SlideShare a Scribd company logo
1 of 30
PARTNER LOGO HERE
Microsoft Gold or
Silver Partner Logo
Optionally here
Tõnis Tikerpäe
The age of the customer
Started by the explosion of social and mobile technology
Companies are responding by delivering amazing customer experiences
Business leaders
Enable employees to work anywhere,
from any device
Transform the way we do business
with mobile devices and apps
Delight customers with new
digital experiences
IT leaders
Help business leaders achieve
these goals
Ensure solutions are cost-efficient,
secure, and manageable
Why enterprise mobility matters:
Productivity
Devices
Line of business apps
Identity
Management
Data
How can I mobilize my apps?
BYOD, CYOD, or Corporate-owned?
How do we go beyond email and calendar?
Can we centralize our identity stores?
How do I maintain control over a mobile environment?
Is my corporate data protected?
Mobility is the new normal72%
72% of employees who use
smartphones for work
select their smartphones
personally*
>80%
>80% of employees admit
to using non-approved
software-as-a-service (SaaS)
applications in their jobs**
>70%
>70% percentof network
intrusions exploitedweak or
stolen credentials***
Source:
* Forrester Research: “Building The Business Case For A Bring-Your-Own-Device (BYOD) Program,” Dec. 4, 2014
** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
*** Verizon 2013 data breach investigation report
User Devices Apps Data IT
What's driving change?
Windows Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and audit
reports, multi-factor
authentication
Self-service password reset
and group management
Connection between Active
Directory and Azure Active
Directory
Introducing the Enterprise Mobility Suite
Microsoft Azure Rights Management service
Information protection Connection to on-premises
assets
Bring your own key
Advanced Threat Analytics (ATA)
Single sign-on
Self-service experiences
SaaS applications
Multi-factor authentication
Desktop
virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Security reports
Self-service Single
sign on
•••••••••••
Username
On-premises
Simple
connection
Azure Active Directory
Cloud
Office 365
Public
cloud
SaaS
Azure
Other
Directories
Windows Server
Active Directory
Phone callMobile app Single-use
codes
••••••••
SMS
“ ”
cloudOn-premises
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Managed productivity with Office mobile apps
Mobile app management and app wrapping
Conditional access to corporate resources
Simplified device enrollment
Mobile device &
application
management
Mobile application
management
PC managementMobile device
management
Intune helps organizations provide their employees with access to corporate
applications, data, and resources from virtually anywhere on almost any device,
while helping to keep corporate information secure.
ITUser
Microsoft Intune
Device
enrolled
Apply policy
Company Portal
Recommended apps for User’s devices
ITUser
Maximize mobile productivity and protect corporate
resources with Office mobile apps
Extend these capabilities to existing line-of-business apps
using the Intune App Wrapping Tool
Enable secure viewing of content using the Managed
Browser, PDF Viewer, AV Player, and Image Viewer apps
Managed apps
Personal appsPersonal apps
Managed apps
ITUser
Personal apps
Managed apps
Maximize productivity while preventing leakage of
company data by restricting actions such as
copy/cut/paste/save in your managed app ecosystem
User
Personal apps
Managed apps Company Portal
Are you sure you want to wipe
corporate data and applications
from the user’s device?
OK Cancel
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
ITIT
Windows Intune integreeritud System Center 2012 R2
Configuration Manager serveriga
IT
Mac OS X
Windows PCs
(x86/64, Intel SoC),
Windows to Go
Windows Embedded
Windows Phone 8.x
iOS, Android
Single Admin
Console
Microsoft System Center 2012 R2
configuration manager
Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Conditional access to corporate resources
Secure data sharing
Easy management and control
Rights
management
Data
encryption
Policy
enforcement
Azure Active Directory
Share internally Share externally
Vendor 2
Azure Rights
Management
!
Sender Vendor
Username
Password
john@vendor.com
•••••••••••••
Username
Password
sarah@vendor.com
•••••••••••••
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Rich user experience
Efficient management
Information protection
Authentication
Microsoft ID
Azure AD
Federated identity with
Azure AD
Azure RemoteApp Service
Storage
Cloud storage
Devices
Cloud apps
LOB Applications
Devices On-premises
data
Cloud apps
Storage
Cloud storage
On-premises storage
Authentication
Federated identity with
Azure AD
Azure RemoteApp Service
Behavioral
Analytics
Detection for known
attacks and issues
Advanced Threat
Detection
An on-premises solution to identify advanced security attacks before they cause damage
Analyze1 After installation:
• Simple non-intrusive port mirroring
configuration copies all Active Directory
related traffic
• Remains invisible to the attackers
• Analyzes all Active Directory network traffic
• Collects relevant events from SIEM and
information from Active Directory (titles,
groups membership and more)
ATA:
• Automatically starts learning and profiling
entity behavior
• Identifies normal behavior for entities
• Learns continuously to update the activities
of the users, devices, and resources
Learn2
What is entity?
Entity represents users, devices, or resources
Detect3 Microsoft Advanced Threat
Analytics:
• Looks for abnormal behavior and identifies
suspicious activities
• Only raises red flags if abnormal activities are
contextually aggregated
• Leverages world-class security research to
detect security risks and attacks in near real-
time based on attackers Tactics, Techniques
and Procedures (TTPs)
ATA not only compares the entity’s behavior
to its own, but also to the behavior of
entities in its interaction path.
Alert4
ATA reports all suspicious
activities on a simple,
functional, actionable
attack timeline
ATA identifies
Who?
What?
When?
How?
For each suspicious
activity, ATA provides
recommendations for
the investigation and
remediation.
Place Partner Logo here and/or Microsoft
Partner Program Logo
tonis.tikerpae@primend.com
Aitäh!

More Related Content

What's hot

Azure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisAzure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisITCamp
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce ProductivityOneLogin
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
Benefits of Extending PowerCenter with Informatica Cloud
Benefits of Extending PowerCenter with Informatica CloudBenefits of Extending PowerCenter with Informatica Cloud
Benefits of Extending PowerCenter with Informatica CloudAshwin V.
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debriefJason Poyner
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityGui Carvalhal
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern ManagementDavid J Rosenthal
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 

What's hot (20)

Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Azure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisAzure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas Dovydaitis
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
Benefits of Extending PowerCenter with Informatica Cloud
Benefits of Extending PowerCenter with Informatica CloudBenefits of Extending PowerCenter with Informatica Cloud
Benefits of Extending PowerCenter with Informatica Cloud
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern Management
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 

Similar to Primendi Pilveseminar - Enterprise Mobility suite

Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptxAshvin Dixit
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowRichard Harbridge
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 

Similar to Primendi Pilveseminar - Enterprise Mobility suite (20)

Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 

More from Primend

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Primend
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Primend
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Primend
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulPrimend
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Primend
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Primend
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Primend
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedPrimend
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Primend
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Primend
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Primend
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Primend
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPrimend
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Primend
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedPrimend
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing PiecePrimend
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Primend
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend
 

More from Primend (20)

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemused
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudised
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing Piece
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduks
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
 

Recently uploaded

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 

Recently uploaded (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 

Primendi Pilveseminar - Enterprise Mobility suite

  • 1. PARTNER LOGO HERE Microsoft Gold or Silver Partner Logo Optionally here Tõnis Tikerpäe
  • 2. The age of the customer Started by the explosion of social and mobile technology Companies are responding by delivering amazing customer experiences
  • 3. Business leaders Enable employees to work anywhere, from any device Transform the way we do business with mobile devices and apps Delight customers with new digital experiences IT leaders Help business leaders achieve these goals Ensure solutions are cost-efficient, secure, and manageable Why enterprise mobility matters:
  • 4. Productivity Devices Line of business apps Identity Management Data How can I mobilize my apps? BYOD, CYOD, or Corporate-owned? How do we go beyond email and calendar? Can we centralize our identity stores? How do I maintain control over a mobile environment? Is my corporate data protected?
  • 5. Mobility is the new normal72% 72% of employees who use smartphones for work select their smartphones personally* >80% >80% of employees admit to using non-approved software-as-a-service (SaaS) applications in their jobs** >70% >70% percentof network intrusions exploitedweak or stolen credentials*** Source: * Forrester Research: “Building The Business Case For A Bring-Your-Own-Device (BYOD) Program,” Dec. 4, 2014 ** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report *** Verizon 2013 data breach investigation report
  • 6. User Devices Apps Data IT What's driving change?
  • 7. Windows Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi-factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory Introducing the Enterprise Mobility Suite Microsoft Azure Rights Management service Information protection Connection to on-premises assets Bring your own key Advanced Threat Analytics (ATA)
  • 8. Single sign-on Self-service experiences SaaS applications Multi-factor authentication Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Security reports
  • 9. Self-service Single sign on ••••••••••• Username On-premises Simple connection Azure Active Directory Cloud Office 365 Public cloud SaaS Azure Other Directories Windows Server Active Directory
  • 10. Phone callMobile app Single-use codes •••••••• SMS “ ” cloudOn-premises
  • 11. Access & information protection Desktop Virtualization Hybrid identity Managed productivity with Office mobile apps Mobile app management and app wrapping Conditional access to corporate resources Simplified device enrollment Mobile device & application management
  • 12. Mobile application management PC managementMobile device management Intune helps organizations provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure. ITUser Microsoft Intune
  • 14. Maximize mobile productivity and protect corporate resources with Office mobile apps Extend these capabilities to existing line-of-business apps using the Intune App Wrapping Tool Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal appsPersonal apps Managed apps ITUser
  • 15. Personal apps Managed apps Maximize productivity while preventing leakage of company data by restricting actions such as copy/cut/paste/save in your managed app ecosystem User
  • 16. Personal apps Managed apps Company Portal Are you sure you want to wipe corporate data and applications from the user’s device? OK Cancel Perform selective wipe via self-service company portal or admin console Remove managed apps and data Keep personal apps and data intact ITIT
  • 17. Windows Intune integreeritud System Center 2012 R2 Configuration Manager serveriga IT Mac OS X Windows PCs (x86/64, Intel SoC), Windows to Go Windows Embedded Windows Phone 8.x iOS, Android Single Admin Console Microsoft System Center 2012 R2 configuration manager
  • 18. Mobile device & application management Access & information protection Desktop Virtualization Hybrid identity Conditional access to corporate resources Secure data sharing Easy management and control
  • 20. Vendor 2 Azure Rights Management ! Sender Vendor Username Password john@vendor.com ••••••••••••• Username Password sarah@vendor.com •••••••••••••
  • 21. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Rich user experience Efficient management Information protection
  • 22. Authentication Microsoft ID Azure AD Federated identity with Azure AD Azure RemoteApp Service Storage Cloud storage Devices Cloud apps
  • 23. LOB Applications Devices On-premises data Cloud apps Storage Cloud storage On-premises storage Authentication Federated identity with Azure AD Azure RemoteApp Service
  • 24. Behavioral Analytics Detection for known attacks and issues Advanced Threat Detection An on-premises solution to identify advanced security attacks before they cause damage
  • 25. Analyze1 After installation: • Simple non-intrusive port mirroring configuration copies all Active Directory related traffic • Remains invisible to the attackers • Analyzes all Active Directory network traffic • Collects relevant events from SIEM and information from Active Directory (titles, groups membership and more)
  • 26. ATA: • Automatically starts learning and profiling entity behavior • Identifies normal behavior for entities • Learns continuously to update the activities of the users, devices, and resources Learn2 What is entity? Entity represents users, devices, or resources
  • 27. Detect3 Microsoft Advanced Threat Analytics: • Looks for abnormal behavior and identifies suspicious activities • Only raises red flags if abnormal activities are contextually aggregated • Leverages world-class security research to detect security risks and attacks in near real- time based on attackers Tactics, Techniques and Procedures (TTPs) ATA not only compares the entity’s behavior to its own, but also to the behavior of entities in its interaction path.
  • 28. Alert4 ATA reports all suspicious activities on a simple, functional, actionable attack timeline ATA identifies Who? What? When? How? For each suspicious activity, ATA provides recommendations for the investigation and remediation.
  • 29.
  • 30. Place Partner Logo here and/or Microsoft Partner Program Logo tonis.tikerpae@primend.com Aitäh!