Email and time management seems pretty simple, doesn’t it? You undoubtedly send and receive lots of emails every day, and you probably don’t think too much about what’s really going on behind the scenes – you trust your service provider to do the right thing and to treat your data securely. But do they? How do you know what’s really happening as messages pass from one place to another or when your device tries to send and receive?
You might not care much, thinking from the perspective of the end user, but there are a lot of people that do care, and not just those in IT security roles. Understanding that your cloud provider stores your data securely and safely, with protection from disaster or malicious actors is important to everyone. Knowing the processes and controls that exist when trying to get access to your data from a client device is important in learning to trust your provider. And knowing what your provider can do to help you and your users protect your valuable data from either deliberate or accidental loss lets you know they are there for you, and not just a service to you.
It’s this end to end story, how Microsoft 365 helps you and your users safely and securely do email and calendaring, that prompted us to come up with a series of videos from experts at Microsoft, to show what we can about what’s really going on behind the scenes.
To coincide with Microsoft Ignite 2020 we created a series of five videos to walk you through the different parts of our end to end email and calendar security and data protection story. We picked three of the smartest people we know to put together this material for you. You don’t have to watch these videos in series, but it does probably make it easier to consume, so in presentation order, here’s a bit about our three speakers.
Jeff Mealiffe – Jeff has 20 years of experience in engineering roles at Microsoft primarily focused on the Exchange Server and Exchange Online products, and now the Microsoft 365 suite. As an engineering program manager and architect, he is currently focused on improving the ways in which hundreds of millions of users connect securely and reliably to our productivity services every day via improvements to Microsoft’s infrastructure as well as close partnerships across the network solution ecosystem. You can follow Jeff on Twitter at @mealiffe..
Ross Smith IV – Ross is a 20-year veteran at Microsoft. As a program manager within engineering, Ross has spent the last 10+ years championing the needs of customers in the Exchange, Outlook, and Intune engineering teams. Prior to moving to Intune engineering, Ross spent the majority of his career within Exchange and Outlook developing the guidance and tools necessary to successfully deploy Exchange Server on-premises, as well as, help customers transition to Exchange Online. Ross now focuses on protecting mobile devices and mobile apps, like Outlook for iOS and Android. You can follow Ross on Twitter at @RossSmithIV.
Mike Paer – Mike is the PM responsible for information protection capabilities in the Microsoft 365 application suite, so he lives and breathes the technology that helps you protect your most sensitive data.
Those are our three very experienced and accomplished experts, and here are the five sessions they have recorded together with links to the videos and materials.
In this introductory session, we discuss some of the historical growth that has allowed Exchange Online to become such a trusted service for so many customers around the globe, and walk through a high-level overview of how data and service transactions are secured and managed within Exchange Online. Additionally, you’ll get some context for the four deep-dive videos that follow so you can optimize your viewing time accordingly.
This session draws an analogy between storage provided by the Exchange Online service and a physical secure vault. You’ll learn how the various layers of storage, application, physical datacenter, and connectivity all work together to ensure that the data stored in Exchange Online remains only accessible to authenticated and authorized parties, and builds a strong foundation for all of the additional tenant and user-level features and controls which are discussed in the following videos.
In this session, you will learn about the authentication mechanisms available with Exchange Online and how Azure Active Directory provides authorization mechanisms, like Security Defaults and Conditional Access, to ensure only the trusted users and devices get access to your Outlook data.
In this session, you will learn about the differences between device and application management capabilities that can be used to protect your Outlook data on devices, how device risk can be used to further evaluate the health of a device, and the solutions you should implement to protect Outlook data on managed and personal Windows 10 devices, as well as, mobile devices.
A session that covers methods for detecting highly sensitive content and the options for configuring policies that can protect it above and beyond your everyday email.
Collectively these recordings explain our end to end story; they explain why Exchange Online, Outlook, Azure Active Directory and Endpoint Manager, when paired with the right Microsoft 365 SKU provide the most secure, trustworthy and capable solution available for your email and calendaring needs.
We really hope you learn from and enjoy the recordings and we really want to hear your feedback.
The Exchange Team
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.