SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
David J. Rosenthal, CEO, Atidan
August 31, 2016
Microsoft Briefing Center, NYC
Easy add-on to EMS or Office 365 - or as a stand-alone service
Get enterprise-grade security and control for your small
business … without the enterprise-grade price
Credential Guard*,
Managed User Experience
AppLocker management
with Device Guard*
Get best-in-class security and
control. Safeguard your data and
devices and get greater levels of
control and flexibility. We can work
with you to determine how to
implement these solutions
in the way that best
suits your
business
App-V
customized device strategy
single point of contact
comprehensive management and support
Small IT staff or no IT staff at all?
No problem. Let us deploy,
manage, and secure your
devices so you can focus on
more strategic priorities
– like growing your
business.
scalable IT
subscription-based access
seamless upgrades
licensing reassignment.*
per-user licensing
Reduce capital expenses,
pay only for the number of
users you need, and spend
less time managing devices
with a simple, flexible
subscription licensing
process
cloud-based provisioning
CHALLENGES
Processes highly-sensitive data:
Physical therapy clinic
Develops software in-house:
Investment firm
Aspiring to issue an IPO:
Micro-brewery
Security features such as Device Guard, AppLocker, and Credential Guard
provide advanced protection against identity theft, hackers, and other
cybersecurity threats.
Using Managed User Experience they can easily customize and lock down the
user experience on a Windows tablet for patient self check-in, allowing front
desk staff to focus on other tasks.
Their in-house IT Pro is able to offload tasks such as device and service
configuration, subscription ordering, and device support to their partner via
partner-managed IT, freeing up her time to focus on more strategic priorities.
HOW WINDOWS 10 ENTERPRISE HELPS:
PROFILE: A group of 10 privately owned physical therapy clinics
providing outpatient physical therapy to an underserved community.
They only have one in-house IT employee.
CRITICAL NEEDS:
• Protecting patient records and privacy
• Managing secure access to sensitive data across multiple offices
with limited IT resources
Investment advisors are able to stay productive during onsite visits – using
virtualized applications to execute orders and access reports – with App-V,
which makes sensitive financial data accessible from a secure, central server.
Features such as Device Guard and Credential Guard help keep client
financial data and proprietary in-house software safe both in the office and on
mobile devices.
Their IT partner is able to leverage the powerful features in Windows
Enterprise – along with tools such as Microsoft Intune – to monitor devices,
network traffic, data integrity and provide detailed compliance reports on a
regular basis.
HOW WINDOWS 10 ENTERPRISE HELPS:
PROFILE: A small investment advisory firm providing wealth
management consulting and services. They use their own proprietary
software for portfolio analysis and risk management and have only
one part-time IT person on staff.
CRITICAL NEEDS:
• Keeping client financial data secure
• Ensuring advisors stay productive while on the go
• Complying with SEC requirements
Investment firm
They can easily customize and lock down the user experience on a Windows
tablet for specific tasks, such as the tableside ordering and front-of-house
seating applications, using Managed User Experience.
They are able to ensure that all of their products meet strict quality standards
by keeping critical quality control systems up and running with the help of
their IT Partner, who troubleshoots issues and make repairs quickly if needed.
With subscription-based access, their partner can handle routine tasks such
as onboarding new employees and managing devices. And with per-user
licensing, they can cut costs by installing Enterprise E3 only on the devices
that need it.
HOW WINDOWS 10 ENTERPRISE HELPS:
PROFILE: A local micro-brewery distributes its product in both online
and brick and mortar retail stores nationwide. Due to recent gains in
market share, they are considering issuing an IPO. They have no in-
house IT staff.
CRITICAL NEEDS:
• Adhering to food safety regulations
• Meeting pre-IPO financial reporting requirements
• Ensuring each product meets strict quality standards
Micro-brewery
mobile device management (MDM) service
We can help you maximize the
benefits of Windows 10 Enterprise E3
by making sure you have the right
tools and infrastructure in place like:
latest PC hardware
Active Directory Group Policy
Pay as you
go
Simplified ITBest-in-class
security
Does your business process sensitive data, operate in a
regulated industry, or develop software in-house? Or is your
business publicly traded? If so, get the increased security,
controls and IT support that you need with Windows 10
Enterprise E3. Delivered as a cloud service and managed by
your Microsoft Partner.
Microsoft empowers your users with best-in-class productivity across devices while providing IT
security & control.
Windows
Enterprise E3
Enterprise
Mobility Suite
Office 365
These products can help your organization grow and stay
agile while controlling costs with:
Value:
save by licensing
users instead of
devices
Manageability:
eliminate the need to
count devices, for
easier purchasing
and compliance
Flexibility:
scale up or down
depending on your
needs with no need
to commit up front
We’re the expert in Windows
and cloud deployments:
Supporting point #1 (e.g.,
how many years experience, etc.)
Supporting point #2
Supporting point #3
And we can help you integrate
Microsoft cloud services with your
on-premise infrastructure:
Supporting point #1
Supporting point #2
Supporting point #3
Arrange a time for us to take the next step
and evaluate whether Windows 10
Enterprise E3 is a good fit for your business
Learn more about Windows Enterprise
Edition
Partner: add a link to your website and/or
customer success story here
New Per User Licensing Model:
• Simple and consistent license management based on users,
eliminating the need for device counting
• Easier to stay compliant
• Re-assign licenses as needed
• Align the management of your device licenses with other cloud-
based services, such as Office 365
Windows Enterprise with
Software Assurance
x86 PC/Mac
Per Device (Traditional Model)
Deployed on the desktop
Windows 10 Enterprise E3
x86 PC/Tablet PC/Mac Tablet/Phone/Chromebook
(RT/WinPhone/iOS/Android)
Per User (New Model)
Deployed in the cloud Per-User Pricing for Windows 10 Enterprise E3:
(Partner: list your pricing and any other related information here)
• Pricing point #1
• Pricing point #2
• Pricing point #3
Enterprise-grade security
Windows Hello*
Windows Information Protection (to be delivered in the future)
BitLocker
Credential Guard
Device Guard
AppLocker Management
Managed User Experience
Deployment flexibility and enhanced controls
Dynamic Provisioning
Current Branch for Business
Mobile Device Management
Azure Active Directory Domain Join
Domain Join and Group Policy
Windows Store for Business
Windows Update
Windows Update for Business
Client Hyper-V
Remote Desktop
App-V
UE-V
Branch Cache
Direct Access
Telemetry
COIN
Simplified licensing
Subscription-based Access
Per-User Licensing
Central Partner Portal
Cloud-based Provisioning
Partner-managed IT
Additionalprotection,
flexibility,andcontrol
Pro Enterprise
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
David J. Rosenthal, CEO
Office365@Atidan.com
1-215-825-5045 ex. 5001

Mais conteúdo relacionado

Mais procurados

Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinarSentri
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessRobert Crane
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Ronni Pedersen
 
Productivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopProductivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopDavid J Rosenthal
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 

Mais procurados (20)

Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Productivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern DesktopProductivity and Security with Microsoft 365 and the Modern Desktop
Productivity and Security with Microsoft 365 and the Modern Desktop
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 

Destaque

Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityLatha Menon
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small BusinessesVivastream
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Alison Gianotto
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Spiceworks
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...Motty Ben Atia
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersdigitallibrary
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...exponential-inc
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security programmatt_presson
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Spiceworks
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesFundera
 

Destaque (18)

Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and Security
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small Businesses
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it matters
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
 
Box.net overview
Box.net overviewBox.net overview
Box.net overview
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 

Semelhante a Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by Atidan

DeskCenterUSA New 9.7 IT Management Suite & Webcast
DeskCenterUSA New 9.7 IT Management Suite & WebcastDeskCenterUSA New 9.7 IT Management Suite & Webcast
DeskCenterUSA New 9.7 IT Management Suite & WebcastDeskCenter USA Inc.
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Managementguest64c5c
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Karim Maalouf I.T Services
Karim Maalouf I.T ServicesKarim Maalouf I.T Services
Karim Maalouf I.T ServicesKarim Maalouf
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoservePixel
 
Communications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersCommunications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersRiccardo Romani
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborProtected Harbor
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseRobert Crane
 
Introduction to Microsoft 365
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365Robert Crane
 

Semelhante a Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by Atidan (20)

DeskCenterUSA New 9.7 IT Management Suite & Webcast
DeskCenterUSA New 9.7 IT Management Suite & WebcastDeskCenterUSA New 9.7 IT Management Suite & Webcast
DeskCenterUSA New 9.7 IT Management Suite & Webcast
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
FullyManaged
FullyManagedFullyManaged
FullyManaged
 
Omzig
OmzigOmzig
Omzig
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Karim Maalouf I.T Services
Karim Maalouf I.T ServicesKarim Maalouf I.T Services
Karim Maalouf I.T Services
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
ManageEngine Overview 2023.pdf
ManageEngine Overview 2023.pdfManageEngine Overview 2023.pdf
ManageEngine Overview 2023.pdf
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
 
Communications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersCommunications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service Providers
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
 
Frontline Support IT
Frontline Support ITFrontline Support IT
Frontline Support IT
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
StarManagedServices
StarManagedServicesStarManagedServices
StarManagedServices
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
 
Introduction to Microsoft 365
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365
 

Mais de David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 

Mais de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by Atidan

  • 1. David J. Rosenthal, CEO, Atidan August 31, 2016 Microsoft Briefing Center, NYC
  • 2. Easy add-on to EMS or Office 365 - or as a stand-alone service Get enterprise-grade security and control for your small business … without the enterprise-grade price
  • 3. Credential Guard*, Managed User Experience AppLocker management with Device Guard* Get best-in-class security and control. Safeguard your data and devices and get greater levels of control and flexibility. We can work with you to determine how to implement these solutions in the way that best suits your business App-V
  • 4. customized device strategy single point of contact comprehensive management and support Small IT staff or no IT staff at all? No problem. Let us deploy, manage, and secure your devices so you can focus on more strategic priorities – like growing your business. scalable IT
  • 5. subscription-based access seamless upgrades licensing reassignment.* per-user licensing Reduce capital expenses, pay only for the number of users you need, and spend less time managing devices with a simple, flexible subscription licensing process cloud-based provisioning
  • 6. CHALLENGES Processes highly-sensitive data: Physical therapy clinic Develops software in-house: Investment firm Aspiring to issue an IPO: Micro-brewery
  • 7. Security features such as Device Guard, AppLocker, and Credential Guard provide advanced protection against identity theft, hackers, and other cybersecurity threats. Using Managed User Experience they can easily customize and lock down the user experience on a Windows tablet for patient self check-in, allowing front desk staff to focus on other tasks. Their in-house IT Pro is able to offload tasks such as device and service configuration, subscription ordering, and device support to their partner via partner-managed IT, freeing up her time to focus on more strategic priorities. HOW WINDOWS 10 ENTERPRISE HELPS: PROFILE: A group of 10 privately owned physical therapy clinics providing outpatient physical therapy to an underserved community. They only have one in-house IT employee. CRITICAL NEEDS: • Protecting patient records and privacy • Managing secure access to sensitive data across multiple offices with limited IT resources
  • 8. Investment advisors are able to stay productive during onsite visits – using virtualized applications to execute orders and access reports – with App-V, which makes sensitive financial data accessible from a secure, central server. Features such as Device Guard and Credential Guard help keep client financial data and proprietary in-house software safe both in the office and on mobile devices. Their IT partner is able to leverage the powerful features in Windows Enterprise – along with tools such as Microsoft Intune – to monitor devices, network traffic, data integrity and provide detailed compliance reports on a regular basis. HOW WINDOWS 10 ENTERPRISE HELPS: PROFILE: A small investment advisory firm providing wealth management consulting and services. They use their own proprietary software for portfolio analysis and risk management and have only one part-time IT person on staff. CRITICAL NEEDS: • Keeping client financial data secure • Ensuring advisors stay productive while on the go • Complying with SEC requirements Investment firm
  • 9. They can easily customize and lock down the user experience on a Windows tablet for specific tasks, such as the tableside ordering and front-of-house seating applications, using Managed User Experience. They are able to ensure that all of their products meet strict quality standards by keeping critical quality control systems up and running with the help of their IT Partner, who troubleshoots issues and make repairs quickly if needed. With subscription-based access, their partner can handle routine tasks such as onboarding new employees and managing devices. And with per-user licensing, they can cut costs by installing Enterprise E3 only on the devices that need it. HOW WINDOWS 10 ENTERPRISE HELPS: PROFILE: A local micro-brewery distributes its product in both online and brick and mortar retail stores nationwide. Due to recent gains in market share, they are considering issuing an IPO. They have no in- house IT staff. CRITICAL NEEDS: • Adhering to food safety regulations • Meeting pre-IPO financial reporting requirements • Ensuring each product meets strict quality standards Micro-brewery
  • 10. mobile device management (MDM) service We can help you maximize the benefits of Windows 10 Enterprise E3 by making sure you have the right tools and infrastructure in place like: latest PC hardware Active Directory Group Policy
  • 11. Pay as you go Simplified ITBest-in-class security Does your business process sensitive data, operate in a regulated industry, or develop software in-house? Or is your business publicly traded? If so, get the increased security, controls and IT support that you need with Windows 10 Enterprise E3. Delivered as a cloud service and managed by your Microsoft Partner.
  • 12. Microsoft empowers your users with best-in-class productivity across devices while providing IT security & control. Windows Enterprise E3 Enterprise Mobility Suite Office 365 These products can help your organization grow and stay agile while controlling costs with: Value: save by licensing users instead of devices Manageability: eliminate the need to count devices, for easier purchasing and compliance Flexibility: scale up or down depending on your needs with no need to commit up front
  • 13. We’re the expert in Windows and cloud deployments: Supporting point #1 (e.g., how many years experience, etc.) Supporting point #2 Supporting point #3 And we can help you integrate Microsoft cloud services with your on-premise infrastructure: Supporting point #1 Supporting point #2 Supporting point #3
  • 14. Arrange a time for us to take the next step and evaluate whether Windows 10 Enterprise E3 is a good fit for your business Learn more about Windows Enterprise Edition Partner: add a link to your website and/or customer success story here
  • 15.
  • 16. New Per User Licensing Model: • Simple and consistent license management based on users, eliminating the need for device counting • Easier to stay compliant • Re-assign licenses as needed • Align the management of your device licenses with other cloud- based services, such as Office 365 Windows Enterprise with Software Assurance x86 PC/Mac Per Device (Traditional Model) Deployed on the desktop Windows 10 Enterprise E3 x86 PC/Tablet PC/Mac Tablet/Phone/Chromebook (RT/WinPhone/iOS/Android) Per User (New Model) Deployed in the cloud Per-User Pricing for Windows 10 Enterprise E3: (Partner: list your pricing and any other related information here) • Pricing point #1 • Pricing point #2 • Pricing point #3
  • 17. Enterprise-grade security Windows Hello* Windows Information Protection (to be delivered in the future) BitLocker Credential Guard Device Guard AppLocker Management Managed User Experience Deployment flexibility and enhanced controls Dynamic Provisioning Current Branch for Business Mobile Device Management Azure Active Directory Domain Join Domain Join and Group Policy Windows Store for Business Windows Update Windows Update for Business Client Hyper-V Remote Desktop App-V UE-V Branch Cache Direct Access Telemetry COIN Simplified licensing Subscription-based Access Per-User Licensing Central Partner Portal Cloud-based Provisioning Partner-managed IT Additionalprotection, flexibility,andcontrol Pro Enterprise H H H H H H H H H H H H H H H H H H H H H H H H H H H H
  • 18. David J. Rosenthal, CEO Office365@Atidan.com 1-215-825-5045 ex. 5001