Partners: Use this slide to introduce your company and your offerings
To provide anytime anywhere access quickly to your employees, Microsoft is introducing “Online” services. Online services is a set of enterprise class software, delivered as subscription services hosted by Microsoft, and sold through partners like us. Their goal is to create a service option for every one of their business software products. The initial set of services they are offering focus on the business productivity capabilities. The Business Productivity Online Suite, shown here, includes Exchange Online, Office SharePoint Online, Office Communications Online, and Office Live Meeting. Office Communications Online is currently available as part of the dedicated offering and a multi-tenant offering of the service will be added in early 2009.Exchange Hosted Services are attached services that include filtering, archiving, encryption and continuity.
To provide anytime anywhere access quickly to your employees, Microsoft is introducing “Online” services. Online services is a set of enterprise class software, delivered as subscription services hosted by Microsoft, and sold through partners like us. Their goal is to create a service option for every one of their business software products. The initial set of services they are offering focus on the business productivity capabilities. The Business Productivity Online Suite, shown here, includes Exchange Online, Office SharePoint Online, Office Communications Online, and Office Live Meeting. Office Communications Online is currently available as part of the dedicated offering and a multi-tenant offering of the service will be added in early 2009.Exchange Hosted Services are attached services that include filtering, archiving, encryption and continuity.
By providing the latest business productivity capabilities delivered from a single service platform, end users can truly enjoy an integrated experience. End user will be able to access these services over the web, through their laptop/desktop or mobile devices. They can also securely access these services over the internet without VPN. End user will be able to have presence awareness of their colleagues and partners and be able to collaborate seamlessly between emails, documents and over conferencing and instant messaging. From the IT administration perspective, our service will be managed from a single administration portal. Administrators will have a single place to go to view operational statistics, provision new users and track any support issues. All services will be backed by a 99.9% SLA with financial guarantees and included in each service is a premium disaster recovery service that will allow fast switch over to a geographic separated datacenter in case of primary datacenter failure. We also perform regular scheduled independent audit to ensure our service is SAS 70 compliant and highly secured. Stable, dedicated infrastructure; hosted in Microsoft datacenters99.9% guaranteed service availability with financial penaltiesDynamic scale for additional capacityIncreased agility and user productivityEvergreen technology management – the latest Microsoft technologies and releases at no additional chargeSingle sign-on experience through Active Directory synchronizationSimple, predictable monthly fees and straightforward on-boarding costsRobust business continuity/disaster recoveryStrategic relationship with Microsoft provides innovation in use of Microsoft technology and extensive insight into Microsoft products
With Microsoft Online, we can offer a suite of always up to date business productivity capabilities. This will help many of our customers that have not been able to take full advantage of Microsoft software’s integrated capabilities because of the various versions of the applications they run on premises. With Microsoft Online, they are giving end users the ability to have a wide range of methods to communicate and collaborate. Users can start from any forms of communication and switch to another. For example, an user can switch from email exchange to instant messaging and then move to a web conference or start with instant messaging and then move to email or conferencing. They will access to emails, contacts, documents whether they are online or offline such as using our Sharepoint synchronizing feature with Outlook or connect via a wide array of active sync mobile devices or through web portals.
Customers who subscribe to Microsoft Online Services will be able to simplify how they consume and manage technology. To satisfy this need, Microsoft has designed and integrated an easy to use Company Portal and Administration Center for the IT pro to help them manage, support and configure not just one , but all their Microsoft Online Services in one place. The Company Portal is design for the IT Pro to manage his/her subscriptions and trial accounts for all of their Online services. Customer can expect a consistent operational processes of learn, try, buy, use and renew. Once the service is activated, the IT Pro will manage the service via the Administration Center. Key capabilities of the Administration Center includes:Unified management from one placeUser managementCo-existence with your on-premise ExchangeAccess to data migration toolsSupport issues and trackingService HealthConfigure service settingsIn addition to IT pros, end users also want a consistent and integrated experience when they use these services. The Microsoft Online Sign-On Tool and My Company Portal make it easy for end users to mange their identity and access services their company has subscribed to.
For reasons such as data compliance, customization requirements, flexibility, etc., customer may want to deploy a hybrid approach between online and on-premise. Another key value provided by the Microsoft offering is the flexibility to choose your deployment model between on-premises and online - by geography, workload or roles. In this example, the customer decides to deploy Exchange Server in their own datacenter for users in their headquarters, and have their branch office users subscribe to Exchange Online. To enable a seamless experience such as a single address book, we provide a tool to synchronize entries in your on-premises directory with our Online directory. With this tool, any changes you make on your directory are synchronize with our directory such as changing adding or deleting a user, change user attributes, etc. For SharePoint, in this example, customer can choose to deploy a set of site collections on their on-premise SharePoint deployment and another set of site collections is deployed on SharePoint Online. In this case, no matter where the users are at, they can access to sites from both site collections.
With Microsoft services, customers don’t have to spend time or effort in deployment and start to be productive quickly. Customers don’t have to worry about updates and upgrades. This can help transform IT from being a cost center into being a strategic asset.
Bottom line, Microsoft will provide 24x7 IT Pro support and their service availability is backed by a 99.9% uptime SLA (with financial penalties if they fail to meet the SLA.)
Physical security is but one part it. When you look, Microsoft ultimately needs to make sure that since they are providing an internet based service, they are protecting customer’s data in a variety of ways. Microsoft looks at this as multiple layers of protection. They are actually providing 9 layers of logical security for their customers and those customers’ service and data. Filtering Routers: these are implemented to protect against any traffic they do not see as well constructed. One of the great benefits of providing a focused service like BPOS is they actually set up the routers to protect against any form of malform data. They block at an aggregate at the edge. Firewalls are set up as deny all. Behind the firewalls they have an Intrusion Detection System. Microsoft has a very sophisticated correlation engine for any intrusion alert that they’re tracking, 24 hours a day. Below the IDS, they have a level System Level Security. When you look, the service operations organization actually has broad based, dual factor authentication. This means each individual within a support and service operations team have either some sort of secure ID card or a RSH secure ID token that is coupled with their role. Each individual must have a user ID and password and must apply a pin with their secure ID token. Based on the role they have, they grant access per individuals to the service. Application Authentication: when you get below the System Level Security, the customers actually have application level authentication. Microsoft have a very sophisticated mechanism by which they provide access to data. The structure of the service provides users access to only those capabilities they are designed to have. (In the reseller model where a partner is actually providing the service to the customer, they have a level of application authentication that sits over top of that which the customers have.)Microsoft security scenarios are actually designed to make sure that they apply security methods not only to the software, but they also treat that software as a service. Virus Scanning is provided for multiple set of capabilities. Microsoft actually virus scan at all over our server levels, they have in place intrusion detection at the host and they’re scanning our content via Microsoft ForeFront.Then they have Separate Data Networks. These are implemented in a form that breaks it apart. For example, the data bases are on a separate sub net then from the actual content server or something that is an internet facing device.When you look, even though it’s an internet facing service, very few devices have direct access to the internet. All of the servers are on some form of non-routable subnet space. Finally you are authenticated into the data. The data itself is never stored on the physical servers, they run separate data networks and the data is stored on dedicated storage devices. So when you look at the content, the content is actually being sent from dedicated storage devices, which allows Microsoft to provide significant levels of backup as well.
Physical security is but one part it. When you look, Microsoft ultimately needs to make sure that since they are providing an internet based service, they are protecting customer’s data in a variety of ways. Microsoft looks at this as multiple layers of protection. They are actually providing 9 layers of logical security for their customers and those customers’ service and data. Filtering Routers: these are implemented to protect against any traffic they do not see as well constructed. One of the great benefits of providing a focused service like BPOS is they actually set up the routers to protect against any form of malform data. They block at an aggregate at the edge. Firewalls are set up as deny all. Behind the firewalls they have an Intrusion Detection System. Microsoft has a very sophisticated correlation engine for any intrusion alert that they’re tracking, 24 hours a day. Below the IDS, they have a level System Level Security. When you look, the service operations organization actually has broad based, dual factor authentication. This means each individual within a support and service operations team have either some sort of secure ID card or a RSH secure ID token that is coupled with their role. Each individual must have a user ID and password and must apply a pin with their secure ID token. Based on the role they have, they grant access per individuals to the service. Application Authentication: when you get below the System Level Security, the customers actually have application level authentication. Microsoft have a very sophisticated mechanism by which they provide access to data. The structure of the service provides users access to only those capabilities they are designed to have. (In the reseller model where a partner is actually providing the service to the customer, they have a level of application authentication that sits over top of that which the customers have.)Microsoft security scenarios are actually designed to make sure that they apply security methods not only to the software, but they also treat that software as a service. Virus Scanning is provided for multiple set of capabilities. Microsoft actually virus scan at all over our server levels, they have in place intrusion detection at the host and they’re scanning our content via Microsoft ForeFront.Then they have Separate Data Networks. These are implemented in a form that breaks it apart. For example, the data bases are on a separate sub net then from the actual content server or something that is an internet facing device.When you look, even though it’s an internet facing service, very few devices have direct access to the internet. All of the servers are on some form of non-routable subnet space. Finally you are authenticated into the data. The data itself is never stored on the physical servers, they run separate data networks and the data is stored on dedicated storage devices. So when you look at the content, the content is actually being sent from dedicated storage devices, which allows Microsoft to provide significant levels of backup as well.
The service is designed to reach out to your entire organization and not just your information workers. As part of the service, Microsoft will introduce a reduced function service designed for in-frequent users. Examples of these users are factory workers, truck drivers who are not regular users of email but still need to be in touch with what is going on and be able to read content posted on SharePoint. Both Exchange Online and SharePoint Online will have deskless worker offering. The Exchange Online Deskless Worker will have Outlook Web Access Light experience and a 100MB mailbox. The SharePoint Online deskless worker will have read only access to content posted on SharePoint.