This document summarizes an OpusCapita webinar about using Microsoft Azure as a secure platform for source-to-pay processes. It discusses OpusCapita's capabilities in payments, procurement, receivables, and cash management. It then covers the gap between digital ambitions and reality for many organizations. The presentation explains how Azure provides a secure foundation with built-in controls, a secure operating environment, and integrated partner solutions. It argues that Azure's intelligence, scale, and Microsoft's security investments help customers securely manage their data, applications, and networks in the cloud.
3. Rowan Lemley, Head of Product
Marketing, OpusCapita
INTRODUCTIONS
Juhani Vuorio, Partner
Development Manager,
Microsoft
4. OPUSCAPITA BY THE NUMBERS
Established 1984
~350 Employees
65m € Revenue 2019
3000 Customers with
users in over 100
Countries
Over 1 Million Suppliers
and 100,000,000
eTransactions
Over 40,000,000
products and services
bought & sold
Over 130 Billion € in
payments annually
5. GLOBAL
PAYMENTS
PAYABLES
AUTOMATION
SOURCING &
SUPPLIER
ENGAGEMENT
RECEIVABLES
AUTOMATION
OPERATIONAL
PROCUREMENT
CASH
MANAGEMENT
Comprehensive
supplier information
management and
agile sourcing for
goods and services.
Improve your cash
inflows and reduce
the time spent
matching payments
to invoices.
Create a centralized
product catalog with
a modern guided
buying experience
with full mobility.
Consolidate and
optimize your in-
house bank and
liquidity
management
functions.
Enable control and
compliance over AP while
dramatically lowering
transactional costs.
Connect directly to over
200 banks, SWIFT certified
for global payment
coverage.
OpusCapita is a platform
that combines source-to-
pay & cash management,
enabling full source-to-cash
process optimization.
HOW WE SUPPORT YOU
CONNECT, TRANSACT
AND GROW ON THE
OPUSCAPITA BUSINESS
NETWORK
7. DIGITAL OPTIMIZATION
The process of using digital
technology to improve existing
operating processes and/or
business models.
DIGITAL TRANSFORMATION
The process of exploiting the
latest digital technologies and
practices to create a new
sustainable digital business
model.
THE PATH TO BECOMING A DIGITAL BUSINESS
Gartner, Digital Business Transformation: Closing the Gap Between Ambition and Reality, Ian Cox, Kristin Moyer, 18 June 2018.
8. Progress in Digital
Transformation
Question:
- Why are so few
organizations
succeeding in their
ambitions and does it
have anything to do
with their goals?
*Figure 6 from “Gartner, Digital Business Transformation: Closing the Gap Between Ambition and Reality, Ian Cox, Kristin Moyer, 18 June
2018.”
9. The Gap between
ambition and
performance
Question:
- How well do you feel
your organization will
meet its ambitions?
*Figure 7 from “Gartner, Digital Business Transformation: Closing the Gap Between Ambition and Reality, Ian Cox, Kristin
Moyer, 18 June 2018.”
15. Incident
assessment
Customer
notification
Operational security
Secure Foundation
Restricted access for
Microsoft administrators
Identity isolation and secure
operator workstations
Grants least privilege required to complete
task
3500+ security professionals
Working to harden, patch and protect
the platform
24x7 monitoring for threats; assume
breach drills
Incident response
Multi-step incident response process
Focus on containment & recovery
17. VIRTUAL
MACHINES
APPLICATIONS STORAGE & DATABASES
Built-in Controls | Security Management
Enable centralized view of security state across
cloud and on-premises workloads
• Monitor security across all subscriptions and environments
Ensure compliance to your requirements
• Configure centralized security policy and view compliance score
across different resources in a central dashboard
Integrate auditing, logging with existing processes
• Configure auditing, logging and use Log Analytics for
advanced analysis
• Export security data to existing SIEM solutions
NETWORK
18. Simplify security with Azure services
Security
management
Data
protection
Network
security
Threat
protection
Identity &
access
management
Azure Active Directory
Multi-Factor
Authentication
Role Based Access
Control
Encryption
(Disks, Storage, SQL)
Azure Key Vault
VNET, VPN, NSG
Application Gateway
(WAF), Azure Firewall
DDoS Protection
Standard
ExpressRoute
Azure Security Center
Azure Log Analytics
+ Partner Solutions
Built-in Controls
Azure Active Directory
(Identity Protection)
Confidential
Computing
Microsoft Antimalware
for Azure
20. Azure is your trusted cloud
Microsoft Azure
Unique Intelligence
Built-in Controls
Secure foundation
Built-in tools and integrated
partner solutions help you
secure, understand, and
manage your data, apps,
and network
Advanced security analytics,
intelligent threat detection,
and machine learning make
it easy for you to detect and
respond to threats quickly
Microsoft manages this
security in a shared security
model, with massive scale
investment in infrastructure
and operations