SlideShare uma empresa Scribd logo
1 de 50
1
SM
February 24th, 2021
Webinar:
Securing Remote Workforce on the
Microsoft Cloud
2
SM
Withum | BE IN A POSITION OF STRENGTH
Housekeeping
• Webinar is being recorded
• 50 minute session
• 10 minute Q&A session at the end
• Send in your questions!
• Type your questions in the Questions Pane
of the GotoWebinar Panel
• Slides and recording will be emailed after
the webinar
3
SM
About Daniel
Daniel Cohen-Dumani
@dcohendumani
dcohendumani@withum.com
Partner,
Market
Leader
25+ years of Digital Transformation
Expertise with Office 365, SharePoint
and Dynamics
SharePoint Visionary
Interests: Productivity in
the Modern Workplace.
Work 2.0
Started working with
SharePoint when nobody
could spell it
4
SM
About Chris
Chris Ertz
@CCErtz
certz@withum.com
Practice
Leader
Our managed services team moves all types of
workloads to the Microsoft cloud including
applications and infrastructure. We then optimize
cloud subscriptions to drive the most value.
Expertise:
Innovative Digital Solutions
Technology Platforms
Security and Compliance
Managed Cloud Services
Fun Fact:
I participated on stage for a
Microsoft Windows and Office
launch event from Windows 95 to
Windows 8
5
SM
About Christian
Christian Kabela
@ckabela
ckabela@withum.com
Sr. Azure
Architect
Microsoft Security Certified Architect
with a strong background on
delivering complex cloud solutions.
Interests: Cloud computing, IOT,
Big Data, ML, & AI.
Alumni
Fun Fact: helped Microsoft
Intune product team fix
SCEP bug once fixed it was
rolled out across globe.
6
SM
Withum | BE IN A POSITION OF STRENGTH
What to Expect From Today’s
Webinar:
Securing Remote Workforce on the Microsoft Cloud
• Identity Security
• Device Management
• Windows Virtual Desktop
• Application Security
CE
7
SM
Top of mind for Withum clients…
How can we do
remote work better?
How can we
maintain security?
How can we
reduce our costs?
Better tools for
remote work
Better security
for remote work
Opportunity to
reduce costs
Multitude of personal and
mobile devices
Increased phishing and
ransomware due to COVID-19
Employees working
from multiple locations
CE
8
SM
Department of Homeland Security, April 8, 2020, CISA Alert (AA20-099A)
COVID-19 Exploited by Malicious
Cyber Actors
“…groups and cybercriminals are
targeting individuals, small and
medium enterprises, and large
organizations with COVID-19-
related scams and phishing emails.”
World, Health Organization, 23 April 2020 News release
WHO reports fivefold increase in
cyber attacks, urges vigilance
“Since the start of the COVID-19
pandemic, WHO has seen a dramatic
increase in the number of cyber
attacks directed at its staff, and email
scams targeting the public at large.”
Amidst a backdrop of increased COVID-19 related
cyberattacks
CE
9
SM
POLL #1
Rapidly enable work from home
while protecting corporate resources
CE
11
SM
Identity Security
12
SM
POLL #2
Personal
laptop
Home office
Personal
wearable
Personal
device
Customer
wearable
Company-
owned device
Partners
Customers Partner
device
Customer
device On-premises
Mobile
device
Mobile device
Protect identities with Conditional Access
Enable Zero Trust with strong authentication and adaptive policies
Require MFA
Allow access
Limit access
Application
User and
location Device
Real-time
risk
Password reset
Monitor access
Enable remote access to apps with single sign-on
Azure Active Directory as your identity control plane.
Single sign-on
Enable MFA to keep remote employees protected
Verify user identities to establish trust
Other methods to verify identity
Windows Hello FIDO2 security
key
Push notification
Soft
tokens OTP
Hard
tokens OTP
SMS,
voice
Microsoft
Authenticator
Multi-factor authentication prevents 99.9% of identity attacks.
User and
location
Demo
Conditional Access
Securely connect any user to any app
Manage your users’ access to apps, data, and devices, improving visibility and control
Provide a single location for your people
to access all apps
With Azure Active Directory My Apps portal
 Streamlined user access to cloud and
on-prem apps
 Easy management of app credentials
and preferences
 App filters and collections
 All apps visible in Office 365 portal
CE
Demo
My App Portal
CE
21
SM
Device
Management
22
SM
POLL #3
Manage endpoints, protect your data
on any device, anywhere
Microsoft Endpoint Manager
Configuration
Manager
ConfigMgr
console
Windows and mobile devices (Cloud-native management)
Domainjoined PCs
Domain-joined PCs (on-premises managed)
Co-management
workloads
Intune console
Unified admin console
ConfigMgr + MDM
Windows 10
On-prem
Microsoft
Intune
Automate Windows
deployment using Autopilot
Drop-ship management-ready devices
Significant cost and time savings
in OS deployment
Bypass traditional image-based deployment
Ongoing ability to do automated provisioning
of apps, configurations and user settings
Easy new device experience for end-users
Deploy and manage apps
on any device.
Deploy and manage your
devices and virtual desktops
while protecting your data.
Virtual
desktop
BYOD
Unify management across devices and apps
Deploy, manage, and secure your apps and devices with Microsoft Endpoint Manager
Proactively manage updates, patching, and policies.
Deploy and manage apps
on any device.
Manage any device: physical & virtual
Manage physical and virtual endpoints with Microsoft Endpoint Manager
Proactively manage updates, patching, and policies.
Deploy and manage your
devices and virtual desktops
while protecting your data.
Virtual
desktop
BYOD
Deploy and manage your
devices and virtual desktops
while protecting your data.
Virtual
desktop
BYOD
Manage devices: Remotely deploy and manage apps
Flexible management of apps for all your devices with Microsoft Endpoint Manager
Proactively manage updates, patching, and policies.
Deploy and manage apps
on any device.
Demo
 Device & app management
Zero touch provisioning
Streamlined and flexible provisioning of all your devices with Microsoft Endpoint Manager
Android Enterprise
Zero Touch
Samsung Knox
Mobile Enrollment
Apple Business Manager
Windows Autopilot
Out of the box security
Self-service provisioning directly by end users
Decrease costly image creation workload
Lower OPEX for staying current
Faster time to productivity
CE
Flexible endpoint security approaches
for devices and apps
Mobile application management (MAM)
Conditional access:
Restrict which apps can be
used to access email or files
Mobile device management (MDM)
Conditional access:
Restrict access to
managed and compliant
devices and apps
Enroll devices
for management
Provision device settings,
certificates, and profiles
Managed apps
(corporate data)
Personal apps
(personal data)
CE
Easily collaborate with external partners
With Azure Active Directory
 Add partners with accounts in other
Azure AD organizations
 Add external users with Microsoft
account, social IDs, or other identity
provider accounts
 Add external users with non-traditional
IDs, including phone and email one-
time passcodes
Demo
33
SM
Application
Security
34
SM
POLL #4
New! Get visibility into cloud app use with Cloud App Discovery
Note: We are rolling out the full Azure AD Premium P1 capabilities to new
Microsoft 365 Business Premium customers. Rollout to current Microsoft 365
Business Premium subscribers is scheduled thereafter over the next few months.
For more details refer to the blog announcement.
Discover cloud app usage to understand
shadow IT risk
Understand the security of your cloud apps
with risk assessment for 16,000+ cloud apps
Understand usage patterns and identify high
risk users. Export data for additional analysis
Prioritize applications to bring under IT control
and integrate applications to enable single
sign-on and user management
Demo
Cloud App Discovery
CE
42
SM
Windows Virtual
Desktop
DCD
Deliver the only multi-session Windows 10
experience that’s highly scalable and stays up to date
Enable optimizations for Office
Migrate RDS desktops and apps and
simplify licensing and reduce costs
Deploy and scale in minutes. Manage with ​unified
admin interface in Azure Portal
Support any end-user device platform
including Windows, Android, Mac, iOS, and HTML 5
Enable remote desktop access with Windows Virtual Desktop
DCD
• Azure AD Features like MFA
• Self Service Password Reset
• Conditional Access
• Dynamic Groups
• Microsoft Defender AV
• Full Centralized Management of
Mobile and Laptops with Intune
• Remote wipe of data of lost &
stolen devices
• BitLocker Encryption
• Enforce Strong Pin requirements
along with Wi-Fi, VPN profiles
• Restrict copy/paste/save
corp data to personal apps
using Intune App Protection
Policies
• Advanced Threat Protection
for protection against malware
and zero day attacks
• Data Loss Prevention to
monitor sensitive data from
being transmitted
• Email restrictions like “Do Not
Forward” or “Encrypt Email”
• Azure Information Protection
protects, classifies Documents
for secure sharing including in
Teams
• Revoke access to Documents
• Track Sensitive documents
Identity Security Device Security Application Security Document Security
Microsoft 365 Business Premium
Recap | Layered security with Microsoft 365 Business Premium
10 Pro
DCD
Simplify your technology investment and help reduce cost
$20
monthly
Microsoft 365
Business Premium
Integrated productivity,
collaboration and security
solution
Security, Identity and Device Mgmt
Remote access solutions $5
Advanced Email protection $5
Single Sign-On $2
Conditional Access+ MFA $6
Endpoint anti-virus protection ~$3
Device management $4
Collaboration and Productivity
Productivity apps and file storage $12
Chat based collaboration $6.67
>$40
monthly cost of
3rd party solutions1
1Estimates based on published prices
File Storage and Productivity apps – GSuite $12 (unlimited storage) Online chat based collaboration – Slack $6.67
Single Sign On– Okta $2; Adaptive MFA (Conditional Access+ MFA) – Okta $6
Device Management - IBM MaaS 360- $4.00, Endpoint Protection – Kaspersky - $3.38, Proofpoint email protection - $5
Remote Access: Windows Terminal server CAL ($199 perpetual per user; over 3 years – per month would be around $5); TeamViewer - $49 per user per month
DCD
Access
Management
Cloud Access
Security Brokers
Enterprise
Information Archiving
Endpoint
Protection Platforms
Unified Endpoint
Management Tools
*Gartner “Magic Quadrant for Access Management,” by Michael Kelley, Abhyuday Data, Henrique, Teixeira, August 2019
*Gartner “Magic Quadrant for Cloud Access Security Brokers,” by Steve Riley, Craig Lawson, October 2019
*Gartner “Magic Quadrant for Enterprise Information Archiving,” by Julian Tirsu, Michael Hoech, November 2019
*Gartner “Magic Quadrant for Endpoint Protection Platforms,” by Peter Firstbrook, Dionisio Zumerle, Prateek Bhajanka, Lawrence Pingree, Paul Webber, August 2019
*Gartner “Magic Quadrant for Unified Endpoint Management Tools,” by Chris Silva, Manjunath Bhat, Rich Doheny, Rob Smith, August 2019
These graphics were published by Gartner, Inc. as part of larger research documents and should be evaluated in the context of the entire documents. The Gartner documents are available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology
users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability
or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Microsoft Security—a leader in 5 Gartner magic quadrants
DCD
Sample Client Deployment
Microsoft 365 Business Premium deployment
Ongoing value for clients as Withum configures additional services
Microsoft
365
Business
Premium
Features
Office, Teams,
SharePoint ,
MFA with
Conditional
Access, WVD
Intune MAM/MDM
ATP
Add-on
services
Azure
Compute,
Power Platform
apps
Managed device
service (Includes
support, Device
lifecycle mgmt,
Hardware
standardization).
Security as a
service
(assessments, end
user training,
EDR/SOC,
compliance)
Productivity as a
service, Microsoft
Governance
mechanisms,
Power Platform
T+2 mo. T+5 mo. T+8 mo.
T mo.
DCD
The Value Calculator helps determine the
ROI of deploying Modern Workplace
products. It has three main sections:
ROI Results
Cost Take Out
Exportable PowerPoint to share
Analyze customer ROI with Value Calculator
and show the long term benefit of moving to Microsoft 365
DCD
49
SM
Questions?
50
SM
SUBSCRIBE TO US
Get a weekly dose of the latest digital
transformation
trends and insights delivered to your inbox.
No Junk - Just What Matters Most to You

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
1 modern desktop - shift to a modern desktop
1   modern desktop - shift to a modern desktop1   modern desktop - shift to a modern desktop
1 modern desktop - shift to a modern desktop
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
All Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 PlansAll Plans Comparison - Office 365 and Microsoft 365 Plans
All Plans Comparison - Office 365 and Microsoft 365 Plans
 
3 modern desktop - office 365 pro plus deployment + servicing
3   modern desktop - office 365 pro plus deployment + servicing3   modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicing
 
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystifiedSCUGBE_Lowlands_Unite_2017_Rest azured   microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protection
 
4 Modern Desktop - Planning a Modern Desktop Deployment
4   Modern Desktop -  Planning a Modern Desktop Deployment4   Modern Desktop -  Planning a Modern Desktop Deployment
4 Modern Desktop - Planning a Modern Desktop Deployment
 
Introduction to Microsoft 365
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 Business
 

Semelhante a Webinar: Securing Remote Workforce on the Microsoft Cloud

Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Ingram Micro Cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 

Semelhante a Webinar: Securing Remote Workforce on the Microsoft Cloud (20)

Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 

Mais de Withum

Mais de Withum (20)

Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023
 
Congressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptxCongressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptx
 
Power Platform Governance Center of Excellence
Power Platform Governance Center of ExcellencePower Platform Governance Center of Excellence
Power Platform Governance Center of Excellence
 
Safeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber ThreatsSafeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber Threats
 
IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023
 
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
 
Put Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite ReportingPut Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite Reporting
 
IRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdfIRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdf
 
International Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptxInternational Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptx
 
CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023
 
Sales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your BusinessSales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your Business
 
Tax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and BeyondTax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and Beyond
 
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdfWebinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
 
Lessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New JerseyLessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New Jersey
 
6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel Growth6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel Growth
 
Is There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace AgreementsIs There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
 
The Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for ManufacturersThe Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for Manufacturers
 
Using Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent RetentionUsing Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent Retention
 
PL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and FuturePL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and Future
 
Withum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdfWithum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdf
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Webinar: Securing Remote Workforce on the Microsoft Cloud

  • 1. 1 SM February 24th, 2021 Webinar: Securing Remote Workforce on the Microsoft Cloud
  • 2. 2 SM Withum | BE IN A POSITION OF STRENGTH Housekeeping • Webinar is being recorded • 50 minute session • 10 minute Q&A session at the end • Send in your questions! • Type your questions in the Questions Pane of the GotoWebinar Panel • Slides and recording will be emailed after the webinar
  • 3. 3 SM About Daniel Daniel Cohen-Dumani @dcohendumani dcohendumani@withum.com Partner, Market Leader 25+ years of Digital Transformation Expertise with Office 365, SharePoint and Dynamics SharePoint Visionary Interests: Productivity in the Modern Workplace. Work 2.0 Started working with SharePoint when nobody could spell it
  • 4. 4 SM About Chris Chris Ertz @CCErtz certz@withum.com Practice Leader Our managed services team moves all types of workloads to the Microsoft cloud including applications and infrastructure. We then optimize cloud subscriptions to drive the most value. Expertise: Innovative Digital Solutions Technology Platforms Security and Compliance Managed Cloud Services Fun Fact: I participated on stage for a Microsoft Windows and Office launch event from Windows 95 to Windows 8
  • 5. 5 SM About Christian Christian Kabela @ckabela ckabela@withum.com Sr. Azure Architect Microsoft Security Certified Architect with a strong background on delivering complex cloud solutions. Interests: Cloud computing, IOT, Big Data, ML, & AI. Alumni Fun Fact: helped Microsoft Intune product team fix SCEP bug once fixed it was rolled out across globe.
  • 6. 6 SM Withum | BE IN A POSITION OF STRENGTH What to Expect From Today’s Webinar: Securing Remote Workforce on the Microsoft Cloud • Identity Security • Device Management • Windows Virtual Desktop • Application Security CE
  • 7. 7 SM Top of mind for Withum clients… How can we do remote work better? How can we maintain security? How can we reduce our costs? Better tools for remote work Better security for remote work Opportunity to reduce costs Multitude of personal and mobile devices Increased phishing and ransomware due to COVID-19 Employees working from multiple locations CE
  • 8. 8 SM Department of Homeland Security, April 8, 2020, CISA Alert (AA20-099A) COVID-19 Exploited by Malicious Cyber Actors “…groups and cybercriminals are targeting individuals, small and medium enterprises, and large organizations with COVID-19- related scams and phishing emails.” World, Health Organization, 23 April 2020 News release WHO reports fivefold increase in cyber attacks, urges vigilance “Since the start of the COVID-19 pandemic, WHO has seen a dramatic increase in the number of cyber attacks directed at its staff, and email scams targeting the public at large.” Amidst a backdrop of increased COVID-19 related cyberattacks CE
  • 10. Rapidly enable work from home while protecting corporate resources CE
  • 14. Protect identities with Conditional Access Enable Zero Trust with strong authentication and adaptive policies Require MFA Allow access Limit access Application User and location Device Real-time risk Password reset Monitor access
  • 15. Enable remote access to apps with single sign-on Azure Active Directory as your identity control plane. Single sign-on
  • 16. Enable MFA to keep remote employees protected Verify user identities to establish trust Other methods to verify identity Windows Hello FIDO2 security key Push notification Soft tokens OTP Hard tokens OTP SMS, voice Microsoft Authenticator Multi-factor authentication prevents 99.9% of identity attacks. User and location
  • 18. Securely connect any user to any app Manage your users’ access to apps, data, and devices, improving visibility and control
  • 19. Provide a single location for your people to access all apps With Azure Active Directory My Apps portal  Streamlined user access to cloud and on-prem apps  Easy management of app credentials and preferences  App filters and collections  All apps visible in Office 365 portal CE
  • 23. Manage endpoints, protect your data on any device, anywhere Microsoft Endpoint Manager Configuration Manager ConfigMgr console Windows and mobile devices (Cloud-native management) Domainjoined PCs Domain-joined PCs (on-premises managed) Co-management workloads Intune console Unified admin console ConfigMgr + MDM Windows 10 On-prem Microsoft Intune
  • 24. Automate Windows deployment using Autopilot Drop-ship management-ready devices Significant cost and time savings in OS deployment Bypass traditional image-based deployment Ongoing ability to do automated provisioning of apps, configurations and user settings Easy new device experience for end-users
  • 25. Deploy and manage apps on any device. Deploy and manage your devices and virtual desktops while protecting your data. Virtual desktop BYOD Unify management across devices and apps Deploy, manage, and secure your apps and devices with Microsoft Endpoint Manager Proactively manage updates, patching, and policies.
  • 26. Deploy and manage apps on any device. Manage any device: physical & virtual Manage physical and virtual endpoints with Microsoft Endpoint Manager Proactively manage updates, patching, and policies. Deploy and manage your devices and virtual desktops while protecting your data. Virtual desktop BYOD
  • 27. Deploy and manage your devices and virtual desktops while protecting your data. Virtual desktop BYOD Manage devices: Remotely deploy and manage apps Flexible management of apps for all your devices with Microsoft Endpoint Manager Proactively manage updates, patching, and policies. Deploy and manage apps on any device.
  • 28. Demo  Device & app management
  • 29. Zero touch provisioning Streamlined and flexible provisioning of all your devices with Microsoft Endpoint Manager Android Enterprise Zero Touch Samsung Knox Mobile Enrollment Apple Business Manager Windows Autopilot Out of the box security Self-service provisioning directly by end users Decrease costly image creation workload Lower OPEX for staying current Faster time to productivity CE
  • 30. Flexible endpoint security approaches for devices and apps Mobile application management (MAM) Conditional access: Restrict which apps can be used to access email or files Mobile device management (MDM) Conditional access: Restrict access to managed and compliant devices and apps Enroll devices for management Provision device settings, certificates, and profiles Managed apps (corporate data) Personal apps (personal data) CE
  • 31. Easily collaborate with external partners With Azure Active Directory  Add partners with accounts in other Azure AD organizations  Add external users with Microsoft account, social IDs, or other identity provider accounts  Add external users with non-traditional IDs, including phone and email one- time passcodes
  • 32. Demo
  • 35. New! Get visibility into cloud app use with Cloud App Discovery Note: We are rolling out the full Azure AD Premium P1 capabilities to new Microsoft 365 Business Premium customers. Rollout to current Microsoft 365 Business Premium subscribers is scheduled thereafter over the next few months. For more details refer to the blog announcement. Discover cloud app usage to understand shadow IT risk Understand the security of your cloud apps with risk assessment for 16,000+ cloud apps Understand usage patterns and identify high risk users. Export data for additional analysis Prioritize applications to bring under IT control and integrate applications to enable single sign-on and user management
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 43. Deliver the only multi-session Windows 10 experience that’s highly scalable and stays up to date Enable optimizations for Office Migrate RDS desktops and apps and simplify licensing and reduce costs Deploy and scale in minutes. Manage with ​unified admin interface in Azure Portal Support any end-user device platform including Windows, Android, Mac, iOS, and HTML 5 Enable remote desktop access with Windows Virtual Desktop DCD
  • 44. • Azure AD Features like MFA • Self Service Password Reset • Conditional Access • Dynamic Groups • Microsoft Defender AV • Full Centralized Management of Mobile and Laptops with Intune • Remote wipe of data of lost & stolen devices • BitLocker Encryption • Enforce Strong Pin requirements along with Wi-Fi, VPN profiles • Restrict copy/paste/save corp data to personal apps using Intune App Protection Policies • Advanced Threat Protection for protection against malware and zero day attacks • Data Loss Prevention to monitor sensitive data from being transmitted • Email restrictions like “Do Not Forward” or “Encrypt Email” • Azure Information Protection protects, classifies Documents for secure sharing including in Teams • Revoke access to Documents • Track Sensitive documents Identity Security Device Security Application Security Document Security Microsoft 365 Business Premium Recap | Layered security with Microsoft 365 Business Premium 10 Pro DCD
  • 45. Simplify your technology investment and help reduce cost $20 monthly Microsoft 365 Business Premium Integrated productivity, collaboration and security solution Security, Identity and Device Mgmt Remote access solutions $5 Advanced Email protection $5 Single Sign-On $2 Conditional Access+ MFA $6 Endpoint anti-virus protection ~$3 Device management $4 Collaboration and Productivity Productivity apps and file storage $12 Chat based collaboration $6.67 >$40 monthly cost of 3rd party solutions1 1Estimates based on published prices File Storage and Productivity apps – GSuite $12 (unlimited storage) Online chat based collaboration – Slack $6.67 Single Sign On– Okta $2; Adaptive MFA (Conditional Access+ MFA) – Okta $6 Device Management - IBM MaaS 360- $4.00, Endpoint Protection – Kaspersky - $3.38, Proofpoint email protection - $5 Remote Access: Windows Terminal server CAL ($199 perpetual per user; over 3 years – per month would be around $5); TeamViewer - $49 per user per month DCD
  • 46. Access Management Cloud Access Security Brokers Enterprise Information Archiving Endpoint Protection Platforms Unified Endpoint Management Tools *Gartner “Magic Quadrant for Access Management,” by Michael Kelley, Abhyuday Data, Henrique, Teixeira, August 2019 *Gartner “Magic Quadrant for Cloud Access Security Brokers,” by Steve Riley, Craig Lawson, October 2019 *Gartner “Magic Quadrant for Enterprise Information Archiving,” by Julian Tirsu, Michael Hoech, November 2019 *Gartner “Magic Quadrant for Endpoint Protection Platforms,” by Peter Firstbrook, Dionisio Zumerle, Prateek Bhajanka, Lawrence Pingree, Paul Webber, August 2019 *Gartner “Magic Quadrant for Unified Endpoint Management Tools,” by Chris Silva, Manjunath Bhat, Rich Doheny, Rob Smith, August 2019 These graphics were published by Gartner, Inc. as part of larger research documents and should be evaluated in the context of the entire documents. The Gartner documents are available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. Microsoft Security—a leader in 5 Gartner magic quadrants DCD
  • 47. Sample Client Deployment Microsoft 365 Business Premium deployment Ongoing value for clients as Withum configures additional services Microsoft 365 Business Premium Features Office, Teams, SharePoint , MFA with Conditional Access, WVD Intune MAM/MDM ATP Add-on services Azure Compute, Power Platform apps Managed device service (Includes support, Device lifecycle mgmt, Hardware standardization). Security as a service (assessments, end user training, EDR/SOC, compliance) Productivity as a service, Microsoft Governance mechanisms, Power Platform T+2 mo. T+5 mo. T+8 mo. T mo. DCD
  • 48. The Value Calculator helps determine the ROI of deploying Modern Workplace products. It has three main sections: ROI Results Cost Take Out Exportable PowerPoint to share Analyze customer ROI with Value Calculator and show the long term benefit of moving to Microsoft 365 DCD
  • 50. 50 SM SUBSCRIBE TO US Get a weekly dose of the latest digital transformation trends and insights delivered to your inbox. No Junk - Just What Matters Most to You