Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Value Microsoft 365 E5 English

Value and contributions of the E5 offer
This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of previous plans (M365 F1/E1/E3)

  • Be the first to comment

Value Microsoft 365 E5 English

  1. 1. Microsoft 365 E5 Value and contributions of the E5 offer This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of previous plans (M365 F1/E1/E3)
  2. 2. Information Protection Oversight of cloud and application usages Identity and access management Protection from advanced threats Insider risk management Data governance Cloud Telephony Dynamic dashboards Microsoft 365 E5 in one image  Discovery, Classification and Automated Data Protection  Import your encryption key  Advanced messages encryption  Discovery, investigation, continuous analysis and detection of anomalies on cloud applications  Visibility of your data in the cloud  Connection risk assessment  Management of privileged accounts  Identity Governance  Advanced protection of messaging, documents, SaaS application, workstation and Active Directory Automatically identify and protect your sensitive data wherever it is Supervise, understand, manage and protect yourself from the uses and threats of cloud applications An interconnected defensive arsenal against sophisticated and targeted threats Protectiion and Governance of Data Access by Users and Administrators Educate users and protect yourself from risky behaviors, whether voluntary or not  Data Access Approval Workflow  Supervision of communications  Ethical wall  Automated data lifecycle management  Searching for information (litigation or internal searches) Keep, delete and find sensitive data - automatically -  Next-generation telephony  Conference bridge  Advanced business functions  Choosing the operator connection Corporate telephony system integrated into collaborative suite  Make the most of your data  Share dashboards  Artificial intelligence support Browse your data and bring out key metrics in real time
  3. 3. Information Protection Automatic classification of documents based on their sensitivity Personal Public Confidential Encryption Watermark Tracking Revocation Automatic classification of your local file servers (and SharePoint) Use your own key and infrastructure for document encryption Scan and detect sensitive data based on policies Classify and lay data based on their sensitivity Apply protection, and actions such as encryption and restriction of access Reports, alerts and remediation Protection follows the document wherever it is, even outside of Office 365 A scanner identifies, classifies and protects your local file servers and SharePoint In highly regulated contexts, you can use your own encryption infrastructure with your keys for data hosted on Office 365 Advanced e-mail encryption Send encrypted messages with your colors and logos, with the ability to put an expiration date or revoke the message Automatically identify and protect your sensitive data wherever it is
  4. 4. Oversight of cloud and application usages Discovering Cloud Applications actually used Advanced Incident Investigation Tools Cloud visibility of your data  Shadow IT detection (unapproved applications)  Application risk assessment  Understand usages, traffic, categories  Investigation of users, files, activities, locations.  Quantify exposure and risk  Block or manage apps  Monitor and protect information through apps  Identify how classified and unclassified data is shared on cloud applications and assess risks Continuous analysis and detection of anomalies  Warnings on abnormal uses and behaviors  Alerts on new apps and trends Office 365 Salesforce Azure Box Aws DropboxFacebook TwitterYoutube Supervise, understand, manage and protect yourself from the uses and threats of cloud applications
  5. 5. Identity and access management Connection risk assessment Management of Privileged Identities Identity Governance  Conditional access strategies for connections and risk- based sessions  Identifying vulnerabilities and accounts at risk  Investigation into risky events  Workflow to raise privileges for admin accounts  Reducing attack surface in case of compromised account  Protection against internal risk of malicious administrators  Automation of access query workflows, access assignments, revisions and expiration.  Effectively manage access to groups, applications and sites Access review  User access can be reviewed regularly to ensure that only appropriate people continue to benefit from access  Managing new hires and changing jobs Protection and Governance of Data Access by Users and Administrators Session Risk 3 User - role Known and compliant device Physical/virtual location Client and authentication method Strategies Ask for a 2nd authentication factor Allow/deny access ** ** ** Limited access Force the password reset Context Organization policy Conditioned action Access to data
  6. 6. Protection from advanced threats Protecting messaging and documents Protecting the workstation Active Directory Protection  Automated protection and response against malicious links and attachments  Protection against identity theft  Attack Simulator  Investigation of attacks  Overview of global and industry threats  Automated Detection and Response (EDR)  Ransomware protection and 0-day flaws  Protection from vulnerability exploitation  Reducing the attack surface and investigating  Identifying advanced attacks and internal risks before damage occurs  Behavior analysis  In-depth log analysis  Detection of compromised accounts Protecting cloud applications  Threat detection in cloud applications  Identifying at-risk applications  Internal risk protection (data exfiltration)  Detection of compromised accounts and sessions An interconnected defensive arsenal against sophisticated and targeted threats PhishingMail Opening Attachment ClickonURL Exploit& Installation Command& Control Useraccount Compromise SideMovement Adminaccount Compromise Domain Compromise Access to sensitive data by the attacker Dataexfiltration End-to-end attack scenario Protection Messaging and documents Workstation Active Directory Cloud Apps
  7. 7. Insider risk management Preventing information leakage in Microsoft Teams Approval workflow for data access Approval workflow for administrator privilege elevations  Educate and block users about to share sensitive information in chats and group conversations  In real time, internally and externally  Meet compliance obligations by demonstrating an explicit data access authorization process  Controlling access to content for service operations  Reduce attack surface with admin accounts with zero standing access  Protect yourself from malicious administrators  Workflow for validation of privilege elevations Supervision of communications  Apply your corporate rules, ethical standards, in user communications  Manage risk on sensitive topics by supervising communications  Follow current regulatory compliances Educate users and protect yourself from risky behaviors, whether voluntary or not Ethical wall between certain populations  Segment certain user populations by prohibiting them from communicating with each other for business or compliance reasons  Isolate a team or site, if necessary
  8. 8. Data governance Automated data lifecycle management Import your encryption key for data at rest Search for information (litigation or internal research)  Automated detection of sensitive data and application of a label based on content  Set retention or deletion policies to meet compliance or quality requirements  Use your own encryption key for data at rest in Office 365  Enjoy the right to be forgotten through key revocation  Meet the compliance requirements that require you to use your keys  Drastically reduce the number of documents to review  Rearrange the results, through themes, deletion of duplicates and reconstruction of conversation threads  Annotate documents User and administrator activity logs  365-day retention of all user and admin activities  Find out quickly who did what on the data or service configuration Keep, delete and find sensitive data - automatically - Governance Label  Retention strategy  Deletion strategy  Review before deletion  Record management  Import third-party data Supervision Violation of Strategy Search for content  Insights  Analysis  Reports Data at risk
  9. 9. Cloud Telephony Next-generation telephony Conference bridge Advanced business functions  Full telephony system in the cloud to replace your local PBX system  There's no need to maintain local infrastructure  Conference bridge in meetings to be reached by phone  Responding to group calls  Line sharing  Call parking Choosing the operator connection  Direct routing in Microsoft Teams  Microsoft Call Package  Communication credits Corporate telephone system integrated into collaborative suite
  10. 10. Dynamic dashboards Do more with your data Sharing culture Artificial intelligence  Get your data talking  Publication of dynamic reports, dashboards  Reduce the costs, complexity and challenges of multiples solutions  Publication of dynamic reports in a collaborative workspace  Self-service spirit  Many connectors and visual options  Include reports in other apps  Make sense of unstructured data (images, text, etc.)  Ask your questions in natural language  Discover the hidden information that influences your key metrics Accessible from anywhere  From a browser  From the rich app  From a smartphone  From an Office app  From the intranet  From Microsoft Teams Browse your data and bring out key metrics in real time

×