SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Four generations in the workforce
for the first time in history
AI makes work accessible to those
of all abilities
Inclusive
50% of the world’s data was
created in the past two years
72% of workers will work
remotely by 2020
50k corporations attacked
every month
Trends defining work today
Data rich Flexible Vulnerable
Building a modern workplace
Identify digital leadership
Promote digital-first culture
Change management
People
Create an innovation pipeline
Build responsive corporate culture
Improve collaboration
Processes
Embrace digital innovation
Enable insights from data
Develop agile and secure IT
Technology
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Back-End Front-end
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
A secure, intelligent, and complete solution to empower your employees
Microsoft 365
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
An unparalleled foundation for
Microsoft AI
Data
Vast graph dataset comprised of knowledge from Bing, LinkedIn,
Office, and more to give you unique insights and keep you safe on
a trusted platform.
Cloud
The power of Azure brings software and hardware together to build
a cloud optimized for AI.
Algorithms
Pioneering breakthrough advancements and reaching milestones in
vision, speech recognition, natural language processing, and
machine translation.
470B
Emails processed per
month
420B
Office user interactions
observed per month
100M
Excel charts created
per month
6.5T
Threats signals analyzed
daily
560M
PowerPoint slides
created per month
World
knowledge
Individual
knowledge
Microsoft Graph
One of the largest graphs of human activity at work ever created
Microsoft
Graph
Organizational
knowledge
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Cloud-native
capabilities provide
simplicity
Fewer vendors and
products to manage
Less end-user friction
and resistance
Lower integration costs
Reduced blind spots



The most compliant platform
Cross-cloud intelligence
Comprehensive enterprise-class technology
Identity & access
management
Threat
protection
Network
Security
Data & information
protection
Security
management
Azure
Security
Azure Active Directory
Multi-Factor Authentication
Role Based Access Control
Azure Security Center
Microsoft Antimalware for Azure
Micro Segmentation (VNET,
Service Endpoints, NSG/ASG)
Application Gateway
(WAF), Azure Firewall
DDoS Protection Standard
Virtual WAN
(ExpressRoute, VPN)
Encryption (Disks, Storage, SQL)
Azure Key Vault
Confidential Computing
Azure Security Center
Azure Log Analytics
Microsoft
365
Azure Active Directory
Windows Hello
Credential Guard
Microsoft Defender Advanced
Threat Protection
Office 365 Advanced Threat
Protection
Azure Advanced Threat
Protection
Microsoft Cloud App Security
Azure Information Protection
Office 365 Data Loss Prevention
Microsoft Information
Protection
BitLocker
Microsoft Cloud App Security
Secure Score
Microsoft security and
compliance center
+ Partner Solutions
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
GovernanceProductivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
InformationConditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Audio Conferencing
Phone System
Azure Active Directory Plan 2
Windows Defender Advanced Threat
Protection
Office 365 Advanced Threat Protection
P1 & P2
Azure Advanced Threat Protection
Azure Information Protection P2
Microsoft Cloud App Security
Advanced eDiscovery, Customer Lockbox,
Advanced Data Governance, Service
Encryption with Customer Key, Office 365
Privileged Access Management
Power BI Pro
Windows Enterprise
Office client apps (Word, Excel PowerPoint,
OneNote, Access)
Office Mobile Apps and
Office Online
Outlook
Exchange
Teams
Skype for Business
SharePoint
Yammer
OneDrive for Business
Microsoft Stream
Sway for Office 365
PowerApps & Flow
Planner
To-do
Microsoft 365 Admin Center
Microsoft Intune
Windows Autopilot, Fine Tuned User
Experience, and Windows Analytics
Device Health
System Center Configuration Manager
Windows Hello, Credential Guard and
Direct Access
Azure Active Directory Plan 1
Microsoft Advanced Threat Analytics
Windows Defender Antivirus and
Device Guard
Office 365 Data Loss Prevention
Windows Information Protection and
BitLocker
Azure Information Protection P1
Microsoft Secure Score
Microsoft Security and Compliance Center
MyAnalytics
Microsoft 365 E5
Microsoft 365
Windows 10 + Office 365 + EMS
Microsoft 365 E3
The world’s leading brands are more
productive with
Why choose Microsoft
Most common areas for vendor displacement
30+ third-party solutions that could be replaced*
Security
Microsoft Threat Protection, Microsoft Cloud App Security, and Advanced Message Encryption can replace products
such as Proofpoint, Mimecast, Symantec, McAfee, Crowdstrike, Carbon Black, FireEye, Netskope, titus, etc.
Identity Azure Active Directory can replace products such as Okta, Sailpoint, SAP, janrain, etc.
BI Power BI can replace products such as Tableau, Qlik, etc.
Voice Phone System can replace solutions like Cisco PBX, Cisco Spark, Avaya, Nortel, Shoretel, etc.
MDM Intune can replace products like AirWatch, Good, MobileIron, XenMobile, etc.
Team Collaboration Teams can replace solutions like Slack, Google, Workplace by Facebook, IBM, Jabber, Jive, Zoom etc.
File Shares OneDrive for Business can replace products like Box, Dropbox, Google Drive, etc.
Audio Conferencing Audio Conferencing can replace ACP solutions like Intercall, AT&T, Verizon, Cisco CallMe, etc.
Data Governance Data governance capabilities can replace products like OpenText, Gimmal Records Management, etc.
eDiscovery Advanced eDiscovery capabilities can replace products like Lighthouse, ProofPoint, etc.
* Rackspace accelerates global collaboration and saves $411,000 with Office 365
Vendor consolidation – Office 365 E3 to Microsoft 365 E3
$12 PER USER
Microsoft 365 E3
Step Up from Office 365 E3
Office 365 E3 Suite
3rd Party Solutions
you may be using today
Mobile Device Management
Mobile Application Management
($9)
Multi-factor authentication ($7)
Identity and Access Management ($5)
Adaptive Authentication
($12)
Classifications, Labels and Permissions ($3)
MDOP
App Virtualization | BitLocker Management
Advanced Group Policy Management
User profile Virtualization | Diagnostics and recovery
($2)
Windows Defender AV ($3)
Direct Access and Device Level VPN ($3)
BitLocker ($2)
Desktop Analytics ($1)
Windows Defender Application Guard
Windows Defender application control
Windows Defender Credential Guard
Windows Virtual Desktop
Enterprise
Mobility & Security E3
Windows Enterprise E3
$35 PER USER
$23 PER USER
Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
Vendor consolidation - Microsoft 365 E5 to Microsoft 365 E5
$108 PER USER
Advanced BI ($40)
Analytics
Cloud PBX
Audio Conferencing
($19)
Meetings & Calling
Search and eDiscovery; Auditing
Information Protection and Governance
Encryption
Access Control
($24)
Compliance
Identity and Access Management
Intrusion detection, investigation, prevention,
and threat intelligence
Email protection
Endpoint Protection and Response
Cloud Access Security Broker
($25)
Security
Examples of multi-vendor standalones
$83 PER USER
$25 PER USER
Microsoft 365 E5 step up
from Microsoft 365 E3
Full suite
Web direct/base price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
Get started today
Book a workshop
• Security Workshop to advance your security strategy
• Compliance Workshop to discover your data risks
• Teamwork Assessment, which includes a Meetings
Workshop for more effective meetings
Go to Microsoft365.com to learn more
Get onboarding and adoption assistance with Razor
Technology
Contact Information
© 2020 Razor Technology, LLCwww.razor-tech.com
David Rosenthal
VP & General Manager
Digital Business
@DavidJRosenthal
Slideshare
Blog: www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Cell: 215.801.4430
Office: 866.RZR.DATA
LETS KEEP IN TOUCH

Mais conteúdo relacionado

Mais procurados

Creating an Enterprise AI Strategy
Creating an Enterprise AI StrategyCreating an Enterprise AI Strategy
Creating an Enterprise AI StrategyAtScale
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanDavid J Rosenthal
 
Azure Active Directory
Azure Active DirectoryAzure Active Directory
Azure Active DirectorySovelto
 
Microsoft 365 business presentation
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentationGordon Pong
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 
Office 365 Migration Planning
Office 365 Migration PlanningOffice 365 Migration Planning
Office 365 Migration PlanningCredera
 
Microsoft Dynamics 365 - Intelligent Business Applications
Microsoft Dynamics 365 - Intelligent Business ApplicationsMicrosoft Dynamics 365 - Intelligent Business Applications
Microsoft Dynamics 365 - Intelligent Business ApplicationsDavid J Rosenthal
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxceyhan1
 
Supercharging your Data with Azure AI Search and Azure OpenAI
Supercharging your Data with Azure AI Search and Azure OpenAISupercharging your Data with Azure AI Search and Azure OpenAI
Supercharging your Data with Azure AI Search and Azure OpenAIPeter Gallagher
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Adopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceAdopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceKevin Hakanson
 
Accenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfAccenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfRajvir Kaushal
 

Mais procurados (20)

Office 365 migration
Office 365 migrationOffice 365 migration
Office 365 migration
 
Creating an Enterprise AI Strategy
Creating an Enterprise AI StrategyCreating an Enterprise AI Strategy
Creating an Enterprise AI Strategy
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by Atidan
 
Azure Active Directory
Azure Active DirectoryAzure Active Directory
Azure Active Directory
 
Microsoft 365 business presentation
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentation
 
Data Governance for Enterprises
Data Governance for EnterprisesData Governance for Enterprises
Data Governance for Enterprises
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Office 365 Migration Planning
Office 365 Migration PlanningOffice 365 Migration Planning
Office 365 Migration Planning
 
Microsoft Dynamics 365 - Intelligent Business Applications
Microsoft Dynamics 365 - Intelligent Business ApplicationsMicrosoft Dynamics 365 - Intelligent Business Applications
Microsoft Dynamics 365 - Intelligent Business Applications
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Data Mesh
Data MeshData Mesh
Data Mesh
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptx
 
Supercharging your Data with Azure AI Search and Azure OpenAI
Supercharging your Data with Azure AI Search and Azure OpenAISupercharging your Data with Azure AI Search and Azure OpenAI
Supercharging your Data with Azure AI Search and Azure OpenAI
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Microsoft-Office-365-Brochure
Microsoft-Office-365-BrochureMicrosoft-Office-365-Brochure
Microsoft-Office-365-Brochure
 
Adopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceAdopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with Confidence
 
Accenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfAccenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdf
 

Semelhante a Foster Employee Engagement and Create a Digital Culture Through Microsoft Modern Workplace

Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdfSerbanTeron
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 

Semelhante a Foster Employee Engagement and Create a Digital Culture Through Microsoft Modern Workplace (20)

Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdf
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 

Mais de David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 

Mais de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Foster Employee Engagement and Create a Digital Culture Through Microsoft Modern Workplace

  • 1.
  • 2. Four generations in the workforce for the first time in history AI makes work accessible to those of all abilities Inclusive 50% of the world’s data was created in the past two years 72% of workers will work remotely by 2020 50k corporations attacked every month Trends defining work today Data rich Flexible Vulnerable
  • 3. Building a modern workplace Identify digital leadership Promote digital-first culture Change management People Create an innovation pipeline Build responsive corporate culture Improve collaboration Processes Embrace digital innovation Enable insights from data Develop agile and secure IT Technology
  • 4. Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04 Back-End Front-end
  • 5. Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04
  • 6. Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04 A secure, intelligent, and complete solution to empower your employees Microsoft 365
  • 7. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 8. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 9. An unparalleled foundation for Microsoft AI Data Vast graph dataset comprised of knowledge from Bing, LinkedIn, Office, and more to give you unique insights and keep you safe on a trusted platform. Cloud The power of Azure brings software and hardware together to build a cloud optimized for AI. Algorithms Pioneering breakthrough advancements and reaching milestones in vision, speech recognition, natural language processing, and machine translation.
  • 10. 470B Emails processed per month 420B Office user interactions observed per month 100M Excel charts created per month 6.5T Threats signals analyzed daily 560M PowerPoint slides created per month World knowledge Individual knowledge Microsoft Graph One of the largest graphs of human activity at work ever created Microsoft Graph Organizational knowledge
  • 11. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 12. Cloud-native capabilities provide simplicity Fewer vendors and products to manage Less end-user friction and resistance Lower integration costs Reduced blind spots
  • 13.
  • 15. The most compliant platform
  • 17. Comprehensive enterprise-class technology Identity & access management Threat protection Network Security Data & information protection Security management Azure Security Azure Active Directory Multi-Factor Authentication Role Based Access Control Azure Security Center Microsoft Antimalware for Azure Micro Segmentation (VNET, Service Endpoints, NSG/ASG) Application Gateway (WAF), Azure Firewall DDoS Protection Standard Virtual WAN (ExpressRoute, VPN) Encryption (Disks, Storage, SQL) Azure Key Vault Confidential Computing Azure Security Center Azure Log Analytics Microsoft 365 Azure Active Directory Windows Hello Credential Guard Microsoft Defender Advanced Threat Protection Office 365 Advanced Threat Protection Azure Advanced Threat Protection Microsoft Cloud App Security Azure Information Protection Office 365 Data Loss Prevention Microsoft Information Protection BitLocker Microsoft Cloud App Security Secure Score Microsoft security and compliance center + Partner Solutions
  • 18. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 19. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 20. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & GovernanceProductivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive InformationConditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 21. Audio Conferencing Phone System Azure Active Directory Plan 2 Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection P1 & P2 Azure Advanced Threat Protection Azure Information Protection P2 Microsoft Cloud App Security Advanced eDiscovery, Customer Lockbox, Advanced Data Governance, Service Encryption with Customer Key, Office 365 Privileged Access Management Power BI Pro Windows Enterprise Office client apps (Word, Excel PowerPoint, OneNote, Access) Office Mobile Apps and Office Online Outlook Exchange Teams Skype for Business SharePoint Yammer OneDrive for Business Microsoft Stream Sway for Office 365 PowerApps & Flow Planner To-do Microsoft 365 Admin Center Microsoft Intune Windows Autopilot, Fine Tuned User Experience, and Windows Analytics Device Health System Center Configuration Manager Windows Hello, Credential Guard and Direct Access Azure Active Directory Plan 1 Microsoft Advanced Threat Analytics Windows Defender Antivirus and Device Guard Office 365 Data Loss Prevention Windows Information Protection and BitLocker Azure Information Protection P1 Microsoft Secure Score Microsoft Security and Compliance Center MyAnalytics Microsoft 365 E5 Microsoft 365 Windows 10 + Office 365 + EMS Microsoft 365 E3
  • 22. The world’s leading brands are more productive with
  • 24. Most common areas for vendor displacement 30+ third-party solutions that could be replaced* Security Microsoft Threat Protection, Microsoft Cloud App Security, and Advanced Message Encryption can replace products such as Proofpoint, Mimecast, Symantec, McAfee, Crowdstrike, Carbon Black, FireEye, Netskope, titus, etc. Identity Azure Active Directory can replace products such as Okta, Sailpoint, SAP, janrain, etc. BI Power BI can replace products such as Tableau, Qlik, etc. Voice Phone System can replace solutions like Cisco PBX, Cisco Spark, Avaya, Nortel, Shoretel, etc. MDM Intune can replace products like AirWatch, Good, MobileIron, XenMobile, etc. Team Collaboration Teams can replace solutions like Slack, Google, Workplace by Facebook, IBM, Jabber, Jive, Zoom etc. File Shares OneDrive for Business can replace products like Box, Dropbox, Google Drive, etc. Audio Conferencing Audio Conferencing can replace ACP solutions like Intercall, AT&T, Verizon, Cisco CallMe, etc. Data Governance Data governance capabilities can replace products like OpenText, Gimmal Records Management, etc. eDiscovery Advanced eDiscovery capabilities can replace products like Lighthouse, ProofPoint, etc. * Rackspace accelerates global collaboration and saves $411,000 with Office 365
  • 25. Vendor consolidation – Office 365 E3 to Microsoft 365 E3 $12 PER USER Microsoft 365 E3 Step Up from Office 365 E3 Office 365 E3 Suite 3rd Party Solutions you may be using today Mobile Device Management Mobile Application Management ($9) Multi-factor authentication ($7) Identity and Access Management ($5) Adaptive Authentication ($12) Classifications, Labels and Permissions ($3) MDOP App Virtualization | BitLocker Management Advanced Group Policy Management User profile Virtualization | Diagnostics and recovery ($2) Windows Defender AV ($3) Direct Access and Device Level VPN ($3) BitLocker ($2) Desktop Analytics ($1) Windows Defender Application Guard Windows Defender application control Windows Defender Credential Guard Windows Virtual Desktop Enterprise Mobility & Security E3 Windows Enterprise E3 $35 PER USER $23 PER USER Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
  • 26. Vendor consolidation - Microsoft 365 E5 to Microsoft 365 E5 $108 PER USER Advanced BI ($40) Analytics Cloud PBX Audio Conferencing ($19) Meetings & Calling Search and eDiscovery; Auditing Information Protection and Governance Encryption Access Control ($24) Compliance Identity and Access Management Intrusion detection, investigation, prevention, and threat intelligence Email protection Endpoint Protection and Response Cloud Access Security Broker ($25) Security Examples of multi-vendor standalones $83 PER USER $25 PER USER Microsoft 365 E5 step up from Microsoft 365 E3 Full suite Web direct/base price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
  • 27. Get started today Book a workshop • Security Workshop to advance your security strategy • Compliance Workshop to discover your data risks • Teamwork Assessment, which includes a Meetings Workshop for more effective meetings Go to Microsoft365.com to learn more Get onboarding and adoption assistance with Razor Technology
  • 28. Contact Information © 2020 Razor Technology, LLCwww.razor-tech.com David Rosenthal VP & General Manager Digital Business @DavidJRosenthal Slideshare Blog: www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Cell: 215.801.4430 Office: 866.RZR.DATA LETS KEEP IN TOUCH