Be More Secure & Confident - Digital Health

Transcription

Be More Secure & ConfidentIn A World Of Near TotalMicrosoft DependencyImportant factors for the NHS toconsider when moving to M365

Max LinscottSenior ProductMarketing Manager8 Years In Email Security

J. Peter Bruzzese 8x awarded Microsoft MVP (Exchange/Office 365/Office Apps and Services) Co-Founder of ClipTraining.com and ConversationalGeek.com Technical author with over a dozen books sold internationally Technical speaker for Techmentor, Connections, MEC and TechEd/Ignite Journalist for MSExchange.org, Redmond Magazine (and others) Journalist for InfoWorld (Enterprise Windows column) and Petri.com Instructor for Pluralsight on Exchange 2010/2013/2016/O365 courses Mimecast Strategic Technical Consultant and Techvangelist

An Essential Companion To Microsoft#1 Resilience Partner For More Than20,000 Office 365 Customers 2020 Mimecast. All Rights Reserved.In a world of neartotal dependencyWe help yousolve Microsoft’sintractable problem4

Where are we now?

100 Days of Covid 26.3% 55.8%90%Spam & OpportunisticDetectionsMalicious URLDetectionsBreaches attributedto human error 35.6% 30.3%Pharma sTop targetedindustries 2020 Mimecast. All Rights Reserved.Mimecast TI – “100 days of Covid”6

A Pretty Untenable Situation 2020 Mimecast. All Rights Reserved.Load & Expectation onHealthcare globallyResource and budgetfor cyber & digitalHealthcare as criticalnational infrastructureRansomware &malicious activityLegislation & governancecriteria to meetAdoption & dependenceon technology7

Download the report for more 2020 Mimecast. All Rights Reserved.8

Finally Some Good News! 2020 Mimecast. All Rights Reserved.9

Microsoft 365 is Part Of The vityMicrosoft365AzureOffice 365 Windows 10Email/ExchangeIdentitySharePointTeams 2020 Mimecast. All Rights Reserved.OneDriveMicrosoft has developedthe greatest businessproductivity toolkit inthe history of mankind10

A problem Microsoft cannot fixHomogeneity leaves you vulnerableAttack SurfaceIncreasedIncentiveAdoption & FeaturesDependence onSingle VendorImpact & Riskof BreachAttention FromCyber CriminalsAttention & Targeting From Malicious Actors 2020 Mimecast. All Rights Reserved.Purpose BuiltAttacks11

A problem Microsoft cannot fixHomogeneity leaves you vulnerable94%220 MillionBusiness Users & MoreSecurity FeaturesAdoption & FeaturesCyber attacks startwith email*2019Microsoft #1Spoofed Brand**Attention & Targeting From Malicious Actors 2020 Mimecast. All Rights Reserved.*Verizon Data Breach Report 2019 **AntiPhishing Working Group12

You’ve seen it, we’ve seen it, hackers see it 2020 Mimecast. All Rights Reserved.13

Mimecast Email Risk Assessment (ESRA)Mimecast Email Risk Assessment finds email security issuesnot identified by Office 365 overall at 15.6 %and Office 365 with ATP at 25.9%* 2020 Mimecast. All Rights Reserved.* Mimecast ESRA Quarterly Report March 202014

Email Needs More SE Labs Efficacy Test 2020SEG & TTPBoth E3 & E5Gartner clients report dissatisfactionwith natively available email securitycapabilities in Microsoft*Cybercriminals keep producing newways to bypass Microsoft protectionsystems, including ATP and Safe Links.** 2020 Mimecast. All Rights Reserved.*Gartner Market Guide for Email Security 2019 **Tech Target 2019 ***TechValidate 2019***15

M365 The Intractable Email Security Problem94%Email is the most essential & universal business tool,it is the most utilized part of M365Unsurprisingly, email remains the #1 attack vector94% of attacks start with email300MMicrosoft 365’s adoption success makesM365 customers the #1 target for cyber criminalsDespite Microsoft’s improved security,cyber criminals are proving themselves up tothe challenge by continuing to leverage emailIt is unrealistic for Microsoft to face this aloneWe are here, to beat the bad guys together 2020 Mimecast. All Rights Reserved.16

Even Microsoft Doesn't Stand A yMicrosoft365AzureOffice 365 Windows 10SharePoint 2020 Mimecast. All Rights Reserved.OneDriveEmailRemains TheMostPopularAttack VectorUnique O365Phishing URLsDaily**MaliciousActors ityTeams 1.7BEstimatedBEC losses2019*222*FBI ICR Public Service Announcement 2019 **Vade Secure17

.And It’s Not Just At The Perimeter tyMicrosoft365AzureOffice 365 Windows 10Email/Exchange90%Threats & Data Leaks AreCaused By CarelessEmployees*71%Organizations ReportMalicious Activity SpreadBetween Users By Email**88%Enterprises ExperiencedSpoofing Of BusinessPartners Or Vendors**IdentitySharePointTeams 2020 Mimecast. All Rights Reserved.OneDrive*Mimecast: 100 days of Covid **Mimecast: State of Email Security 2019AttacksWithinYourNetworkAttacksOn YourBrand18

Let’s talk about the ways you are vulnerableA multiplicity of attack vectors Spam Targeted Attacks Human Error Internal Compromise Lateral Spread Brand Exploits Email Domain Spoofing Not Integrated Not Automated 2020 Mimecast. All Rights Reserved.19

And how we address those attack vectorsMimecast Email Security 3.0 – A pervasive protection strategy SecureSpam Email Gateway Targeted ThreatAttacksProtection Human ErrorInternal Email ProtectInternal CompromiseAwareness TrainingLateral Spread DMARCAnalyzerBrand Exploits BrandExploit ProtectEmail DomainSpoofing Not Integrated APIs Ecosystem Not Automated 2020 Mimecast. All Rights Reserved.20

And what you don’t get with MicrosoftThe Mimecast edge 2020 Mimecast. All Rights Reserved. Static file AnalysisFull Emulation SandboxReal-Time URL AnalysisBrowser IsolationUnlimited Policy Granularity Awareness TrainingMessageControlAdvanced Outbound Protection Brand Exploit ProtectDMARC AnalyzerThreat Labs & Vulnerability Research Embedded in the EcosystemEnabling Custom IntegrationsVendor Agnostic21

More than email security. It’s cyber resilience.What’s your resilience strategy?Total DependencyOn A Single ProviderWeb Threats& Shadow ITLegal &Compliance RisksWhat happens if my data iscorrupted or lost?How do I keep my employeesfrom visiting dangerous sites?Can I deliver rapid andaccurate eDiscovery?What happens when myemail is unavailable?How do I stop threats beforethey even reach my endpoint?Is my critical data independentand immutable? 2020 Mimecast. All Rights Reserved.22

More than email security. It’s cyber resilience.What’s your resilience strategy?TotalResilienceDependencyTotalOn ADependency&SingleRecoveryProviderIndependent continuityCompliant & securecloud to cloud back-upIndependent post compromisemitigation & recovery 2020 Mimecast. All Rights Reserved.Web Threats& Shadow ITItLegal & &ComplianceComplianceRisksData ProtectionStop threats before theyreach the networkIndependent andimmutable data storageTotal visibility into all webactivity and cloud app useAccurate, consistent andrapid search resultsConsistent protection acrossemail & web securityRetention management &advanced e-discovery23

Born in the cloudCloud-native cyber resilience platformAntivirusAntispamAdvanced Targeted AttacksPhishing & Security TrainingBrand Protection &Domain AnalysisCategory-DefiningCyber Resilience PlatformAT THE PERIMETERINSIDE THE NETWORKBEYOND THE PERIMETERORCHESTRATED RESILIENCE20032014 - 201820192020 2020 Mimecast. All Rights Reserved.24

Mimecast Solution FrameworkRelentless Protection. Resilient World.Mimecast Solution FrameworkEmail Security 3.0Zone 1AT YOUR PERIMETERResilience ExtensionsSecure Email GatewayContinuity& Targeted ThreatSync & RecoverCONTINUITY & RECOVERYProtectionLarge File SendInternal Email ProtectEmailSecurity 3.0WEB THREATS & SHADOW ITWeb SecurityZone 2INSIDE YOUR NETWORKResilienceExtensionsAwareness TrainingSecure MessagingPRIVACY & ENCRYPTIONPrivacy PackZone 3BEYOND YOUR PERIMETERDMARC AnalyzerBrand Exploit ProtectEcosystemAPIs 2020 Mimecast. All Rights Reserved.Archive& E-DiscoveryGOVERNANCE & COMPLIANCEThreatIntelligence25

STAY RESILIENT IN YOUR NEW CLOUDProtect your email with industry leading security#1 ResiliencePartner For MoreThan 20,000 Office365 CustomersDeploy a “second lock to pick” for threat actorsTrain your employees to strengthen your human firewallProtect your brand and domain beyond your perimeterMimecast in the Public SectorIntegrate rich threat intelligence into your security ecosystem 300 Public Sector Customers 500,000 Public Sector UsersKeep email flowing even when Microsoft is downLocal Presence & Data SovereigntyAutomate independent post compromise mitigation UK Data CentersUK SupportUK Account ManagementUK EngineeringMake email compliance fast & easyExtend protection with web security & shared intelligence 2020 Mimecast. All Rights Reserved.26

OXFORD HEALTH NHS FOUNDATION TRUSTAfter migrating to Office 365, Oxford Health NHS Foundation Trust is now usingMimecast’s Targeted Threat Protection features to safeguard against cyber attackstargeting its 8, 000 staff via their email as an entry point to the organisation."We had been manually intervening to protect the organisation from these attacks but themove to Office 365 provided the perfect opportunity to add a further layer of automated securityto operations. We were able to use most out of the box settings and have subsequentlycustomized protection, allowing for problematic messages and senders to be dealt with withoutneeding to compromise global security settings.It's time saved that gives our users more time to spend on supporting or delivering ourorganisation's primary mission - providing care for patients."- Colin Ingham, Server and Systems Consultant, Oxford Health NHS Foundation Trust 2020 Mimecast. All Rights Reserved.27

THANK YOU

M365 The Intractable Email Security Problem Email is the most essential & universal business tool, it is the most utilized part of M365 Unsurprisingly, email remains the #1 attack vector 94% of attacks start with email Microsoft 365's adoption success makes M365 customers the #1 target for cyber criminals Despite Microsoft's improved security,