Microsoft announces general availability of Azure Information Protection service

Azure Information Protection

Back in June, Microsoft first announced the Azure Information Protection service that builds on existing Microsoft Azure Rights Management and their recent acquisition of Secure Islands. With Azure Information Protection, Microsoft has combined Secure Islands’ industry-leading data classification and labeling technology with Azure RMS. Today, they announced that Azure Information Protection is now Generally Available.

  • The Azure Information Protection service is GA
  • The Azure Information Protection client for Office (2010/13/16) on Windows (7/8/10) is GA
  • The HYOK feature is available in Preview
  • New mobile apps for iOS and Android replace the existing RMS Sharing Apps
  • They will be enforcing license requirements and admin rights in the Admin Portal from 10/5

Microsoft Azure Information Protection will deliver these key capabilities:

  • Classify, label and protect data at the time of creation or modification. Use policies to classify and label data in intuitive ways based on the source, context and content of the data. Classification can be fully automatic, user-driven or based on a recommendation. Once data is classified and labeled, protection can be applied automatically on that basis.
  • Persistent protection that travels with your data. Classification and protection information travels with the data. This ensures that data is protected at all times, regardless of where it is stored, with whom it is shared, or if the device is running iOS, Android or Windows.
  • Enable safe sharing with customers and partners. Share data safely with users within your organization as well as with external customers and partners. Document owners can define who can access data and what they can do with it; for example, recipients can view and edit files, but they cannot print or forward.
  • Simple, intuitive controls help users make the right decisions and stay productive. Data classification and protection controls are integrated into Office and common applications. These provide simple one-click options to secure data that users are working on. In-product notifications provide recommendations to help users make the right decisions.
  • Visibility and control over shared data. Document owners can track activities on shared data and revoke access when necessary. IT can use logging and reporting to monitor, analyze and reason over shared data.
  • Deployment and management flexibility. Protect data whether it is stored in the cloud or on-premises, and choose how your encryption keys are managed with Bring Your Own Key options.

Video demo:

Check out their website to learn more.

Some links in the article may not be viewable as you are using an AdBlocker. Please add us to your whitelist to enable the website to function properly.