O'Reilly logo

Mastering Identity and Access Management with Microsoft Azure by Jochen Nickel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Getting in touch with information protection

In the following section, we will dive into advanced Access Control for information on protection solutions.

Overview and needs

There was an interesting presentation from Dan Plastina, a product manager at Microsoft, which asked a very important question: 'Why do you seek to protect information?' The following answers were given in an actual survey:

  • 96% - Reduce leakage of data shared with others (B2B collaboration)
  • 94% - Partitioning of sensitive data from unauthorized users
  • 89% - Preventing malicious employees from leaking secrets
  • 87% - Meeting compliance requirements

Exactly because of these needs, we need to think about an information protection strategy in our solution design in order to provide the following: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required