Microsoft Information Protection with Tech Data

Vendors

Microsoft

Categories
Microsoft Security contains a wealth of industry leading cybersecurity solutions, all accessible through the Microsoft CSP program. Often these security solutions are bundled together in M365 licences, but can often not be fully utilised by customers. CSP partners have a unique opportunity to protect their customers with Microsoft Security products without the need to have multiple vendors, contracts and orders. Furthermore, the inter-connectivity of the Microsoft Security suite allows for synchronicity across customers admin portals. Tech Data have developed solutions, resources and training to help enable, collaborate with, and deploy Microsoft Security solutions. In this blog, we will look into Information Protection as a pillar of Microsoft Security.

Microsoft identify four primary elements of the information protection lifecycle: Detect, classify, protect and monitor. Each step has its own set of requirements and unique considerations which this article will discuss.
First, let’s talk about the Detect phase. Detecting sensitive data is the first step. As data travels to various locations – often outside of the organisation’s environment, you want to know what sensitive data you have and where it’s located. Data may have different levels of sensitivity, and not all data needs the same level of protection.

After sensitive data has been detected, it’s important to classify the data into distinct categories so that custom controls, such as policies and actions, can be applied. Once the classification scheme is set by the organisation, policies can be configured and customised so that sensitive data such as intellectual property, customer info, health records, etc., are protected, stored and shared in a manner that adheres to the organisation’s unique requirements. Classification and labelling persists with the file and can be understood and honoured by other services, avoiding the need to reclassify and re-label throughout the file’s journey.

Classifying and labelling data often results a policy rule to apply some level of protection to sensitive data. This could be to apply certain encryption policies around who can open documents with certain sensitivity labels.

Gaining visibility into how users are using or distributing sensitive information is an important component of your information protection strategy, this is why monitoring what data is being sent, and where should be a key security concern for organisations. In the case of unexpected activity or events involving sensitive information, organisations also need to be able to respond quickly and accurately.

Microsoft’s information protection solutions addresses each of these steps. This includes protecting sensitive information across Devices, SaaS applications and cloud services, as well as on premises environments. Tech Data can help create a strong security baseline for information protection through our Modern Workplace Click-2-Run.

This article has touched the surface of Microsoft Information Protection products, there are many more to highlight, such as their Data Loss Prevention and archiving solutions. To talk about these in more detail, get in touch, or book a meeting.

Help customers to improve their security posture through classifying and encrypting important information - Tech Data can work with partners, collaboratively on the enablement and deployment of Microsoft Information Protection solutions.

To find out more about Microsoft Security, You can book 30 mins directly in my calendar here, and we can explore the Microsoft Security ecosystem in more detail. Alternatively, please reach out to the Tech Data Microsoft Team – csp@techdata.co.uk.