3. Digital transformation is
the next industrial revolution
Steam, water,
mechanical
production
equipment
Division of labor,
electricity, mass
production
Electronics,
IT, automated
production
Blurring the
physical and
the digital
divide
1784 1870 1969 2017
Industrial Revolution 4.0
4. About Vuzion
We can help make your business future proof
• A cloud aggregator
• Built on 20 years of delivering and selling
cloud services
• A rich portfolio of cloud services
• A smart ecosystem of partners
5. Vuzion GTM Model
p
Operational
Delivery
•Managed Service
•Billing & Support
Capability
Development
•Technical
•Sales
Pre-Sales
Engagement
•Technical review
•POCs & Trials
Services &
Frameworks
•Backup
•Identity
•IaaS/PaaS
Bespoke Solutions
•Solution Design
•ISV Enablement
• Help resellers build their own
solutions based around a set of
defined frameworks
• Solutions based on “finished”
services that can be resold
• Bespoke solution development
support
• Service wraps to deliver
operational efficiency
7. o Cloud and Hosting Summit 2017
o Reseller & Vuzion (Partner
Center)
o Skype for Business update
o Security as a Service
o Business Premium Update
o Q&A
19. Security As A Service
SECURE CONTENT
PROTECT CONTENT:
CREATION, TRANSIT,
CONSUMPTION
SECURE DEVICES
WORKPLACE ISSUED OR
BYOD DEVICES
GREAT EMPLOYEE
EXPERIENCE
PRODUCTIVITY WITHOUT
COMPROMISE
SECURE THE FRONT
DOOR
IDENTITY DRIVEN
SECURITY
IDENTITY IS THE NEW CONTROL PLANE:
Stickiness, Future Growth (On-Prem, SalesForce, DropBox and 2600+ other SaaS, AWS, Azure)
20. Secure the Front Door
Leaked
credentials
Infected devices
Configuration
vulnerabilities
Risk-based
policies
MFA Challenge Risky
Logins
Block attacks
Change bad credentials
Suspicious sign-in
activities
MACHINE LEARNING AND RISK PROFILING OPEN THE FRONT DOOR BASED ON RISK
Shadow IT
Risk
Assessment
User
MFA
Conditions
Location (IP range)
Device state
User group
Risk
Block access
Enforce MFA per
user/per app
Allow access
Leaked credentialsInfected devices Configuration
vulnerabilities
RISK BASED
POLICIES
MFA Challenge
Risky Logins
Block attacks
Change bad
credentials
Machine-Learning Engine
Brute force attacks Suspicious sign-in activities
EXTENSIBILITY
POWER BI,
SIEM
REPORTING APIs
NOTIFICATIONS
DATA EXTRACTS
21. Security As A Service – Enabling SKU’s
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P2
Azure Active Directory Premium P1
(included in P2)
Cloud App Security
No Pre-requisites.
Best Position with:
1. Business Premium,
2. E3
3. E5
4. Azure Deals
SECURE THE FRONT
DOOR
IDENTITY DRIVEN SECURITY
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1
Cloud App Security
Azure Information Protection P2
Microsoft Intune
Pre-requisites: Office Mobile Apps
Best Position with:
1. Business Premium,
2. E3
3. E5
SECURE CONTENT
PROTECT CONTENT: CREATION,
TRANSIT, CONSUMPTION
Azure Active Directory Premium P1
Microsoft Intune
No Perquisites.
Best Position with:
1. Business Premium,
2. E3
3. E5
SECURE DEVICES
WORKPLACE ISSUED OR BYOD
DEVICES
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1
No Perquisites, up-sell with any
Office 365 offer
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
GREAT EMPLOYEE
EXPERIENCE
PRODUCTIVITY WITHOUT
COMPROMISE
24. Packaged IP
Average Revenue: $1-$15 per
user/per month4
Margin: 65%
• SharePoint-Based Vertical Workflows
• Middleware for Hybrid
Synchronization
• Industry-specific Workflows
• Function-specific Workflows (e.g. HR,
Procurement)
• Automated O365 Telemetry
(Availability & Performance)
• Office Connectivity & Other Plug-Ins &
Add-ons
• External Portals for End Customer
Information
• Pre-Configured Dashboards
Project Services
Average Revenue: $2.5K-$15K4
Margin: 35%
• Cloud Readiness Assessment
• Solution Analysis, Scope, & Design
• Office 365 Set up and Remediation
• Simple File Server Migration
• Workflow Creation in SharePoint
• Yammer Adoption
• End User Training
Managed Services
Average Revenue: $5-$15+ per
user/per month4
Margin: 45%
• Office 365 Tenant Management
• Reactive Help Desk Support (Office, Skype for
Business, Intune, CRM Online) and interface to
MSFT.
• Performance and Application Troubleshooting
• Desktop & Device Management & Support
• Reports & View Adjustments
• Software Asset Management (licensing
management & optimization)
• Security Management & Identity Protection
• Office Client Connectivity Setup
• Mobile Device Connectivity & Management
• Web defense (restricting URLs, phishing
malware, spam)
• Hybrid Environment Support (Basic
Infrastructure)
• VoIP Maintenance
• Regulatory Compliance via Office 365
Infrastructure
Exchange Online Skype for Business OneDrive for Business SharePoint Online Yammer
Build long-term, value-added services for Office 365
Based on an average 25 seat deal
PartnerRevenue
Pitch incremental project services to
light up each Office 365 workload
post deployment
Add managed services to your Office
365 practice and become your
customer’s outsourced IT department
Create SharePoint templates and
extension apps, package as repeatable
IP and monetize
Capitalize on the
market opportunity
Insights to maximize
profitability
Managed services opportunity by
2018: $256B1
2018 projected worldwide Public IT
cloud services revenue: $127B2
Run-rate Fastest Growing Business:
$2.5B3
1. Markets and Markets : Managed Services Market worth $256.05 Billion by 2018(c)
2014 M2 COMMUNICATIONS IDC Worldwide and Regional Public IT Cloud Services 2014–
2018 Forecast Oct 2014 | Doc #251730 4. MDC Research, Microsoft Cloud
Profitability Scenarios May 2015
27. Project Services
Average Revenue: $2.5-$10K4
Margin: 35%
• Cloud Planning and Readiness
Assessment
• Solution Analysis, Scope, & Design
• Backup Deployment
• Deployment Services
• Heath Checks
• Proof of Concept
Packaged IP
Average Revenue: $2.5-$7.5K4
Margin: 65%
• Automated Monitoring, Alerting, &
Logging
• Middleware for Hybrid
Synchronization
• Automated Backups & Disaster
Recovery
• Automated Disaster Recovery Testing
• Office Connectivity & Other Plug-Ins &
Add-ons
• External Portals for End Customer
Information
• Pre-Configured Dashboards
Managed Services
Average Revenue: $2.5-$10K4
Margin: 45%
• Critical Response Support
• Azure Consumption Monitoring &
Optimization
• Performance Monitoring & Reporting
• Troubleshooting
PartnerRevenue
Microsoft Azure Azure Backup Azure Recovery
Build long-term, value-added services for Backup
64% of organizations are currently
purchasing backup and restoration
services from partners1
$30 billion worth of smartphones are
lost in the US in a year2
Nearly a third of all data stored in the
cloud is made up of backup and
recovery files3
Capitalize on the
market opportunity
Insights to maximize
profitability
Concentrate on niches to better
differentiate yourself and value-price
Look to move additional workloads
to Azure over time
Build out automated tools and own
IP to lessen reliance on project
services and boost margins
Source: 1. BCSG, 2015 The Small business revolution: Trends in SMB Cloud Adoption enquiries@bcsg.com 2. Lookout Security, March 2012, “Lookout Predicts Americans Lose $30Billion in Smartphones a Year” permissions@readwrite.com 3. Intronis Cloud backup + Recovery , 2013 “2013 State of Cloud Backup MSPs Mission the Mark” 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
33. Successful SharePoint projects are built on metadata
• SharePoint is a powerful document management system, but in order to get
the return on your investment you need rich metadata added to your
documents.
• Without metadata, users will struggle to find and organise their content and
organisations will be unable to govern the ever-growing store of information
within SharePoint.
• Whether you are migrating content into SharePoint, or looking to improve
your existing sites then metadata is the difference between a successful or
failed project.
34. Building taxonomies & adding metadata has always been a
tough job
• Building taxonomies from scratch is a time-consuming trial and error
prone process.
• Asking users to fill in metadata fields to save their documents to
SharePoint impacts productivity and creates user adoption problems.
• Migrated content will have no metadata.
35. Next-generation taxonomy creation and metadata tagging
TermSet uses Natural Language Processing and Machine Learning to add
accurate consistent metadata to SharePoint content, without placing any
burden on end users or the IT team. No manual work, it just happens.
Taxonomy Creation
Creates and maintains SharePoint taxonomies
unique to your content
Powerful natural language processing ensures
your taxonomies are accurate and always up to
date
Cloud or On Premises
Choose from a software as a service or a local
installation
Metadata Tagging
SharePoint content is automatically tagged with
rich and consistent metadata
Tagging can be part of a migration process or as
new documents are added to a library
Packed with Powerful Features
Language analysis
Document summary generation
Pattern and phrase matching
Concept classification
36. See the following benefits to your SharePoint project
Smarter SharePoint migrations
Enrich your documents with meaningful
and consistent metadata as part of your
migration project
Improve your Information Architecture
Build your SharePoint sites to reflect the
information you store and remove the
need for folders and views
Supercharge SharePoint Search
Dramatically improve SharePoint search
by providing refinable metadata to your
users
Power Compliance & Workflows
Use metadata to drive compliance
and governance of your
documents and drive workflows.
39. GDPR
What is GDPR?
General Data Protection Regulation. A
huge change for how we all handle data,
PII (Personal Identifiable Information).
What happens if non-compliant?
Up to €20M or 4% of global turnover
(which ever is greater)
When does GDPR come into force?
25th May 2018.
Who does GDPR apply to?
Any organisation who hold PII on
any other person or organisation
40. TermSet for GDPR Compliance
Address: 77 Sixth avenue
Phone number: 847-334-2345
Address: 3608 Walnut Creek Road
City: Chicago
Company: Arnold Associates
Salary: $37,500
Person: Manuel Santiago
42. Protect Data & Recover from
Disaster using Microsoft Azure
Alex McLoughlin
Union Solutions
43. About Union Managed Services
• 10 Year pedigree transforming the largest IT Infrastructure Environments
• Data Services where your customers need them, how your customers want them.
• Our expertise is Infrastructure, Data Protection and Business Recovery, with a human touch.
• We deliver managed infrastructure on premise, from our UK datacentres or in the Microsoft Azure public.
• Our sole focus is delivering business outcomes for customers in the 100 - 1,000 seat SME marketplace.
Union Solutions Limited 2017
Manage
Infrastructure
Protect Data Survive a Disaster
45. Protect Data
Union Solutions Limited 2017
What challenges do your customers face…?
• Ransomware, user error, system failure, datacentre loss, malicious intent or
degenerative IT bugs .
• Protection windows are shrinking, data is doubling, and many fail to protect data in
appropriate to need.
• Trying to compete in a global economy with tech savvy consumers that expect a 24×7
always-on service
• If they lost a significant amount of data, the business would struggle to operate
• Legacy backup software is a huge problem. Proprietary software that locks data in a
proprietary format.
47. Protect Data
Union Solutions Limited 2017
Visible
Monitored 24×7x365. Daily Exception reporting
showing compromised services and regular service
reports delivered in a language you and the
business can understand.
Specialist Expertise
Data protection has been our area of expertise for
more than 20 years.
Designed and built some of the most sophisticated
solutions for some of the most demanding
corporate environments.
Union – Data Protection as a Service
Secure and Portable
Protected data is encrypted in transit and at rest. It
never leaves your network. Historical copies needed
for compliance demands provided to you in native
format. No lock-in to proprietary software
Pay as You Grow
You pay on a consumed capacity basis. It’s an OPEX
model based on per protected GB of data, with cloud
enabled scale and economies.
Hybrid
An appliance deployed on premise, storing 31 days of
backups for Instant data restore. We replicate a copy
of your data between sites every night
48. Survive a Disaster
Union Solutions Limited 2017
What challenges are you facing…?
• A disaster can put your customer out of business.
• They need (it’s demanded) to provide evidence of continuity plans for customers of
your customers and regulated industry inspectors.
• Unfortunately, most SME organisations are still playing catch up.
• Disaster Recovery is often at the back of the budget queue:
• Cost of delivering is substantial.
• Chews up cash and profitability.
• They’ve never had a disaster (yet…)
51. Survive a Disaster
Union Solutions Limited 2017
Cloud Automated
Recover all IT services inside 60 minutes.
Instant fail-over of any VM or Physical server to the
Microsoft Azure cloud.
We operate your infrastructure services all the
time they’re running in Azure
Bespoke
We create a Dynamic DR Runbook (invocation plan
which we automated against) for each customer.
Your customers are then armed with a
demonstrable plan for customers, auditors, and
regulators.
Union – Disaster Recovery as a Service
Tested
Full test invocation every year, issuing a certificate to
publish to third parties.
Union manage the entire fail-over and fail-back
processes.
Clever technology in Azure enables us to test any
server or application for DR, at anytime
Responsive
You pay on a consumed capacity basis. It’s an OPEX
model with cloud enabled scale and economies.
RPO of 60 Minutes, RTO of 60 Minutes at an SME
price point (charged per protected VM + storage)
52. Summary
Union Solutions Limited 2017
Talk to Union and Vuzion
• Create recurring margin by selling cloud enabled managed services
• Both Products orderable through Vuzion (launching on the portal in weeks to come)
• This is a big conversation to have with customers. Multi year contracts drive
significant committed income for your organisations.
• Deal registration process locks a qualified opportunity to a Vuzion partner
• Union has marketing support and expert gun slingers ready to support your sales
effort to win business
54. Drive usage and adoption to all Microsoft
applications: SharePoint, Dynamics CRM, O365, MS
Word, Outlook, Windows, Azure
Sign anytime, anywhere, on any device
Get approvals done, faster than ever
DocuSign
Ensure secure and compliant business processes
Fastest & most secure way to make every decision
and approval digital
58. Manage digital transactions and eSignatures directly from
Microsoft applications
Office 365 and SharePoint Dynamics CRM Online Windows 10|Windows Phone
Customers can sign or send
agreements for signature from any
object in Dynamics CRM Online
Electronically send documents
for signature(s) and manage
the documents you send from
any device. Log in with Azure
AD.
59. 1,500 Documented Use Cases and Counting
– How does Office 365 fit into these use cases?
Sales Order Processing
Account Provisioning
Sales Compensation
Agreements
Referral Agreements
Reseller Agreements
Field Sales Agreements
New Customer Sign Ups
Terms and Conditions
Event Registration
Customer Communication
Approvals
Mass Mailing / Email Approvals
Customer Communication
Approvals
Brand Compliance / Audits
Event and Vendor Approvals
New Hire Paperwork
Candidate NDA
On/Off-boarding Checklist
Employee Policy Distribution &
Signature
Contractor Agreements
Non-disclosure
PTO Management
Payroll Forms
Front Desk Sign-in
Work Orders
Lease Agreements
Move In / Move Out Requests
Parking Permits
Equipment Rentals
Lien Releases
Site Passes and Onsite Waivers
Invoice Processing
Expense Reporting
Capitalization Management
Audit Sign Off
Policy Management
Inventory Signoff
Asset Transfer / Retirement
Hiring Freeze Exemption
M&A Documentation
Account Changes
Service / Work Orders
Term Changes
Self Service Requests
Compliance
Field Service
Cancellation Requests
Internal Cancellation Processing
Asset Tracking
Change Requests
Requirements Sign Off
Access Management
Incident Reporting
Production Change
Authorization
Maintenance Authorization
Order Fulfillment
Change Management
Release Management
Code Review Reporting
Requirements Acceptance
Release Scope Commitments
Project Charter Templates
NDAs
Contract Management
Internal Compliance
IP Licensing
Patent Applications
Board Minutes
Trade Name Assignment
Trademark Assignment
Finance Agreements
Purchase Orders
Statements of Work
Master Service Agreement
RFP Sign Off
Supplier Compliance
Competitive Procurement
Summaries
Sole-Source Justifications
Procurement Card Applications
60. Why
Should
You Care?
Increase deal size
for TAV. 15%
margin from MSRP
Easy to set-up,
Simple to use, No
implementation
needed
Increase initial
deal size.
Land & expand
within LoB
Average sales
cycle; deals
between 5 - 50
seats < 45 days
Average Deals
Closed Per Q; 63
SMB
Increase
adoption usage
& penetration of
MSFT
Applications
61. DOCUSIGN CONFIDENTIAL
Develop adoption with end customers on cloud based solutions
Increase the value attached to O365 with our additional services and differentiation
Stronger foot print with customers providing the ability to tackle many
LOB/expansion use cases
Increase revenue through sales and ROI for customers
DocuSign Value Drivers to Resellers
64. DOCUSIGN CONFIDENTIAL
DocuSign is the only provider with bank-grade security
Broadest Set of Security Certifications
PCI DSS 3.1
Global Security Gold
Standard: ISO 27001
Streamlined Process for EU
Privacy Law Compliance
SSAE 16 SOC 1 Type II
AT 101 SOC 2 Type II
Data Privacy
https://trust.docusign.com/en-us/
65. Try it for yourself
DOCUSIGN CONFIDENTIAL
https://secure.docusign.com/demo
66. Organisations run on email –
give it the protection it needs
Nessa Lynchehaun
Mimecast
67. Session Overview
• Introduction to Mimecast
• Solution overview: understand the platform
& problems we solve
• Maximising the opportunity for Partners
• Partner Resources
• Questions
68. Confidential |
Mimecast at a glance
Founded 2003
in London, UK
Cloud services designed to
‘Make Business Email Safer’
Over 25,000 Customers
Growing at 30% YoY
MIME
Nasdaq Traded
97% Retention Rate
Over 7 million end
users
14% Annual Turnover
Invested in R&D
Over 20 PB or Archive Data
Under Management
69.
70. Email and three critical business risks
Vulnerability to attack
Your users and email infrastructure are under constant attack from
a wide range of adversaries.
Total operational dependency
Tolerance for email downtime is almost zero as it costs money,
damages reputations and cripples business operations.
Highest concentration of corporate data
Massive volumes of your most valuable corporate data are in email.
Data loss, leakage or breach will have devastating effects.
71. Protect against Email Cyber Threat
Prevent Email Outages to Maintain Productivity
Eliminate Data Loss and Maintain Compliance
Reduce Cost and Complexity of Email Infrastructure
We help our customers …
72. Beyond the mailbox
server your business
needs…
Archiving
Email and File Storage
Compliance
e-Discovery & Legal Hold
Enterprise Search
End-User Access
Storage Infrastructure
Security
Email Gateway (MTA)
Anti Virus/Anti Spam
Anti Malware
Anti (Spear) Phishing
Email Encryption
Data Leak Prevention
Security Monitoring
& Reporting
Large File Transfer
Clustered Mail Servers
Failover Data Centers
Backup & Recovery Systems
Continuity
78. Confidential
Top Attack Vector Impacting
Global Organizations:
• Phishing
• Spear Phishing
• Whaling
• Social Engineering
79. › Mimecast › Products › Email Security › Targeted Threat Protection
Ignoring the risk of
spear-phishing
can spell disaster
Breaches
happen
Increase of
23%
since 2013
Ave. cost
of breach
$6.5m
The results can
be devastating
Ponemon, 2015
80. Confidential |
The anatomy of an
attack
Three main attack methods:
• Malicious URLs in email
• Weaponized attachments
• Impersonation attacks
40% of emails have an attachment
80% are potentially vulnerable PDF
or office docs:
~ 50% open emails and
click on links within 1 hour*
Median time to first click:
1m.22s*
233% increase in phishing
URLs tracked in 1 year**
* Verizon Data Breach Report 2015 ** Cyren Cyber Threat Yearbook 2015
*** Analysis of 1 Terabyte of Mimecast platform data, 2015
Attack Stats
3%
POWERPOINT
documents
51%
PDF
documents
9%
EXCEL
documents
17%
WORD
documents
***
81. › Mimecast › Products › Email Security › Targeted Threat Protection
Existing
anti-spam
and anti-virus
is not enough
Standard Email
Protection
Known threat
Targeted attack
Targeted attack
Spear-phishing
Protection
Threat stopped
Security breach
Attack stopped by advanced
protection layer
• Traditional email security was never
designed to stop targeted attacks
• A specialized second layer of
defense is needed to protect data
and employees
82. › Mimecast › Products › Email Security › Targeted Threat Protection
Mimecast
Targeted Threat Protection URL Protect
with URL rewriting and dynamic user awareness
Attachment Protect
with file transcription, on-demand and pre-emptive
sandboxing
Impersonation Protect
with dedicated detection of whaling and malware-less
phishing
Internal Email Protect
with file transcription, on-demand and pre-emptive
sandboxing
83. › Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
URL Protect
• All URLs in every inbound mail are
rewritten at the gateway
• On click, every click real-time
scanning of destination site
• Access is granted to clean sites
without delay. Access to
compromised sites is blocked
• Dynamic user awareness built-in -
helps build a human firewall
84. › Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
Attachment
Protect
• Pre-emptive sandbox checks email
attachments pre-delivery
• Option of innovative transcription with
on-demand sandbox
• Potentially harmful attachments
replaced with transcribed safe
versions
• Employees have instant access
to safe files
• Request original via cloud-based
sandbox if required
85. › Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
Impersonation
Protect
Name is One of my Users Names
Domain is like one of my domains
Keyword Dictionary
Reply-to-address mismatch
Newly Observed Domain
86. Confidential |
Detection and remediation of
security threats where the
sender and recipient are on
the internal network
Plus inspection of outbound emails
Internal Email Protect
87. Confidential |
Internal Email Protect
Defending against the three types of internal threats
• The Compromised Insider
• The Careless Insider
• The Malicious Insider
88. Confidential |
• Compromised Insider
– User’s credentials stolen by attacker
– Leverages organization’s web-based email to spread attack internally
or externally to partners/customers
• Careless Insider
– Sending sensitive data inappropriately via email to colleagues
• Secret projects, Excel sheets with credit cards/SSNs etc…
• Malicious Insider
– Purposely distributing malware or malicious URLs
– Selling sensitive data to outsiders
– Taking sensitive data for personal use
Example Use Cases
92. Confidential
Partner Benefits
•Unified email solution - single platform, single AdCon
•Simple licensing model – monthly buy price per user
•Happy customers - over 97% customer retention
•Exciting roadmap - massive Upsell opportunity
•Partner Portal - all the tools you need for on-boarding
and managing your customers, training and marketing
resources
93. What does our ideal
client look like?
• Any size! SaaS model allows us to
scale
• We work well with any sector, but it
helps if:
Their business relies on email for
communication
There would be a high impact with
a data breach or targeted attack
Compliance needs – data
jurisdiction, retention period, data
protection, tamperproof store
94.
95. Confidential
Partner Resources
• Mimecast Knowledge Base & Mimecast Central
https://www.mimecast.com/customer-success/
• Supporting collateral
• https://www.mimecast.com/solutions/platforms/office-365/
• Recommendations
• Technical Workshop/Demo
• Microsoft MVP Positioning Session
96. Mail server migration Spam, virus &
targeted attack
protection
Protecting sensitive &
confidential data
Protection
against email
downtime & data
loss
Email storage &
eDiscovery
Sending large files
Email access for remote users
Email
branding &
marketing
Compliance/regulation
Summary
97. Unlock a lucrative SharePoint
business, without additional
investment
Nick Benham
ICS / FLEX
98. Copyright ICS Solutions 2017
WHAT IS FLEX LITE?
Affordable business critical Microsoft technology for SMEs
99. Copyright ICS Solutions 2017
Trusted Microsoft Gold Partner for over 20 years
• Established in 1994
• Microsoft Tier 1 managed Gold Partner
• Founding Partner of the Microsoft Azure Circle
• UK’s First Office 365 Partner
• UK’s most experienced SharePoint Partner with over 500 Projects
100. Copyright ICS Solutions 2017
FLEX ENTERPRISE – 70,000 USERS AND £2.7M INVESTED
Established since September 2014
FLEX - BUILT ON EXPERIENCE AND INVESTMENT
“Speedy implementation of SharePoint was our main motivating force
for selecting FLEX….”
Tony Foot, IT Delivery Manager, WaterAid
“Rapid deployment of SharePoint was our main driving force in
selecting FLEX…...”
Debbie Jupe, Senior Project Manager, WM Housing
“FLEX has allowed our end users to be much more self-sufficient with regards
to content creation….”
Adam Doswell, Enterprise Systems Developer, Malvern Instruments
101. Copyright ICS Solutions 2017
Email
Networking
Email
Networking
Servers
Support
Collaboration
Applications Desktop
Consulting
Servers
Support
Collaboration
Applications Desktop
Consulting
HOW DO I GROW REVENUE IN A CLOUD WORLD?
Pre-cloud revenue landscape for SME partners Post-cloud revenue landscape for SME partners
Support
Consulting
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
FLEX helps partners grow customer revenue in a post cloud world
102. Copyright ICS Solutions 2017
FLEX MAKES YOU MONEY, OUT-OF-THE-BOX
You don’t need to set up a SharePoint practice
No consulting sale, FLEX is like other ISV software
Compelling customer materials are provided
FLEX is highly affordable reducing costs by up to 90%
Good margins recurring licence and services
FLEX allows partners to quickly generate margin with low investment
103. Copyright ICS Solutions 2017
SOLUTION IN A BOX MARKETING IN A BOX SELLING IN A BOX DEPLOYMENT IN A BOX
Out-of-the-box software
Best-of-Breed Intranet
Next Generation Collaboration
Digital Workplace
Easy to sell (non consulting)
Software & service pricing tool
Standard demo’s etc..
Standard collateral
Sales support
Easy to market
Pre-built campaigns
Pre-built webinars
Web content
Branded collateral
Easy to deploy
Standard deployment materials
Standard training
3rd Party deployment if needed
HOW DOES THAT WORK?
FLEX provides the partner with everything they need out-of-the-box
104. Copyright ICS Solutions 2017
WHY DO MY CUSTOMERS NEED FLEX LITE?
Small organisations have the same need to collaborate digitally with
customers, partners and employees as large organisations but a
fraction of the budget.
FLEX uses automation technology and SME business templates to
configure Office 365 and Azure to drive user adoption for a fraction of
the time and cost of doing it manually.
ENTERPRISE
FLEX Lite gives SME’s Enterprise solutions at a realistic cost
SME
105. Copyright ICS Solutions 2017
WHAT DO I GET OUT-OF-THE-BOX?
Deployment Choice 1
Traditional ManualINTRANET - INFORMATION WORKPLACE – SELF SERVICE
75 BUSINESS FORMS
50+ BUSINESS APPS
11 GENERIC
COLLABORATION APPS
Affordable business critical Microsoft technology for SMEs
7 DEPARTMENT HUBS
106. Copyright ICS Solutions 2017
WHAT CAN I DO WITH IT?
Deployment Choice 1
Traditional Manual
Affordable business critical Microsoft technology for SMEs
BUSINESS COMMUNICATION
What’s going on in the business?
Easily create news, events and
articles
SELF-SERVICE
COLLABORATION
Ability for end users to
effortlessly share and
collaborate internally and
externally
SIMPLE DOCUMENTATION AND
INFORMATION MANAGEMENT
Ability to store and find documents easily
107. Copyright ICS Solutions 2017
HOW DO I USE IT?
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Office 365 Interface Azure Interface
FLEX Business Apps
FLEX AVOIDS THE NEED TO TRAIN ORDINARY USERS IN THE OFFICE 365 OR AZURE TECHNOLOGY
Affordable business critical Microsoft technology for SMEs
108. Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Affordable business critical Microsoft technology for SMEs
109. Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Affordable business critical Microsoft technology for SMEs
110. Copyright ICS Solutions 2017
WHAT DOES IT COST?
DEPLOYMENT COSTS
FLEX Enterprise
Baseline Deployment
£37,000
FLEX Lite
Baseline Deployment
from £5,995
Affordable business critical Microsoft technology for SMEs
111. Copyright ICS Solutions 2017
Deployment Choice 1
Traditional Manual
FLEX Achieves the
following benefits:
EXAMPLES
Affordable business critical Microsoft technology for SMEs