SlideShare a Scribd company logo
1 of 11
Download to read offline
How analysts view the Digital Workplace
• Support changing
work styles
• Win the war on talent
• Focus on employee
experience
• Enhance innovation
• Increase agility &
flexibility
• Employee
Engagement
• Consumer-like
Experience
• People-centric Design
• Leverage consumer
digital trends
• Drive Change
Management
• Puts People First
• Communication &
employee
engagement
• Collaboration –
Finding and sharing
of information and
knowledge
• Business applications
& Agile working – The
ability to be productive
anytime
• Access Devices –
Employees need the
flexibility to how
they work
• Communications
Infrastructure – High
bandwidth/availability
• Business Applications
– Easy access & usage
• Digital Security
The Digital Workplace:
Think, share do
Digital Workplace
Key Initiative Overview
What a Digital Workplace
Is and What It Isn’t
Five Essential Elements
of the Digital Workplace
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Back-End Front-end
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
01 02 03 04
A secure, intelligent, and complete solution to empower your employees
Microsoft 365
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Enterprise Mobility +Security
Enterprise Mobility +Security
Enterprise Mobility +Security
Azure Active Directory
Microsoft Threat Protection
Microsoft Intune
Microsoft Threat Protection
Azure Information Protection
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Windows Hello
Windows Credential Guard
WAAS – Delivery
& Optimization
Windows
Autopilot
Windows
Defender
BitLocker &
Management
Windows
Analytics
App-v & VDI
Windows Timeline
Windows S Mode & Kiosk
Browser
Inking & 3D & Cortana
Windows Cloud Files (w/
OneDrive)
Accessibility
Windows Information
Protection
Security Center
Post Breach Conditional Access
Advanced &
Threat Protection
based against
zero-day attacks
Workplace
Productivity
Analytics
Intelligent
Communications
Personal Assistant
Real-time
& dynamic
Dashboards
Automated
governance
searches based in
context
Automated
Classification
Intelligent identity
Protection based on
user’s behaviors
Control & visibility
over Shadow IT Personalized
recomendations
based on
Intelligent Graph
Theat Intelligence
Azure ATP
Windows ATP
Office 365 ATP
Advanced Compliance &
E-discovery
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
01 02 03 04
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications Business
Results & KPIs
Modern
Desktop
Single
Sign-on Apps
Management
Sharing sensitive
Information
Conditional
Access
Individual
Productivity and
Cloud File Shares
Team
Collaboration,
Projects
Compliance
(Retention,
governance and
monitoring)
Identity &
Access External
Communications
Selfservice
Solutions
Device
Management
Threat
Protection
Business
Processes
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Enterprise Search
Business
Results & KPIs
Modern
Desktop
Identity and Threat Protection Device & Apps
Management
Information Protection &
Governance
Productivity & Collaboration
The Modern Workplace Framework & Journey
01 02 03 04
Share sensitive
information
Individual
Productivity
Team
Collaboration,
Projects
Information
management
(Retention,
governance and
monitoring)
Extended
Communications
with value chain
Digitalize
Business
Processess
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Publish business
results & KPIs
Information Protection &
Governance
Productivity & Collaboration
03 04
Collaboration
Tools
Engage the
workforce
Listen to
employees
Transparency
Talent retention
Executive
Mobility
Speed &
Agility
Employee
engagement
Store/Production
Security
Growth Culture
Enterprise Search
Compliance
Learning paths &
Video
Share Sensitive
information
Individual
Productivity
Team
Collaboration,
Projects
Information
Management
(Retention,
governance and
monitoring)
Extended
Communications
with value chain
Digitalize
Business
Processess
(BPM)
Internal
Communications
Enterprise
Content
Management
(ECM)
Publish business
results & KPIs
Information Protection &
Governance
Productivity & Collaboration
03 04
Executive
Mobility
Employee
Engagement
(Store/Production)
Enterprise Search
Learning paths &
Video
Audio Conferencing
Phone System
Azure Active Directory Plan 2
Windows Defender Advanced Threat
Protection
Office 365 Advanced Threat Protection
P1 & P2
Azure Advanced Threat Protection
Azure Information Protection P2
Microsoft Cloud App Security
Advanced eDiscovery, Customer Lockbox,
Advanced Data Governance, Service
Encryption with Customer Key, Office 365
Privileged Access Management
Power BI Pro
Windows Enterprise
Office client apps (Word, Excel PowerPoint,
OneNote, Access)
Office Mobile Apps and
Office Online
Outlook
Exchange
Teams
Skype for Business
SharePoint
Yammer
OneDrive for Business
Microsoft Stream
Sway for Office 365
PowerApps & Flow
Planner
To-do
Microsoft 365 Admin Center
Microsoft Intune
Windows Autopilot, Fine Tuned User
Experience, and Windows Analytics
Device Health
System Center Configuration Manager
Windows Hello, Credential Guard and
Direct Access
Azure Active Directory Plan 1
Microsoft Advanced Threat Analytics
Windows Defender Antivirus and
Device Guard
Office 365 Data Loss Prevention
Windows Information Protection and
BitLocker
Azure Information Protection P1
Microsoft Secure Score
Microsoft Security and Compliance Center
MyAnalytics
Microsoft 365 E5
Microsoft 365
Windows 10 + Office 365 +EMS
Microsoft 365 E3

More Related Content

What's hot

Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 

What's hot (20)

Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nv
 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for Business
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
MS Office 365
MS Office 365MS Office 365
MS Office 365
 
Learn More About Microsoft Teams
Learn More About Microsoft Teams Learn More About Microsoft Teams
Learn More About Microsoft Teams
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 Business
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Everything you need to know to create a modern Intranet/Digital Employee Expe...
Everything you need to know to create a modern Intranet/Digital Employee Expe...Everything you need to know to create a modern Intranet/Digital Employee Expe...
Everything you need to know to create a modern Intranet/Digital Employee Expe...
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
Office 365
Office 365Office 365
Office 365
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 

Similar to Microsoft-365-Overview.pdf

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 

Similar to Microsoft-365-Overview.pdf (20)

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Microsoft-365-Overview.pdf

  • 1. How analysts view the Digital Workplace • Support changing work styles • Win the war on talent • Focus on employee experience • Enhance innovation • Increase agility & flexibility • Employee Engagement • Consumer-like Experience • People-centric Design • Leverage consumer digital trends • Drive Change Management • Puts People First • Communication & employee engagement • Collaboration – Finding and sharing of information and knowledge • Business applications & Agile working – The ability to be productive anytime • Access Devices – Employees need the flexibility to how they work • Communications Infrastructure – High bandwidth/availability • Business Applications – Easy access & usage • Digital Security The Digital Workplace: Think, share do Digital Workplace Key Initiative Overview What a Digital Workplace Is and What It Isn’t Five Essential Elements of the Digital Workplace
  • 2. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04 Back-End Front-end
  • 3. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04
  • 4. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration 01 02 03 04 A secure, intelligent, and complete solution to empower your employees Microsoft 365
  • 5. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04 Enterprise Mobility +Security Enterprise Mobility +Security Enterprise Mobility +Security Azure Active Directory Microsoft Threat Protection Microsoft Intune Microsoft Threat Protection Azure Information Protection
  • 6. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04 Windows Hello Windows Credential Guard WAAS – Delivery & Optimization Windows Autopilot Windows Defender BitLocker & Management Windows Analytics App-v & VDI Windows Timeline Windows S Mode & Kiosk Browser Inking & 3D & Cortana Windows Cloud Files (w/ OneDrive) Accessibility Windows Information Protection Security Center Post Breach Conditional Access
  • 7. Advanced & Threat Protection based against zero-day attacks Workplace Productivity Analytics Intelligent Communications Personal Assistant Real-time & dynamic Dashboards Automated governance searches based in context Automated Classification Intelligent identity Protection based on user’s behaviors Control & visibility over Shadow IT Personalized recomendations based on Intelligent Graph Theat Intelligence Azure ATP Windows ATP Office 365 ATP Advanced Compliance & E-discovery Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration 01 02 03 04 Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Business Results & KPIs Modern Desktop
  • 8. Single Sign-on Apps Management Sharing sensitive Information Conditional Access Individual Productivity and Cloud File Shares Team Collaboration, Projects Compliance (Retention, governance and monitoring) Identity & Access External Communications Selfservice Solutions Device Management Threat Protection Business Processes (BPM) Internal Communications Enterprise Content Management (ECM) Enterprise Search Business Results & KPIs Modern Desktop Identity and Threat Protection Device & Apps Management Information Protection & Governance Productivity & Collaboration The Modern Workplace Framework & Journey 01 02 03 04
  • 9. Share sensitive information Individual Productivity Team Collaboration, Projects Information management (Retention, governance and monitoring) Extended Communications with value chain Digitalize Business Processess (BPM) Internal Communications Enterprise Content Management (ECM) Publish business results & KPIs Information Protection & Governance Productivity & Collaboration 03 04 Collaboration Tools Engage the workforce Listen to employees Transparency Talent retention Executive Mobility Speed & Agility Employee engagement Store/Production Security Growth Culture Enterprise Search Compliance Learning paths & Video
  • 10. Share Sensitive information Individual Productivity Team Collaboration, Projects Information Management (Retention, governance and monitoring) Extended Communications with value chain Digitalize Business Processess (BPM) Internal Communications Enterprise Content Management (ECM) Publish business results & KPIs Information Protection & Governance Productivity & Collaboration 03 04 Executive Mobility Employee Engagement (Store/Production) Enterprise Search Learning paths & Video
  • 11. Audio Conferencing Phone System Azure Active Directory Plan 2 Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection P1 & P2 Azure Advanced Threat Protection Azure Information Protection P2 Microsoft Cloud App Security Advanced eDiscovery, Customer Lockbox, Advanced Data Governance, Service Encryption with Customer Key, Office 365 Privileged Access Management Power BI Pro Windows Enterprise Office client apps (Word, Excel PowerPoint, OneNote, Access) Office Mobile Apps and Office Online Outlook Exchange Teams Skype for Business SharePoint Yammer OneDrive for Business Microsoft Stream Sway for Office 365 PowerApps & Flow Planner To-do Microsoft 365 Admin Center Microsoft Intune Windows Autopilot, Fine Tuned User Experience, and Windows Analytics Device Health System Center Configuration Manager Windows Hello, Credential Guard and Direct Access Azure Active Directory Plan 1 Microsoft Advanced Threat Analytics Windows Defender Antivirus and Device Guard Office 365 Data Loss Prevention Windows Information Protection and BitLocker Azure Information Protection P1 Microsoft Secure Score Microsoft Security and Compliance Center MyAnalytics Microsoft 365 E5 Microsoft 365 Windows 10 + Office 365 +EMS Microsoft 365 E3