Better security posture with flexible, connected safeguards
BP has deployed Microsoft Azure Active Directory (Azure AD) and Microsoft Intune to help safeguard identities and access for its corporate users. “We consider cybersecurity one of BP’s high-priority group risks,” says Hodgkinson. “We have to make sure that we are managing information appropriately and applying the right controls around that to protect against loss or misuse.”
After implementing Microsoft Cloud App Security, the company used the solution’s native integration with Azure AD to identify risky authentications, such as impossible travel, that BP had limited visibility into before. “Using the combination of Cloud App Security and Azure AD helps us detect unusual patterns of behavior, expand more risk-based checks, and enforce user access, granting it only to devices and locations that we know are right,” says Eaton.
Now that BP has adopted Office 365, it can move data from employee devices to Microsoft OneDrive for Business Online, where employees store, share, and easily recover files on their own in a secure cloud environment. BP is now able to classify, protect, and discover, and where appropriate, automatically apply protection, so the company can control who has access to sensitive files, even when a file is shared externally. “We see Azure Information Protection as a really easy way for our employees to classify information at the point of creation. We just need to make sure security is intuitive and easy to use,” says Hodgkinson.
“For example, with the business-to-business collaboration features of Azure AD, we can now use Microsoft Teams to collaborate with third parties much more easily and give them access to the data that we want to share, knowing we’ve safeguarded our data,” adds Eaton.
BP uses the integrated threat protection products in Microsoft 365 and the Enterprise Mobility + Security E5 suite to gain valuable detection, protection, and response capabilities as part of the company’s multilayered defense.
“Given our strategy to digitally transform using native technologies underpinned by secure platforms, we recognized that we needed to take the best of all Microsoft products, which are combined in Microsoft 365 E5,” says Hodgkinson. These products work together to alert BP on potential threats and provide a comprehensive picture of an attack timeline across the company’s devices, applications, and users. “As an example, we use a combination of Azure AD with conditional access and Cloud App Security to block high-risk accesses,” Hodgkinson continues.
BP is also working closely with Microsoft to integrate Windows Defender Advanced Threat Protection into its security information and event management (SIEM) framework and generate deeper and earlier insights on cyberthreats to its estate—with no performance impact on employees.
“We use Microsoft 365 management tools to deploy and update capabilities with less need to touch individual endpoints. And we’ve been teaming up with Microsoft to help shape future enhancements, like consolidated configuration tools that make management even easier,” says Hodgkinson.