Making Sense of the Microsoft Information Protection Stack

Play Making Sense of the Microsoft Information Protection Stack
Sign in to queue

Description

When you look at the many information protection technologies that Microsoft offers (e.g., BitLocker, AD RMS, Exchange DLP) it can seem overwhelming. In this session, see how our information protection technologies can be deployed to work together as an integrated solution that is comprehensive in capability. We show the big picture as well as technical details particularly with new IP technologies such as Windows 8.1 Remote Business Data Removal, Device Encryption, and Microsoft Rights Management Services, just to name a few.

Tag:

Security

Day:

3

Session Type:

Breakout

Code:

WIN-B335

Room:

Grand Ballrm B

Embed

Download

The Discussion

  • User profile image
    carlospined​ag

    Multi-factor authentication must comply, at least:
    1) "something only the user knows" (aka password)
    2) "something only the user has" (a device)

    Multi-factor authentication with phone call, sms or email ARE NOT effective because communication can be "known" by the service provider or a "man in the middle".

    Phone and email are not "something only the user has"

Add Your 2 Cents