?

Microsoft Information Protection

As information moves both inside and outside of the organization, organizations are unable to protect their sensitive data as it leaves the organization. With exponential growth of data and mobility, it is important to implement a security strategy that meets your security objectives and also meets the changing compliance and privacy requirements.

WWT Delivers Microsoft Information Protection Solutions  

As a trusted advisor, World Wide Technology (WWT) can help customers adopt the Microsoft Information Protection solution which gives customers a broad coverage across devices, apps, cloud-services and on-premise apps. With flexible protection policies, you can customize these policies to meet your unique security and compliance needs and integrations means the solution are built into the apps and services to help employees stay productive. Microsoft Information Protection is extensible, so customers get additional coverage from partners extending protection to their apps and services. 

The suite of Microsoft technologies provides a comprehensive, flexible, integrated and extensible way to protect your data across devices, apps, cloud-services and on-premises. The Azure Information Protection solution is a cloud-based solution which lets you classify, label and protect your data. Microsoft 365 Information Protection prevents accidental or inappropriate sharing of information with the Microsoft Data Loss Prevention tool. Microsoft Cloud App Security (MCAS) gives comprehensive cloud security to protect and control sensitive data in cloud apps and Windows Information Protection helps prevent leaks of important organizational data on Windows 10 devices.

Microsoft Information Protection discovers your sensitive information such as PII (Personally Identifiable Information) across a variety of locations including devices, apps, cloud services and on-premises. Sensitivity labels to files can be applied manually or automatically and data security configurations can be easily configured such as encryption, digital rights management and visual markings. View trends on sensitive data, monitor policy violations and risky behavior along with fine-tuning policies to balance security with end-user productivity. Accelerate your path to compliance by enhancing security and privacy posture to comply with regulatory requirements such as HIPAA, PCI-DSS, GLBA, GDPR, and CCPA.

Azure Information Protection

AIP is a cloud-based solution that enables organizations to discover, classify, and protect documents and emails by applying labels to content. The unified labeling client extends labeling, classification, and protection capabilities to additional file types, as well as to the File Explorer.

Microsoft 365 Data Loss Prevention

To comply with business standards and industry regulations, organizations must protect sensitive information and prevent its inadvertent disclosure. With Office 365 Security & Compliance Center, you can identify, monitor, and automatically protect sensitive information across Office 365.

Microsoft Cloud App Security

A Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services providing simple deployment.

Windows Information Protection

Helps to protect against this potential data leakage without otherwise interfering with the employee experience. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps.

The WWT Approach

During this engagement, we will partner with you to protect your data across devices, apps, cloud-services and on-premises. We will help you better understand how to identify, classify, protect and monitor data in your environment. By the end of the engagement, you will be able to:  

• Discover, classify and protect emails and documents by applying labels to content and extend protection capabilities to File Explorer.

• Comply with business standards and industry regulations such as HIPAA, PCI-DSS and GDPR; and protect sensitive information from inadvertent disclosure.

• Identify cyberthreats across all Microsoft and third-party services.

• Provide rich visibility of data travel across all your Microsoft and third-party cloud services. Protect your organization data from users utilizing unsanctioned cloud apps (Shadow IT).

• Protects against potential data leakage on enterprise owned devices and employee-owned devices without the need of   changes in your environment.

Discover

During the discovery phase we evaluate your Microsoft 365, Azure and on-premises environments. Gain a deeper understanding of your goals and objectives with the Microsoft Information Protection solutions.  

Activities:

- Understand Information Protection goals and objectives

- Verify Microsoft Information Protection subscription

- Determine architecture (Cloud-only, Hybrid, On-premises)

- Authentication model (Password hash-sync, Passthrough, ADFS)

- Multi-Factor Authentication (MFA)

- Gather endpoint data (OS, versions)

- Existing information protection solutions

- Existing M365 and Azure solutions deployed

Design

During the design phase we create deployment strategy document for selected Microsoft Information Protection solutions.

Activities:

- Microsoft Information Protection deployment strategy documentation

- High Level Documentation (HLD)

- Low Level Documentation (LLD)

- Create End-user support and training materials

- Create Admin support materials

Pilot

Utilizing your existing test tenant, we will pilot Microsoft Information Protection solutions and give your security team a hands-on experience of what the product looks like and its capabilities.  

Activities:

- Pilot Azure Information Protection

- Pilot Data Loss Prevention

- Pilot Microsoft Cloud App Security

- Pilot Windows Information Protection

Deploy

After we finalize the deployment scope, policies, rules, configuration, and deployment methods then we will setup Microsoft Information Protection solutions in your environment.  

Activities:

- Work with communications team  

- Work with Change Management or CAB  

- Create a support matrix and structure for IT Support Team

- Work with the IT Support team on escalation and SLA’s

- Deploy Azure Information Protection  

- Deploy Data Loss Prevention

- Deploy Microsoft Cloud App Security  

- Deploy Windows Information Protection

The WWT Difference

The WWT Difference

With 10+ Microsoft Gold Competencies — including Gold Cloud Productivity, Cloud Platform, and Messaging — WWT is well suited to help our customers deliver Microsoft 365 Security solutions. As critical and sensitive data travels both inside and outside of the boundaries of the organization, it is important to ensure that sensitive data is protected from accidental oversharing. Its also important to implement a security strategy that meets your security objectives and also meets the changing compliance and privacy requirements, WWT can help guide you on your information protection journey.

Microsoft 365 Security and Compliance Portfolio

Information Protection

Azure Information Protection (AIP)

Windows Information Protection

O365 Information protection + Endpoint DLP

Microsoft Defender

Microsoft Defender for O365

Microsoft Defender for Identity

Microsoft Defender for Endpoint

Microsoft Identity and Access Management

Multi-Factor Authentication (MFA)

Privileged Identity Management (PIM)

Azure AD Identity Protection and Conditional Access

Additional Capabilities

Azure Sentinel

Microsoft Security Workshop

Microsoft Compliance and Risk Workshop

Let WWT help you along your Microsoft Security Journey!