For rester Wave Cloud Security For rester Wave Email Security For rester Wave Endpoint IDC Market Share
300+ product innovations in the past 12 months and counting Transforming threat protection and cloud security Secure, connected endpoint management and identity Data security for today’s world The AI-powered future of Security Microsoft Defender Threat Intelligence in Microsoft 365 Defender Microsoft Intune Suite Microsoft Entra governance controls Adaptive protection in Microsoft Purview Microsoft Security Copilot
We are the world leader in security Achieving $20B security revenue in 2022 Protecting 860K organizations in 120 countries Analyzing 65T threat signals every day Investing $20B in cybersecurity research and development over the next five years Tracking 300+ unique nation-states, cybercriminals, and other threat actors Blocked 70B attacks last year
Microsoft Defender + Microsoft Sentinel Threat protection Stop threats across your entire organization Secure all clouds, all platforms Get leading integrated protection Deliver rapid, intelligent response Extend your team with security experts Cloud security Get integrated protection for your multicloud resources, apps and data Strengthen your security posture Defend against evolving threats Control access to critical apps and resources Build secure apps from the start Microsoft is the only company that can bring together threat protection (XDR + SIEM) and cloud native security (CNAPP)
Microsoft Entra Secure access Identity and access management across your digital landscape Risk-based adaptive policies Seamless experience for any user Unified identity management and access to any app Simpler identity and access lifecycle Visibility and control Govern any identity and any resource with permissions across multicloud See all identities and resources Detect and right-size unused or excessive permissions Automate least privilege everywhere Identity verification Verify credentials based on decentralized identity standards Create trust with verifiable credentials Onboard and recover accounts faster Secure access to apps Gives individuals control of their data
Microsoft Purview Data security Secure data across its lifecycle, wherever it lives Protect sensitive data wherever it is Prevent accidental data sharing Manage insider risks Data governance Govern data seamlessly to empower your organization Map data across your estate Make data easily discoverable Manage data sharing and access Risk and compliance Manage critical risks and regulatory requirements Manage compliance and privacy Investigate policy violations Reduce risk with built-in automation
Microsoft Priva Privacy management Safeguard personal data and build a privacy resilient workplace Identify critical privacy risks and conflicts Automate privacy operations and responses to subject rights requests Empower employees to make smart data handling decisions
Microsoft Intune Endpoint management See, secure, and manage all endpoints in one place Manage any device with a single, unified tool Protect data both on company-owned and BYO endpoints Power better end user experiences
Microsoft Security Copilot Coming soon… Security-specific generative AI Defend at machine speed Synthesize data into actionable insights Respond to incidents faster Get predictive guidance Address the talent gap
Microsoft Security Copilot Preview customer “Microsoft is spearheading a transformative shift in security operations center (SOC) processes and operations at a truly remarkable speed. By fully integrating these cutting-edge AI technologies, they are pioneering a leap so momentous that by December 2024, SOC operations from 2021 may seem prehistoric in comparison. The surge in productivity could be unparalleled. At Bridgewater, we are thrilled to be helping Microsoft on this voyage, collaboratively propelling Security Copilot’s full potential to the forefront of the industry.” —Igor Tsyganskiy , President, Bridgewater
Microsoft Security Experts Defender Experts for Hunting Proactive, managed threat hunting Extend your SOC with 24/7 managed threat hunting Threat hunting across endpoints, identity, email and cloud apps On-demand help from Defender Experts. Defender Experts for XDR Managed XDR that goes beyond the endpoint Defender Experts triage alerts and investigate on your behalf Defender Experts take action alongside your team Assigned analyst from onboarding through engagement Incident Response Expert help before, during and after an attack Remove bad actors from your environment Build resilience for future attacks Mend defenses after a breach
Microsoft Security helps you protect more with less 60 % savings by consolidating a patchwork of vendors for a comprehensive solution from Microsoft* Be more efficient Unify your tools, consolidate your licenses, and cast aside redundant contracts and consultants. Be more effective AI and automation help you detect and respond faster and more accurately to attacks and insider risks. Be more unified Increase SecOps efficiency with a unified SIEM and XDR experience that improves visibility across identities and endpoints * Savings based on publicly available estimated pricing for other vendor solutions and Web Direct/Base Price shown for Microsoft offerings.
Getting to the up to 60% savings Examples of multi-vendor standalones Microsoft Security Compliance ($33) Security ($30) $63 per user Identity and Access Management Intrusion detection, investigation, prevention, and threat intelligence Email protection Endpoint Protection and Response Cloud Access Security Broker Compliance Management Search and eDiscovery; Auditing (Advanced) Insider Risk Management; Access Control Information Protection and Governance $39 more per user $24 per user Microsoft 365 E5 Compliance add-on to Microsoft 365 E3 Microsoft 365 E5 Security add-on to Microsoft 365 E3 Full suite Microsoft 365 E3 ($12) ($12) 60% savings Up to Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
Power your AI transformation with the Microsoft Cloud Amplify human ingenuity with a copilot for everyone Deliver transformational experiences by building your own intelligent apps Safeguard your business and data with the most trusted AI platform
Microsoft Security Copilot The first generative AI security product that empowers SOC analysts to defend their organizations at machine speed and scale Product integrations & telemetry Machine learning Threat intelligence Skills Product knowledge Data Best practices
Microsoft Security Copilot Defending at machine speed “It takes us three minutes to do a task that used to take at least a few hours” Enable response in minutes, not hours Simplify the complex with natural language prompts and easy reporting Catch what others miss with deeper understanding of your enterprise Upskill your security talent with cyber-trained generative AI - Private preview customer
Security Copilot boosting your SOC team Security posture management Discover whether your organization is susceptible to known vulnerabilities and exploits. Prioritize risks and address vulnerabilities with guided recommendations. Incident response Surface an ongoing incident, assess its scale, and get instructions to begin remediation based on proven tactics from real-world security incidents Security reporting Summarize any event, incident, or threat in seconds and prepare the information in a ready-to-share, customizable report for your desired audience
Open AI + Microsoft Security Most advanced general models Open AI Microsoft Security Hyperscale AI infrastructure Cyber-trained model Evergreen threat intelligence Cyber skills and promptbooks + + + The Microsoft Security Copilot advantage
Security Copilot working with Microsoft Security Microsoft Defender for Endpoint Monitor devices in real-time Detect and prevent threats Control policy and access Respond to incidents and hunt Microsoft Sentinel Manage logs Detect advanced threats Monitor and alert in real-time Get compliance and reporting Microsoft Intune Manage device inventory Enforce configurations and policies Deploy and update software Deliver conditional access Security Copilot Run queries using natural language Prepare reports, summaries, and graphs Upskill teams via prompts and guidance Reverse engineer malware Enrich alerts Run queries using natural language Prepare reports, summaries, and graphs Upskill teams via prompts and guidance Reverse engineer malware Enrich alerts Enrich incidents Run queries using natural language Prepare reports, summaries, and graphs Upskill teams via prompts and guidance Reverse engineer malware Enrich alerts Enrich incidents Assess security posture of devices + +
Built with security, privacy, and compliance Your data is your data Your data is not used to train the foundation AI models Your data is protected by the most comprehensive enterprise compliance and security controls
Grounded in responsible AI principles Reliability and safety Fairness Privacy and security Inclusiveness Accountability Transparency Microsoft’s responsible AI principles Building blocks to enact principles Tools and processes Training and practices Rules Governance
Powered by data that is unique to you and your organization Security Copilot Organizational security data Security Copilot data Microsoft Threat Intelligence data
Operated with simple natural language queries Human Security Copilot Prompt Submits a prompt Planner Determines initial context and builds a plan using all the available skills Build Context Executes the plan to get the required data context to answer the prompt Responding Combines all data and context and the model will work out a response Response Receives response Formats the data
Built on AI model trained for security Large language model (LLM) pretrained on trillions of points of security-specific telemetry and threat intelligence Works with natural language queries and requires no knowledge of KQL Processes any text-based security data and requires no parsers or data standardization Designed to improve with use; guided by user feedback
Private preview customer feedback “Security Copilot is allowing us to re-envision security operations. It will be critical in helping us close the talent gap.” “Microsoft is spearheading a transformative shift in SOC processes and operations at a truly remarkable speed. The surge in productivity could be unparalleled.” “We are excited about what we have seen from Microsoft on Security Copilot. These capabilities can help companies stay ahead of future threats.”