Peer to Peer Magazine

Winter 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/624538

Contents of this Issue

Navigation

Page 44 of 71

PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA 46 IDENTITY IS THE KEY THAT UNLOCKS DOORS While it would be simple to fully disconnect an enterprise from the wider Internet to establish a virtual moat, the demands of business won't allow it. Pressures are ever-increasing from clients demanding anytime anywhere access to services. If your firm won't provide that, they'll take their business elsewhere. This means attorneys and staff need ready access to firm-managed data on the go. Providing that access is at odds with securing the perimeter, but big data analysis can be employed to learn and observe behavior and classify that behavior as normal or abnormal. Microsoft's Azure Active Directory Premium service includes behavior analysis that integrates global network geographic assessment. For example, you can be instantly alerted to infeasible events, such as the same user credentials being used in two locations more quickly than transportation constraints would allow. This is the same type of analysis that financial services firms use for fraud detection, and it is becoming a baseline security expectation. OUT OF THE SHADOWS Evil may lurk around every corner of our interconnected world, but big data can shine a light on malicious attackers. Microsoft is committed to empowering individuals, corporations and governments around the world to enjoy the information security they deserve. FEATURES • Microsoft Digital Crimes Unit: news.microsoft.com/presskits/dcu • Microsoft Malware Protection Center: www.microsoft.com/security/portal/mmpc/default.aspx • Cyber Defense Operations Center: channel9.msdn.com/blogs/taste-of-premier/satya-nadella-on-cybersecurity • Advanced Threat Analytics: www.microsoft.com/en-us/server-cloud/products/advanced-threat-analytics • Azure Active Directory Premium: www.microsoft.com/en-us/server-cloud/products/azure-active-directory Be instantly alerted to infeasible events, such as the same user credentials being used in two locations more quickly than transportation constraints would allow.

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2015