This document outlines a 5-day workshop to deploy Microsoft 365 Business for a customer. It includes an agenda with sessions on engagement kickoff, assessments, deployments, security configurations, data governance, and migration. Each day involves project reviews, workshops, and documentation of completed work. The primary goals are to assess security risks, create remediation plans, deploy Microsoft 365 Business products, and assist with migrations.
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptxKamilaCordier2
This document describes Microsoft's FastTrack for Dynamics 365 program which helps organizations accelerate their Dynamics 365 implementations and go-live confidently. It does this through Success by Design, a prescriptive guidance framework based on Microsoft's experience from over 3,000 cloud deployments. Success by Design provides recommended practices, checklists, case studies and other resources. It also includes assistance from Microsoft experts who assess solutions for risks and help partners ensure their solutions are aligned to the product roadmap.
The document discusses Microsoft Premier Services and how it helps organizations maximize their return on IT investments. Premier Services provides 24/7 support to increase system uptime and offers proactive services beyond just break/fix support. It helps customers implement and maintain their on-premise and Office 365 environments more effectively through services like risk assessments, optimization recommendations, and knowledge transfer. The document provides an example of how Premier Services has helped the Ohio Bureau of Workers Compensation with various proactive engagements over the years.
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxJasper Oosterveld
Thinking about Governance doesn't get many people excited. That said, defining and implementing Governance is the key to a successful rollout and adoption of Microsoft Teams. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, is taking a hands-on approach around Governance for Microsoft Teams. You can expect real world advise around a variety of topics: naming convention, external access, expiration policy, information protection and the creation process. After this session you are ready to go back and build your own successful Governance for Microsoft Teams.
Swapnil Srivastava has over 5 years of experience as an Azure Administrator and IT support engineer. He has worked on projects for companies like Royal Dutch Shell, Accenture, and Intertek, where he managed Azure environments, provided desktop support, and troubleshot issues with applications, hardware, and networking. His technical skills include Azure administration, Office 365 administration, Windows server administration, and troubleshooting Exchange, Active Directory, and networking issues.
This proposal outlines a customer community solution for mooi. It includes an overview of objectives, requirements, capabilities, examples, delivery methodology, timeline, budget, and project team. The solution aims to establish a partner community, deal registration flows, and meet objectives around partnership management. An iterative approach is proposed for design, development, testing and launch over 10 weeks with a professional services investment of $XXX,XXX. The project team would consist of roles like a project manager, architects, developers and analysts.
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
Microsoft 365 Copilot is a revolutionary productivity assistant that leverages large language models (LLMs) and your organisational data to help you create, communicate, and collaborate more effectively across Microsoft 365 apps.
Copilot can assist you with various tasks, such as drafting emails, making presentations, processing data, and finding insights. But to make the most of this game-changing technology, you must master three key aspects: adoption, data security, and governance.
In this two-part session, a Microsoft 365 expert, Nikki will guide you through these aspects and show you how to use Copilot to boost your productivity, creativity, and confidence.
In the second part of the session, Nikki will concentrate on data security and governance. She will explain that implementing Microsoft 365 Copilot requires a strategic approach beyond just adopting the technology. To truly unlock its potential, you must prioritise governance and data security. Without these crucial components, you risk oversharing and surfacing outdated information.
Key takeaways:
– The risks of not addressing data security and governance as part of your Microsoft 365 Copilot transformation
– How to configure Microsoft 365 for “just enough access” to safeguard your sensitive data
– How to improve data governance to deliver more accurate and relevant recommendations
How Meark as an enterprise leverages DSDM?AgileNetwork
The presentation covers one of the Agile Methodologies. Dynamic Systems Development Method (DSDM) is a framework based originally around Rapid Application Development (RAD).DSDM recognises that projects are limited by time and resources, and plans accordingly to meet the business needs.
Technical Webinar: By the (Play) Book: The Agile Practice at OutSystemsOutSystems
In 2001, the Agile Manifesto took the world by storm, and it changed how software is built forever. Also in 2001, OutSystems, another disruptive force in the world of traditional waterfall software development, was born.
Not coincidentally, OutSystems has been using Agile Practices all along. However, because of the sheer speed at which we’re able to respond, we’ve had to come up with a few twists in our approach. We’re even putting it into a services delivery playbook.
In our webinar, “By the (Play)Book: The Agile Practice at OutSystems,” Engagement Guild Master and Expert Nuno Fernandes will show you how OutSystems approaches Agile Development and makes sure nothing slips.
In this session you will:
- Learn roles and respective responsibilities.
- Understand project phases with a clear focus on sprint development.
- Discover how we approach the user story life cycle in particular.
- See how a really solid structure, calendar and organization help maximize productivity.
Webinar: https://www.outsystems.com/learn/courses/59/webinar-the-agile-practice-at-outsystems/
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptxKamilaCordier2
This document describes Microsoft's FastTrack for Dynamics 365 program which helps organizations accelerate their Dynamics 365 implementations and go-live confidently. It does this through Success by Design, a prescriptive guidance framework based on Microsoft's experience from over 3,000 cloud deployments. Success by Design provides recommended practices, checklists, case studies and other resources. It also includes assistance from Microsoft experts who assess solutions for risks and help partners ensure their solutions are aligned to the product roadmap.
The document discusses Microsoft Premier Services and how it helps organizations maximize their return on IT investments. Premier Services provides 24/7 support to increase system uptime and offers proactive services beyond just break/fix support. It helps customers implement and maintain their on-premise and Office 365 environments more effectively through services like risk assessments, optimization recommendations, and knowledge transfer. The document provides an example of how Premier Services has helped the Ohio Bureau of Workers Compensation with various proactive engagements over the years.
TeamsNation 2022 - Governance for Microsoft Teams - A to Z.pptxJasper Oosterveld
Thinking about Governance doesn't get many people excited. That said, defining and implementing Governance is the key to a successful rollout and adoption of Microsoft Teams. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, is taking a hands-on approach around Governance for Microsoft Teams. You can expect real world advise around a variety of topics: naming convention, external access, expiration policy, information protection and the creation process. After this session you are ready to go back and build your own successful Governance for Microsoft Teams.
Swapnil Srivastava has over 5 years of experience as an Azure Administrator and IT support engineer. He has worked on projects for companies like Royal Dutch Shell, Accenture, and Intertek, where he managed Azure environments, provided desktop support, and troubleshot issues with applications, hardware, and networking. His technical skills include Azure administration, Office 365 administration, Windows server administration, and troubleshooting Exchange, Active Directory, and networking issues.
This proposal outlines a customer community solution for mooi. It includes an overview of objectives, requirements, capabilities, examples, delivery methodology, timeline, budget, and project team. The solution aims to establish a partner community, deal registration flows, and meet objectives around partnership management. An iterative approach is proposed for design, development, testing and launch over 10 weeks with a professional services investment of $XXX,XXX. The project team would consist of roles like a project manager, architects, developers and analysts.
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
Microsoft 365 Copilot is a revolutionary productivity assistant that leverages large language models (LLMs) and your organisational data to help you create, communicate, and collaborate more effectively across Microsoft 365 apps.
Copilot can assist you with various tasks, such as drafting emails, making presentations, processing data, and finding insights. But to make the most of this game-changing technology, you must master three key aspects: adoption, data security, and governance.
In this two-part session, a Microsoft 365 expert, Nikki will guide you through these aspects and show you how to use Copilot to boost your productivity, creativity, and confidence.
In the second part of the session, Nikki will concentrate on data security and governance. She will explain that implementing Microsoft 365 Copilot requires a strategic approach beyond just adopting the technology. To truly unlock its potential, you must prioritise governance and data security. Without these crucial components, you risk oversharing and surfacing outdated information.
Key takeaways:
– The risks of not addressing data security and governance as part of your Microsoft 365 Copilot transformation
– How to configure Microsoft 365 for “just enough access” to safeguard your sensitive data
– How to improve data governance to deliver more accurate and relevant recommendations
How Meark as an enterprise leverages DSDM?AgileNetwork
The presentation covers one of the Agile Methodologies. Dynamic Systems Development Method (DSDM) is a framework based originally around Rapid Application Development (RAD).DSDM recognises that projects are limited by time and resources, and plans accordingly to meet the business needs.
Technical Webinar: By the (Play) Book: The Agile Practice at OutSystemsOutSystems
In 2001, the Agile Manifesto took the world by storm, and it changed how software is built forever. Also in 2001, OutSystems, another disruptive force in the world of traditional waterfall software development, was born.
Not coincidentally, OutSystems has been using Agile Practices all along. However, because of the sheer speed at which we’re able to respond, we’ve had to come up with a few twists in our approach. We’re even putting it into a services delivery playbook.
In our webinar, “By the (Play)Book: The Agile Practice at OutSystems,” Engagement Guild Master and Expert Nuno Fernandes will show you how OutSystems approaches Agile Development and makes sure nothing slips.
In this session you will:
- Learn roles and respective responsibilities.
- Understand project phases with a clear focus on sprint development.
- Discover how we approach the user story life cycle in particular.
- See how a really solid structure, calendar and organization help maximize productivity.
Webinar: https://www.outsystems.com/learn/courses/59/webinar-the-agile-practice-at-outsystems/
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
The document provides an overview of James Dimas' IT infrastructure approach and experience, including:
- Converged infrastructure and experience with companies focusing on shared IT resources and cloud strategies.
- Experience with Microsoft technologies like Axapta ERP and collaboration tools.
- Experience with virtualization technologies from Citrix and VMware.
- Networking exposure through Cisco and previous telecom experience.
- Storage experience including cloud solutions like Dropbox and Sharefile.
- Strong background in project management with a focus on PRINCE2 methodology and past experience managing an ERP implementation project using Agile/SCRUM practices.
Ray Business Technologies Process Methodologyray biztech
This document describes the process methodology used by Ray Business Technologies for IT project deliveries. It involves a 4D delivery process of discover, define, develop and deploy phases. Key aspects include iterative development with deliverables in each phase. The methodology is modeled after agile principles and includes roles like project manager, architect and developers. Typical project deliverables and change management process are also outlined. The company provides IT solutions and services from its locations in India, US and UK.
SITB130: Project Management for the Digitally EnabledIvanti
This document summarizes an event about project management for digitally enabled projects. It discusses how project management ensures IT projects stay on course to drive value. It also shares experiences from global project managers and their methodology. Finally, it discusses best practices for communications, and quotes from customers that found the project management support to be responsive and guided them well through the process.
This document discusses the importance of having a business continuity plan (BCP) to protect critical business services from disasters and interruptions. It outlines key elements of an effective BCP such as risk assessment, priority setting, recovery strategies, testing, and maintenance. The document also introduces disaster recovery as a service (DRaaS) as a cost-effective solution that can provide data replication, high availability, and rapid recovery in the event of an outage. DRaaS helps ensure business continuity with minimal on-site infrastructure and reduced costs compared to traditional disaster recovery methods.
Suman Kumar Ghosh is a Software Quality Assurance Consultant and Test Delivery Manager with over 14 years of experience delivering testing solutions for global projects worth $3 million annually. He has expertise in test automation, test strategy development, manual testing, and establishing test environments. Currently he works as a QA Consultant for Morrison's PLC in the UK testing Oracle Retail and Amazon Web Services projects. Previously he was a Test Manager for AIG Fixed Annuities testing mainframe to .NET migrations and consolidations.
This document contains a summary of Jai Dinesh Babu's professional experience and qualifications. It outlines his 17 years of experience in project management, technical architecture, and data modeling. It also lists his educational background and technical expertise in areas such as Oracle, SQL, and data modeling tools. Specific projects are mentioned, including roles as Project Lead for Walmart and Sprint accounts while at Accenture.
Working effectively with primavera supportp6academy
The document provides information about working effectively with Oracle Primavera Support. It outlines new support resources available, such as Product Information Centers, Oracle Configuration Manager, health checks, and Advisor webcasts. It also discusses best practices for working with support engineers on service requests, including providing key details, requesting phone calls or collaborative sessions, and escalating issues through the escalation process if necessary. The presentation emphasizes using knowledge resources on My Oracle Support, such as power views, contact preferences, and saving service request profiles.
This document provides an overview of Rajesh Arangi's presentation on Oracle HCM Cloud implementation. The presentation details DAZ Systems' implementation methodology, success mantras for HCM implementation, and lessons learned from their implementation experiences. It includes an agenda covering Rajesh's background, DAZ Systems as an Oracle partner, their implementation methodology, and a Q&A section.
Sriranjani Ganapathiraman is a Salesforce.com Certified Developer and Administrator with over 2 years of experience designing and developing custom Salesforce applications including Visualforce pages, Apex classes and triggers. She has experience implementing customer and partner communities as well as apps for trouble ticketing and project management. Sriranjani is proficient in Apex, Visualforce, JavaScript, CSS and has worked on multiple projects for clients in the US and Europe.
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
Deloitte gave their view on an approach for successful identity and access management governance projects togehter with IBM Security Systems and CrossIdeas, an IBM company.
This document contains the resume of Durga Prasad Tripathy, who has over 14 years of experience in IT infrastructure management, data center management, database administration, and service delivery. He is seeking a leadership role where he can utilize his expertise in project management, customer service, and people management. His technical skills include SQL Server, Oracle, UNIX, and .NET.
The document discusses a CISO workshop agenda to modernize a security strategy and program. It includes:
- An overview of who should attend, such as the CISO, CIO, security directors, and business leaders.
- The agenda covers key context and fundamentals, business alignment, and security disciplines.
- Exercises are included to assess maturity, discuss recommendations, and assign next steps.
- Modules will provide guidance on initiatives like secure identities and access, security operations, and data security.
Pavankumar Kakarla is a senior software engineer with over 6 years of experience in system administration and IT infrastructure management, including 2 years of experience administering SCCM 2012. He holds an MBA in technology management and B.Tech in information technology, and has worked on software distribution projects for clients like Bosch and Lloyds Banking Group while demonstrating skills in areas such as SCCM, Windows Server, and ITIL processes. Kakarla is declaring the information in his resume to be correct to the best of his knowledge.
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...Chirag Patel
This document provides an overview of rolling out Microsoft Teams for collaboration in a global organization. It discusses planning a phased rollout that begins with chat functionality and expands to calls, meetings, and voice over time. Key aspects of the rollout plan covered include governance, business workshops to generate buy-in, upgrading from Skype for Business, and an ongoing adoption and training program utilizing business champions. Metrics and a roadmap for future collaboration tools are also reviewed.
The document discusses measuring agility in large organizations like IBM. It provides an overview of IBM's size and global presence. It then describes IBM's transition to more agile practices like Blue Communities, Agile methods, and tools to improve collaboration across distributed teams. The document evaluates IBM's agility based on a survey and finds that while making progress, IBM scores lower on agility than teams solely focused on agile. It concludes that measuring agility is possible but discusses what truly defines an agile organization.
This document discusses truths and misconceptions about agile software development. It begins by establishing that agile is more than a high-level concept, and discusses differences between traditional project management and agile principles. Key differences between agile methodologies like Scrum and XP are outlined. The document then addresses common misconceptions about agile and Scrum, establishing truths around topics like planning, fixed-date projects, risk management, rework, and the role of metrics and documentation in Scrum.
Moving Up the PVC Maturity Curve in Industrial ManufacturingZero Wait-State
The document discusses challenges with innovation management and proposes a market-driven innovation solution. It describes an innovation management system that helps companies generate and rationalize ideas, develop proposals aligned with market requirements, and optimize investment portfolios. The system aims to increase idea generation and quality, better align offerings with customer needs, and optimize return on innovation investment through quantifiable decision making across the entire innovation lifecycle.
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptxDuyVo750289
The Microsoft 365 Digital Workforce Workshop is a two-day engagement that helps customers envision how to enable their workforce to work from anywhere securely using Microsoft 365. The workshop assesses the customer's current environment and needs, demonstrates the value and capabilities of Microsoft 365 through presentations and experiences, and helps the customer develop a plan to implement prioritized scenarios around identity, Microsoft Teams, and security.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
More Related Content
Similar to 00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx
The document provides an overview of James Dimas' IT infrastructure approach and experience, including:
- Converged infrastructure and experience with companies focusing on shared IT resources and cloud strategies.
- Experience with Microsoft technologies like Axapta ERP and collaboration tools.
- Experience with virtualization technologies from Citrix and VMware.
- Networking exposure through Cisco and previous telecom experience.
- Storage experience including cloud solutions like Dropbox and Sharefile.
- Strong background in project management with a focus on PRINCE2 methodology and past experience managing an ERP implementation project using Agile/SCRUM practices.
Ray Business Technologies Process Methodologyray biztech
This document describes the process methodology used by Ray Business Technologies for IT project deliveries. It involves a 4D delivery process of discover, define, develop and deploy phases. Key aspects include iterative development with deliverables in each phase. The methodology is modeled after agile principles and includes roles like project manager, architect and developers. Typical project deliverables and change management process are also outlined. The company provides IT solutions and services from its locations in India, US and UK.
SITB130: Project Management for the Digitally EnabledIvanti
This document summarizes an event about project management for digitally enabled projects. It discusses how project management ensures IT projects stay on course to drive value. It also shares experiences from global project managers and their methodology. Finally, it discusses best practices for communications, and quotes from customers that found the project management support to be responsive and guided them well through the process.
This document discusses the importance of having a business continuity plan (BCP) to protect critical business services from disasters and interruptions. It outlines key elements of an effective BCP such as risk assessment, priority setting, recovery strategies, testing, and maintenance. The document also introduces disaster recovery as a service (DRaaS) as a cost-effective solution that can provide data replication, high availability, and rapid recovery in the event of an outage. DRaaS helps ensure business continuity with minimal on-site infrastructure and reduced costs compared to traditional disaster recovery methods.
Suman Kumar Ghosh is a Software Quality Assurance Consultant and Test Delivery Manager with over 14 years of experience delivering testing solutions for global projects worth $3 million annually. He has expertise in test automation, test strategy development, manual testing, and establishing test environments. Currently he works as a QA Consultant for Morrison's PLC in the UK testing Oracle Retail and Amazon Web Services projects. Previously he was a Test Manager for AIG Fixed Annuities testing mainframe to .NET migrations and consolidations.
This document contains a summary of Jai Dinesh Babu's professional experience and qualifications. It outlines his 17 years of experience in project management, technical architecture, and data modeling. It also lists his educational background and technical expertise in areas such as Oracle, SQL, and data modeling tools. Specific projects are mentioned, including roles as Project Lead for Walmart and Sprint accounts while at Accenture.
Working effectively with primavera supportp6academy
The document provides information about working effectively with Oracle Primavera Support. It outlines new support resources available, such as Product Information Centers, Oracle Configuration Manager, health checks, and Advisor webcasts. It also discusses best practices for working with support engineers on service requests, including providing key details, requesting phone calls or collaborative sessions, and escalating issues through the escalation process if necessary. The presentation emphasizes using knowledge resources on My Oracle Support, such as power views, contact preferences, and saving service request profiles.
This document provides an overview of Rajesh Arangi's presentation on Oracle HCM Cloud implementation. The presentation details DAZ Systems' implementation methodology, success mantras for HCM implementation, and lessons learned from their implementation experiences. It includes an agenda covering Rajesh's background, DAZ Systems as an Oracle partner, their implementation methodology, and a Q&A section.
Sriranjani Ganapathiraman is a Salesforce.com Certified Developer and Administrator with over 2 years of experience designing and developing custom Salesforce applications including Visualforce pages, Apex classes and triggers. She has experience implementing customer and partner communities as well as apps for trouble ticketing and project management. Sriranjani is proficient in Apex, Visualforce, JavaScript, CSS and has worked on multiple projects for clients in the US and Europe.
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
Deloitte gave their view on an approach for successful identity and access management governance projects togehter with IBM Security Systems and CrossIdeas, an IBM company.
This document contains the resume of Durga Prasad Tripathy, who has over 14 years of experience in IT infrastructure management, data center management, database administration, and service delivery. He is seeking a leadership role where he can utilize his expertise in project management, customer service, and people management. His technical skills include SQL Server, Oracle, UNIX, and .NET.
The document discusses a CISO workshop agenda to modernize a security strategy and program. It includes:
- An overview of who should attend, such as the CISO, CIO, security directors, and business leaders.
- The agenda covers key context and fundamentals, business alignment, and security disciplines.
- Exercises are included to assess maturity, discuss recommendations, and assign next steps.
- Modules will provide guidance on initiatives like secure identities and access, security operations, and data security.
Pavankumar Kakarla is a senior software engineer with over 6 years of experience in system administration and IT infrastructure management, including 2 years of experience administering SCCM 2012. He holds an MBA in technology management and B.Tech in information technology, and has worked on software distribution projects for clients like Bosch and Lloyds Banking Group while demonstrating skills in areas such as SCCM, Windows Server, and ITIL processes. Kakarla is declaring the information in his resume to be correct to the best of his knowledge.
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...Chirag Patel
This document provides an overview of rolling out Microsoft Teams for collaboration in a global organization. It discusses planning a phased rollout that begins with chat functionality and expands to calls, meetings, and voice over time. Key aspects of the rollout plan covered include governance, business workshops to generate buy-in, upgrading from Skype for Business, and an ongoing adoption and training program utilizing business champions. Metrics and a roadmap for future collaboration tools are also reviewed.
The document discusses measuring agility in large organizations like IBM. It provides an overview of IBM's size and global presence. It then describes IBM's transition to more agile practices like Blue Communities, Agile methods, and tools to improve collaboration across distributed teams. The document evaluates IBM's agility based on a survey and finds that while making progress, IBM scores lower on agility than teams solely focused on agile. It concludes that measuring agility is possible but discusses what truly defines an agile organization.
This document discusses truths and misconceptions about agile software development. It begins by establishing that agile is more than a high-level concept, and discusses differences between traditional project management and agile principles. Key differences between agile methodologies like Scrum and XP are outlined. The document then addresses common misconceptions about agile and Scrum, establishing truths around topics like planning, fixed-date projects, risk management, rework, and the role of metrics and documentation in Scrum.
Moving Up the PVC Maturity Curve in Industrial ManufacturingZero Wait-State
The document discusses challenges with innovation management and proposes a market-driven innovation solution. It describes an innovation management system that helps companies generate and rationalize ideas, develop proposals aligned with market requirements, and optimize investment portfolios. The system aims to increase idea generation and quality, better align offerings with customer needs, and optimize return on innovation investment through quantifiable decision making across the entire innovation lifecycle.
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptxDuyVo750289
The Microsoft 365 Digital Workforce Workshop is a two-day engagement that helps customers envision how to enable their workforce to work from anywhere securely using Microsoft 365. The workshop assesses the customer's current environment and needs, demonstrates the value and capabilities of Microsoft 365 through presentations and experiences, and helps the customer develop a plan to implement prioritized scenarios around identity, Microsoft Teams, and security.
Similar to 00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx (20)
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
2. Our expertise + Microsoft 365 Business
We can manage your security operations
remotely so you don’t have to…
Supporting point #1
Supporting point #2
Supporting point #3
We can help you integrate your…
Supporting point #1
Supporting point #2
Supporting point #3
We’re the expert in cloud deployment…
Supporting point #1
Supporting point #2
Supporting point #3
3. Introductions
Project Overview and Scope
Approach and Scope
Timeline
Engagement Process
Technology Overview
Microsoft 365 Business Overview
Windows Defender Exploit Guard
Office 365 Advanced Threat Protection (ATP)
Office 365 Data Loss Prevention (DLP)
Device Management Policies
Azure Information Protection (AIP)
Closing
Questions & Answers
Next Steps
4. Workflow and Schedule
Two weeks ago
Pre-Engagement meeting
Last week
Secure executive sponsor and
align resources to complete the
offer
Now
Complete the Microsoft 365
Business Secure Deployment
offer
One week from now
Present the findings, discuss
remediation and next steps.
Deliver prioritized roadmap
5. Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 1
Engagement Kickoff
Provides an overview of the
offer goals as well as an
opportunity to cover Q&A and
project governance.
Agreed plan and schedule for
the 2-day on-site assessment.
Confirm schedule and logistics
All project team 2 hours <Time>, <Room>
Start Assessment &
Remediation
Answer the questions from the
offline assessment and
examine Office 365 Secure
Score if applicable
Remediation Checklist Selected customer responders 6 hours <Time>, <Room>
Day 2
Day 1 Review
Review progress from day one,
discuss any open items and
identified issues.
Ready to move on with
completion of the Microsoft
GDPR Detailed Assessment.
All project team 0.5 hours
<Time>, <Room>
Complete Deployment
Workshop
Microsoft 365 Business
Deployment Plan
Selected customer responders
1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Microsoft 365 Business
Deployed
IT Team
6 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
6. Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 3
Day 2 Review
Review progress from day two,
discuss any open items and
identified issues.
Ready to move on with
completion of Security
Workshop
All project team 30 minutes <Time>, <Room>
Start Security Workshop
Security Plan Selected customer responders 1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Security features implemented IT Team 6 hours <Time>, <Room>
Day 4
Day 3 Review
Review progress from day
three, discuss any open items
and identified issues.
Ready to move on with
completion of Sensitive Data
Workshop
All project team 0.5 hours
<Time>, <Room>
Complete Sensitive Data
Workshop
Data Governance Plan Selected customer responders
1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Data governance features
implemented
IT Team
6 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
7. Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 5
Day 4 Review
Review progress from day
four, discuss any open items
and identified issues.
Ready to move on with
completion of Migration
Workshop
All project team 30 minutes <Time>, <Room>
Start Migration Workshop
Migration Plan Selected customer responders 1.5 hours <Time>, <Room>
Migration, outcome analysis &
Write-Up
Migration started IT Team 6 hours <Time>, <Room>
Days 6-10
Daily Review
Review progress from prior
day, discuss any open items
and identified issues.
Ready to continue with
migraiton
All project team 0.5 hours
<Time>, <Room>
Migration
Email and files migrated to
Office 365 Business
Selected customer responders
6.5 hours <Time>, <Room>
Outcome analysis & Write-Up
Status report & project close
on final day
IT Team
1 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
8. Customer Team - Workshop Attendees
Role Description Title Contact information
Project Executive
Sponsor
• Executive sponsor who is responsible for driving the strategic vision for the
organization & making key decisions
• Ultimate authority and accountability for the project and delivery on project
objectives
• Helps resolve issues escalated by project team
• Provides guidance and clarity regarding overall security strategy, standards
and policies for the organization
Project Manager
• Coordinates partner and working teams engaged in the project
• Schedules all meetings with appropriate resources
• Is the central point for dissemination of the engagement deliverables
• Records and manages project issues, including escalations
• Liaises with, and provides updates to, project executive sponsors
• Ensures that the on-site requirements are met in time for the on-site
workshops
IT Administrator(s)
and Security team
• Responsible for IT security strategy defined by the organization
• Analyses and chooses products for the organization that meets business goals
• Accountable for creating and maintaining the infrastructure
• Provides insights into current and planned IT & security guidelines,
requirements and standards for the organization
9. Partner Team - Workshop Attendees
Role Description Title Contact information
Project /
Engagement
Manager
• Develops and maintains project timeline
• Coordinates partner and working teams engaged in the project
• Manages project deliverables
• Records and manages project issues, including escalations
• Liaises with, and provides updates to, customer Project Manager
DeliveryArchitect
s / Consultants
• Prepares the workshop materials and delivers the workshops
• Performs deployment, configuration, and migration tasks
• Accountable for creating the engagement deliverables
10. Team Introductions
Please share your name and where you are from
Please share your role in the company
Please share your expectations of the session
11.
12. 14
Assist with the deployment of:
Microsoft 365 Business
Intune Device Management
Office 365 Advanced Threat Protection (ATP)
Data Loss Prevention (DLP)
Azure Information Protection (AIP)
13. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
15
Initiation Assess Remediate Enable Migrate
14. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
16
Initiation Assess Remediate Enable Migrate
Initiate team formation and
communicate expectations.
Conduct a detailed walk-
through of the SOW.
Complete the project
initiation and launch
prerequisites.
15. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
17
Initiation Assess Remediate Enable Migrate
Conduct the assessment
workshop.
Complete the Secure Score
assessment
Document the remediation
checklist.
16. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
18
Initiation Assess Remediate Enable Migrate
Provide the customer up to
½ day of remediation
activity assistance.
Update and finalize the
remediation checklist based
on Customer Name’s
feedback.
Customer to perform
remaining remediation
activities, resolving or
mitigating all items in the
remediation checklist.
17. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
19
Initiation Assess Remediate Enable Migrate
Conduct the deployment
workshop.
Update the deployment
plan based on Customer
input.
Assist with the deployment
of the products in scope.
Assist with the functional
testing of the deployed
solution.
18. We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
20
Initiation Assess Remediate Enable Migrate (optional)
Plan for migration of email
Plan for migration of files
Execute migration
19. The following items are considered out of scope for
this engagement—
For Office 365 ATP:
Deployment or configuration of non-Microsoft message hygiene solutions.
Migration of email block/allow lists.
Configuration of Domain Name System records required for DomainKeys
Identified Mail.
SIEM integration.
Creation of custom reports, dashboards, or delivery schedules.
Integration of Office 365 Advanced Threat Protection with other email
antivirus or antimalware solutions, whether on-premises or cloud-based.
21
20. The primary risks to the success of the
engagement are:
Delays in necessary changes to DNS for Office 365 custom
domains.
Unknown/Insecure mail flow ingress (bypassing EOP/ATP).
22. Complexity
Initial setup, fine-tuning, creating rules, policies, thresholds, and
baselines can take a long time.
Prone to false positives
You receive too many reports in a day with several false
positives that require valuable time you don’t have.
Designed to protect the perimeter
When attackers successfully compromise a user, your current
defenses provide limited detection and protection.
25
28. What’s new?
We’ve recently added advanced security features to Microsoft 365 Business to help businesses
protect against cyberthreats and safeguard sensitive information.
1. Office 365 Advanced Threat Protection
Attachment scanning & ML detection to catch
suspicious attachments
Link Scanning/Checking to prevent users from
clicking suspicious links
2. Windows Exploit Guard Enforcement
Preventing devices from ransomware and malicious
websites at device end points
Cyber Threats
1. Data Loss Prevention
Does Deep Content Analysis to easily identify, monitor,
and protect sensitive information from leaving org
2. Azure Information Protection
Controls & Manages how sensitive content is accessed
3. Intune Availability
Protecting data across devices with E2E Device and
app management
4. Exchange Online archiving
100GB Archiving & preservation policies to recover
data or remain compliant
5. BitLocker Enforcement
Encrypt Data on devices to protect data if device
lost or stolen
Safeguard Sensitive Information
29. [1] Indicates Office 365 has Plan 2 and Microsoft 365 Business has Plan 1 of the functionality
[2] Available in US, UK, Canada
Features (new in blue)
Office 365
E3
Microsoft 365
Business
Estimated retail price per user per month $USD (with annual commitment) $20 $20
Maximum number of users unlimited 300
Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote, Access), Office Online ProPlus Business
Email & Calendar Outlook, Exchange Online 100GB 50GB
Chat-based Workspace,
Meetings
Microsoft Teams, Skype For Business
File Storage OneDrive for Business, Unlimited 1 TB
Social, Video, Sites Stream, Yammer, Planner, SharePoint Online1, Power Apps1, Flow1
Business Apps Scheduling Apps – Booking, StaffHub
Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2
Threat Protection Office 365 Advanced Threat Protection
Windows Exploit Guard Enforcement
Identity & Access Management Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps
Device & App Management Office 365 MDM
Microsoft Intune, Windows AutoPilot, Windows Pro Management
Upgrade rights to Windows 10 Pro for Win 7/8/8.1 Pro licenses
Information Protection 100 GB Exchange Archiving, Office 365 Data Loss Prevention4
Azure Information Protection Plan 1, BitLocker Enforcement
On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype)
Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests
Comparison of Microsoft 365 Business and Office 365 E3
[3] Currently in public preview in US, UK, Canada
[4] Data Loss Prevention Features will be available summer 2018
30. Safeguard your data
Protect your company against
external threats and data leaks
Protection
fromthreats
Protectionfrom
dataleaks
Control
dataaccess
31. Safeguard your data:
Protectionfromthreats
AI-powered attachment scanning
detects malware previously not seen
Links are checked in real time to warn
you if the destination is a malicious site
Windows devices are monitored for
suspicious processes like ransomware
32. Safeguard your data:
Protectionfromdataleaks
Apply data loss prevention policies to
help keep sensitive information from
falling into the wrong hands*
Enforce BitLocker device encryption to
protect data if a computer is lost or
stolen
Manage all your devices—PCs, Mac, iOS,
and Android—with full-featured Intune
management
33. Safeguard your data:
Controldataaccess
Apply encryption and restrictions like
do not forward to emails and
documents
Remotely wipe business data without
affecting personal information
Require PIN or fingerprint to access
business documents and data
34. Security that travels with you
Protect your data and devices against malware, malicious
attacks, and device loss or theft. BitLocker, BitLocker to
Go, and Windows Information Protection help protect
business data on mobile devices by ensuring all business
data is encrypted and accessible only by authorized users.
Further protect Windows 10 devices from unauthorized
access using Windows Hello multi-factor authentication
to strengthen your users’ device credentials.
Perform a remote Selective Wipe of company data easily
on lost or stolen devices.
35. Reduce your security risk
Centralize control of your company data on
personal devices.
Reduce your risk profile with security features
for SMB customers.
Apply a consistent security configuration
profile, across managed devices.
Establish a baseline of security policies across
managed devices.
Configure devices consistently to help ensure
that your data and devices are protected from
malware and external threats.
36. Help protect your devices, data, and people
Know that lost or stolen devices are protected with Windows 10 built-in encryption
capabilities like BitLocker and BitLocker to Go.
Help prevent accidental data leaks by securely separating business information from
personal information with Windows Information Protection, and perform a remote
Selective Wipe of business data on demand while leaving personal data untouched.
Make sure employees always have access to files while confining company
information to Office apps, using App Protection for Office mobile apps capabilities
for personal iOS, and Android devices.
Make accessing Windows 10 devices more convenient, simple, and secure by using
Windows Hello biometric authentication2 to unlock devices with a look or a touch.
Help make sure that devices boot securely and that only trusted software can run
during start-up with Windows Trusted Boot used in combination with the PC industry
hardware standard, UEFI Secure Boot.
Enforce Windows Defender to always be on from within the admin console.
37.
38. Windows Defender Exploit Guard
Antivirus/antimalware detection and protection enhanced by cloud-
based analysis and insights.
Office 365 Advanced Threat Protection
Detection of—and protection against—malware and malicious links for
your Office 365 email and productivity apps.
Data Loss Prevention
Identify and protect sensitive information
Device Management Policies
Protect & secure devices and the business data access by and stored
on devices
Azure Information Protection
Classify, label, and protect files no matter where they are or where they
go 41
42. Apply policies that provide pre-breach threat resistance in Windows 10,
reducing the attack and exploit surface area of Windows and your
applications.
Automatically applies a number of exploit mitigation techniques on both the
operating system processes and on individual apps.
• Attack surface reduction
• Controlled folder access
• Network Protection
45
43. Targets specific behaviors that are typically used by malware and malicious
apps to infect machines, such as:
• Malware included as executable files and scripts in Office apps or email.
• Scripts that are obfuscated or otherwise suspicious.
• App behaviors that are not usually initiated during normal day-to-day work.
46
44. Protect company data from modification by suspicious or malicious apps,
such as ransomware. These types of apps are blocked from making changes
in protected folders.
Executable files (.exe, .scr, .dll files and others) are assessed by to determine if
the app is malicious or safe. If the app is determined to be malicious or
suspicious, then it will not be allowed to make changes to any files in any
protected folder.
47
45. Helps reduce the attack surface of your devices from Internet-based events.
Prevents employees from using any application to access dangerous domains
that may host:
• Phishing scams
• Exploits
• Other malicious content
48
Network protection
48. Advanced threat protection: Time-of-click protection for malicious links.
51
Web servers
perform latest URL
reputation check
Rewriting URLs to
redirect to a web
server.
User clicking URL is
taken to EOP web
servers for the latest
check at the “time-
of-click”
51. Our systems continuously update and enhance: Updating known ”malware” after discovery
of unknown file hash.
54
Email with attachment
Signature based AV
blocks known threats
#
52.
53. With DLP
, you can:
• Identify sensitive information across many locations.
• Prevent accidental sharing of sensitive information.
• Help users learn how to stay compliant without interrupting their workflow.
• View DLP reports showing content that matches your organization’s DLP
policies.
56
55. You may scope a policy to specific locations or all locations
All locations includes:
• SharePoint Online
• OneDrive for Business accounts
• Exchange mailboxes
58
56. • Over 80 built in sensitive item types
• Custom sensitive item types
59
57.
58. BitLocker is a data protection feature that encrypts drives on your computer
to help prevent data theft or exposure.
Simple setting to enforce BitLocker device encryption on all Windows devices
to help protect against data theft or exposure if a protected device is lost or
stolen
61
61. Automatically to protect a device that is lost or stolen
• Delete work files from an inactive device
• Save all work files to OneDrive for Business
• Encrypt work files
64
62. Settings that control how users access Office files on mobile devices
• Require a PIN or fingerprint to access Office apps
• Reset PIN when logins fail
• Require users to sign in again after Office apps have been idle
• Deny access to work files on jailbroken or rooted devices
• Don't allow users to copy content from Office apps into personal apps
65
63. Files used by these apps can be protected:
66
iOS / Android Windows 10
Word Mobile Office Desktop
Excel Mobile OneDrive
PowerPoint Mobile OneNote
Outlook Mobile Mail and Calendar
OneDrive Skype for Business
OneNote Microsoft Edge
Skype for Business Internet Explorer
Teams
64. Windows 10 devices have additional protection options:
• Prevent copying of company data
• Enable recovery of personal data
• Protection for additional company cloud locations
67
67. Challenges with the complex environment
Employees
Business partners
Customers
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
68. The problem is ubiquitous
Intellectual Property theft has
increased
56% rise data theft
Accidental or malicious breaches due
to lack of internal controls
88% of organizations are Losing control of
data
80% of employees admit to
use non-approved SaaS app 91% of breaches could have
been avoided
Organizations no longer confident in
their ability to detect and prevent threats
Saving files to non-approved cloud
storage apps is common
Sources:
72. SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
73. Policies for specific
groups/departments
Can be viewed and applied only
by the members of that group
Customization options for
labels, sub-labels, and settings
like mandatory labeling, default
label, and justifications
74.
75.
76. Reclassification
You can override a
classification and
optionally be required
to provide a justification
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
77. Label and protect any file through
the windows shell-explorer
Select either one file, multiple files
or a folder and apply a label
78. Query for file labels and protection
attributes
Set a label and/or protection for
documents stored locally or on file
shares
79. Classified as Microsoft Confidential
Role: Finance
Group: Contoso Finance
Office: London, UK
INTERNAL
Azure information
protection
Identifies document tagged
INTERNAL being shared publicly
Move to
quarantine
Restricted
to owner
USER
Uploaded to
public share
Admin notified
about problem.
CLOUD APP
SECURITY PORTAL
80. FINANCE
CONFIDENTIAL
Persistent labels that travel with the document
Labels are metadata written to
documents
Labels are in clear text so that other
systems such as a DLP engine can read
it
81. VIEW EDIT COPY PASTE
Email
attachment
FILE
Protect data needing protection by:
Encrypting data
Including authentication requirement and a
definition of use rights (permissions) to the data
Providing protection that is persistent and travels
with the data
Personal apps
Corporate apps
83. Use rights
+
Azure RMS never
sees the file content,
only the license
Apps protected with
RMS enforce rights
SDK
Apps use the SDK to
communicate with the
RMS service/servers
File content is never sent
to the RMS server/service
aEZQAR]ibr{qU@M]B
XNoHp9nMDAtnBfrfC
;jx+Tg@XL2,Jzu
()&(*7812(*:
Use rights
+
LOCAL PROCESSING ON PCS/DEVICES
84. Authentication & collaboration BYO Key
RMS connector
Authorization
requests go to
a federation
service
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
AAD Connect
ADFS
85. Authentication & collaboration BYO Key
RMS connector
Authorization
requests go to
a federation
service
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
Hold your key on premises
(roadmap)
AAD Connect
ADFS
HYO Key
86. Share internally, with business partners, and customers
Bob
Jane
Internal user
*******
External user
*******
Any device/
any platform
Sue
File share
SharePoint
Email
LoB
87. Leverage ad-hoc end user controls
or automatic policies
Protect
Mitigates risk of unintended disclosure
through encryption and rights protection
Control
Leverage automatic policies or ad hoc end-
user controls, for emails shared with anyone
Compliance
Meet obligations that require encrypting
data
Recipients can read
protected messages using
consumer identities
Easily read protected
emails on any device
88. Azure Active Directory
On-premises organizations
doing full sync
On-premises organizations
doing partial sync
Organizations completely in cloud
…and all of these organizations
can interact with each other.
Organizations created
through ad-hoc signup
ADFS
Using Azure AD for authentication
89. Monitor use, control and block abuse
Sue
Joe blocked in North America
Jane accessed from India
Bob accessed from South America
MAP VIEW
Jane blocked in Africa
Jane
Competitors
Jane access is revoked
Sue
Bob
Jane
90. WHY AZURE INFORMATION PROTECTION?
Persistent
protection
Safe
sharing
Intuitive
experience
Greater
control
91. Best Practice - Start small, do it now, and move quickly
1. Classify Take simple steps, it generates high-impact quickly (ie.‘Do Not
Forward’ for HR and Legal)
2. Label Test, phase the roll out, and learn – IT can’t know it all
3. Protect Control sensitive internal email flow across all PCs/Devices
4. Monitor ‘Share Protected’ files with business partners (B2B)
5. Respond Teach and enable users to revoke access
This deck is frequently updated with new insights and feedback from the field. Please keep version history up to date.
[Note: This customizable slide is for talking about your company and its value. You can fill it out with your own information and add your company logo.]
The time line provided is indicative and needs to be tailored to customers requirements and availability.
The pre-engagement meeting is there to set things in motion and to start the process of identifying the right people and take care of logistics. This usually takes a week.
The actual on-site engagement will start after the online re-engagement meeting and will take 1-2 weeks.
After completion a close out meeting will be conducted in which the outcomes will be presented.
Customize to match your assessment timeframe.
Customize to match your assessment timeframe.
Customize to match your assessment timeframe.
Update team member titles and names during the workshop.
Update team member titles and names prior to the workshop.
Ask everyone on the meeting to present themselves.
Note takers should capture this information in the provided template.
Limit to 30 seconds per person.
It is important to understand the role of the attendees, this will help in identifying the right responders for the questionnaire.
Adapt this slide based on the scope of the project
Instructions: Please remove items that are not in scope for your delivery. You may consider keeping the red text. If you choose to do so, please change the font to match the blue text.
Instructions: Update the timeframe for your scope and remove items that are out of scope for your delivery.
Customize this slide for your customer’s situation
Users face multiple threats—from credential theft (like Mimikatz, password spray, or breach harvesting) to malware (viruses, ransomware, and the like), to phishing (gaining access to a user’s computer and credentials) and infrastructure attacks (including improperly-secured virtual machines and resources in Azure).
Highlight the challenges with traditional tools, and remind them that most companies (including, most like, their own) have deployed numerous solutions from different vendors to address different threat vectors.
Emphasize that while attackers have had advantages in the past, defenders now have a number of advantages as well. Encourage them to think of technological shifts as “force multipliers”, capabilities which greatly enhance an organization’s ability to defend its own assets.
Deliver this section if customer will benefit from a primer on Microsoft 365 Business. We will touch on the major security components again so this section may be unnecessary for customers that already have a solid grasp on Microsoft 365 Business features & functionality.
In designing Microsoft 365 Business, we wanted to address the day to day technology challenges SMBs are facing.
Keeping your Technology Current: As an SMB it is hard to keep up with the changes in Technology and update your current systems. Any tech refresh is time consuming, possibly business disrupting – what you need is Technology that keeps up with your needs, that is agile with no down time
Mobile distributed workforce: Add to these, the challenges of a Mobile distributed workforce. According to a Yougov survey, 71% of employees in Small and Midsized business admit to accessing work content on their personal mobile devices. The technology demands of catering to a mobile, distributed workforce requires strong collaboration capabilities that transcends devices
Protecting Sensitive Data: 53% of SMBs collect sensitive information Like Social Security Number and 1 in 5 SMBs collect Bank account details. Given this and the rise in data breaches it is important to have technology to protect the intentional or unintentional transmission of sensitive data that could put you out of compliance or cause business threatening downtime
Cyber Threats & Phishing Schemes: 72% of SMBs believe that their company is very vulnerable to becoming a victim of Cyber-Attack. Again having technology in place that helps prevent you and your employees from being victims to phishing attacks and social engineered ransomware attacks is Paramount given current climate
What is Microsoft 365 Business?
Microsoft 365 Business is a complete integrated solution powered by Office 365 and windows 10 designed to help you securely run and grow your business.
It brings together the best-in-class productivity capabilities of Office 365 that enable you and your employees to create, connect and co-author from anywhere, on any device while also providing you peace of mind through sophisticated security features to safeguard your business information from threats.
Microsoft 365 Business also helps you build your business through specific tools that help you interact with and find new customers
With Microsoft 365 Business you have one subscription that enables collaboration, has tools that help you grow your business while providing you peace of mind by safe guarding your business information.
Now before we begin, let us take a minute to see what we’re going to cover today in Microsoft 365 Business:
You’re going to Learn how you can get more done with Intelligent tools built into the Office you love along with enterprise grade email and file storage
We’ll show you how you can work better together with the new Microsoft Teams and how you can collaborate as a group with your co-workers, customers and suppliers.
Microsoft 365 Business also includes specific business apps designed to help build the business Like Bookings and Outlook customer Manager for Example. These help you Get more customers and improve the efficiency of your business operations
We’ll also show how Microsoft 365 Business safeguards your data by Helping protect your company against external threats like phishing and malicious emails. It also includes features to help you protect sensitive information like Social security numbers, Credit card information etc from leaving the organization
Finally, we’ll show you how you can easily enable all of these features along with simplifying device setup so you can unlock the value of your Microsoft 365 Business subscription faster
let’s take a deeper dive in to what you get with your Microsoft 365 Business Subscription
Today, no matter what your small business does, data has never been more valuable. Your business contacts. Your SOWs and invoices. Your accounts information. Your methods and processes. Your templates. Your email.
Technology gives you the ability to access these things, to carry them around on a laptop or a mobile phone, but all of that access exposes them to risk. Employees who don’t understand how to create secure passwords or take precautions, or who forget a device, need guidance. That’s where simplified device management empowers you to take advantage of the enterprise-level security features of Windows 10 Pro.
In addition to Enabling all of these amazing productivity and collaboration features, M365 B gives you peace of mind by Safeguarding your business. It helps protect your company against external threats and data leaks of sensitive business information
And it does this by taking a layered approach to security:
First, you get Protection from sophisticated threats hidden in email attachments and links, and get cutting-edge defenses against zero-day threats, ransomware, and other advanced malware attempts.
Second, you get Protection from data leaks helping you prevent sensitive information like SSNs and customer credit card numbers from being shared outside your business
3rd you get to control and manage access to information. With M365 B, you can control who has access to company information by applying restrictions like Do not Copy and Do Not Forward. You can Enjoy peace of mind by remotely wiping business data on lost or stolen devices without affecting personal information
The top layer focuses on protecting your business from external threats by giving you access to the same enterprise-grade service and protection but without the need for an enterprise-sized IT department.
Our threat protection tools keep your business free of hazards such as spam, malware, viruses, phishing attempts, malicious links, etc. while helping to protect from sophisticated threats cunningly disguised as email attachments or links, zero-day ransomware, and other advanced threat techniques.
These capabilities come from our built-in malware protection capabilities that not only help you prevent threats, but also alert you if a breach has taken place and notify you when additional actions are required, and from advanced file encryption made possible through our BitLocker technology.
Unfortunately, we live in a day and age when virus and malware attacks are a common occurrence. When successful, these attacks can cause several issues for a company—from loss of customer trust to financial woes resulting from business-threatening downtime and more. ATP helps Protects your business from sophisticated phishing attacks, unsafe attachments, suspicious links, ransomware, and other advanced malware
The Threat Protection Features in Microsoft 365 Business scan each & every attachment coming in via email. It does a comprehensive, real time analysis of the behavior of the file to determine its intent (whether normal or malicious), thereby leading to better intelligent protection against unsafe attachments that are the basis for phishing schemes and ransomware infections
While it would be ideal for employees to understand they shouldn’t click on hyperlinks sent to them from people they don’t know—or messages with other obvious red flags—it’s not realistic to think that all of them will avoid phishing schemes. [Dave edit… replace the previous sentence with: Today’s “bad actors” are more clever than ever. Even your staff who understand that they shouldn’t click on hyperlinks sent from people they don’t know, could be easily fooled by today’s sophisticated phishing schemes.] These features remove the guesswork by doing the check for you and protecting your users from clicking through to malicious or unsafe sites or the system takes users to a warning page before allowing them access to the link.
These Threat Protection capabilities also extend to Device end points helping prevent users from interacting with Ransomware and malicious web locations
The second layer helps you protect your business data or sensitive customer or employee information from accidental leaks by utilizing Data Loss Prevention capabilities and mobile device management functionality across both iOS and Android devices which protect your sensitive data from being accessed from unauthorized locations or through unauthorized applications.
What you really get, in other words, is peace of mind that a file isn’t going to be magically lost or corrupted. The threat of information loss is what keeps you up at night, but with your files securely backed up in the cloud, and accessible only by you or your employees – even in the event of a lost or damaged device – you will never lay awake worrying about the security of your data again.
Small businesses deal with a variety of sensitive information like Customer credit card numbers, SSN, DOB or even intellectual property that is core to the running of the business. Keeping this information safe can be a challenge because expecting employees to manually check every email or document shared for sensitive information can be hard. The Data Loss Prevention policies in M365 Business help businesses easily identify, monitor, and protect sensitive information through deep content analysis
It Includes preconfigured templates that can help businesses detect specific types of sensitive information being communicated such as Credit Card Numbers, SSN, DOB or even locale-specific personally identifiable information (PII).
It also provides policy tips, which can help educate and prevent end users from accidental sharing of sensitive info by displaying a policy tip in Outlook.
Enforce device encryption with BitLocker to help protect against data theft or exposure if a computer is lost or stolen. Get End to End Intune Device Management across all your devices – PCs, Macs, Mobile devices to protect sensitive information from leaking
Controlling and managing access to who has access to content is the 3rd layer of your security strategy. A challenge that small businesses have is controlling & managing who has access to the company’s sensitive information. Enabling these controls without hindering productivity is also hard. Information Protection Policies in M365B provide capabilities to control & manage how information is accessed and making sure that only the right folks have access to the right data
Enjoy peace of mind with features such as:
The ability to communicate and collaborate securely while controlling access to sensitive information with controls like “Do No Forward”; “Do not copy” etc
The ability to classify sensitive information like “Confidential” and enable specific restriction for how classified can be shared outside and inside the business
The ability to securely share sensitive content with authorized external parties through easy to enable encryption controls
Instructions: Update this slide to match the scope of your delivery. Remove items that are not in scope or change the items in red to match the font used for the others.
The slide contents are relatively straightforward; highlight one or two capabilities based on your customer’s profile/history (for example, customers in the health care industry have been hugely impacted by ransomware, so that would be an excellent capability to discuss in more detail).
To tell this story more effectively, consider using content from the MSRC blog on recent success stories involving Windows Defender (for example, https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak/ or https://cloudblogs.microsoft.com/microsoftsecure/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses/).
Attack Surface Reduction = Use rules that reduce the attack surface of devices
Controlled folder access = Protect folders from threats such as ransomeware
Network protection = Prevent network access to potentially malicious content on the Internet
Safe Links provides real-time, time-of-click protection against malicious URLs in email by redirecting suspicious URLs to an internal web server that checks them against a list of known malicious sites which updated every 20 minutes. When users click on the rewritten URLs, Safe Links redirects them — based on the verdict from inspection — to either the original webpage or a page that warns the user that the site has been determined to be malicious.
Safe Links utilizes URL trace capabilities that allow you to track individual malicious links in messages that have been clicked to support faster remediation.
Safe Attachments helps to protect against zero day malware in email attachments by blocking messages that could be malicious. It is designed to detect malicious attachments even before antivirus signatures are available.
After passing through Office 365’s normal protection of three anti-virus engines and multiple spam filters provided by Exchange Online Protection, email with a suspicious attachment enters the Safe Attachments’ sandbox environment where we spin up multiple hypervisor environments, each running various versions of a Windows operating system, Office and common 3rd party applications. Attachments are not released until a behavior analysis is performed and the attachments are determined to be safe.
Safe Attachments will analyze attachments that are common targets for malicious content, such as Office documents, PDFs, executable file types and flash files. The administrator can establish separate policies for Safe Attachments. Each policy can be applied to a specific set of users, distribution groups or domains. It is also possible to have unique policies within Safe Attachments and so each group of users can have custom settings. The administrator can configure the settings to receive an email notification when an unsafe attachment is identified.
In the Safe Links policy window, click Safe Attachments to scan downloadable content and with the URL detonation feature turned on.
URL Detonation provides deeper protection against malicious URLs. Not only do we check a list of malicious URLs when a user clicks on a link, but Office 365 ATP will also perform real-time behavioral malware analysis in a sandbox environment against malicious attachments at destination URLs. For example, if an email includes a link to a Word document on a web server, the document is downloaded into our sandbox environment and detonated as if it were an attachment.
The administrator can establish separate policies for Safe Links. Each policy can be applied to a specific set of users, distribution groups, or domains. It is also possible to have unique policies within Safe Links and so each group of users can have custom settings. When a user clicks on an unsafe link, they receive a notification from Office 365.
Our services harness the power of Microsoft’s machine learning capabilities and continuously update and enhance our basic filters. In the example shown here, an email arrives with an attachment which initially gets past our basic filters. However, with the additional protection offered by our advanced threat protection, the attachment is detonated in a sandboxing event and found to be malicious. We then update ALL of our filters across so that the file hash goes from being unknown to known and on the subsequent arrival of an email carrying the attachment, we now block it. That is the power of machine learning which enables our systems to enhance themselves with each new piece of malware we detect.
This illustration shows the options for creating a DLP policy:
Choose the protection to apply. Protection can include:
Policy tips for users
Email report for admins
Prevent sharing externally, internally, or both
Choose the criteria for applying the protection. Apply the protection to documents with this type of content: you can configure the policy to use sensitive information types and/or labels.
Built in sensitive item types include things such as credit card numbers, SWIFT codes, personal identifiers, etc.
Custom sensitive items types can be defined using regular expressions, keywords, built in functions, additional patterns such as dates or addresses, and different combinations of evidence.
Attack Surface Reduction = Use rules that reduce the attack surface of devices
Controlled folder access = Protect folders from threats such as ransomeware
Network protection = Prevent network access to potentially malicious content on the Internet
We recommend you accept the default values during setup to create application policies for Android, iOS, and Windows 10 that apply to all users. You can create more policies after setup completes.
We recommend you accept the default values during setup to create application policies for Android, iOS, and Windows 10 that apply to all users. You can create more policies after setup completes.
By default, work files are encrypted using a secret key that is stored on the device and associated with the user's profile. Only the user can open and decrypt the file. However, if a device is lost or a user is removed, a file can be stuck in an encrypted state. The Data Recovery Agent (DRA) certificate can be used by an admin as a sort of master key to decrypt the file.
You may specify additional domains or SharePoint locations to make sure those files are protected too.
You have these entities – users, devices, apps and data
Data is being shared with employees, customers and business partners
You have to manage the complexity of protecting your users’ identities, and data stored on their devices and apps
You need to prepare to mitigate the risks of providing freedom and space to your employees.
You need to meet compliance and regulatory standards, maintain
company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience
The cloud is here to stay
The ‘cloud accepting’ population is growing… VERY rapidly
Your managers (CxO) are changing their minds… or soon will… or are being replaced
Microsoft is meeting organizations ‘in the middle’: abilities like lockbox, ‘going local’, etc.
Your competition will use the cloud to their advantage
You can’t compete with cloud vendors on substrate services (time, cost, innovation)
You can’t lay the substrate and do value-add at the same rate as your cloud peers
There will be breaches… both in the cloud and on-premises
Cloud vendors, with billions invested and far better ‘signals’, will act/evolve far quicker
We heard from you..
And you are not alone
You had control over your data when it resided within your boundaries
Now that boundary has expanded with managed devices and cloud assets. MDM solutions help but not when data moves outside of your controlled environment
Once shared outside your environment, you lose control over your data.
1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement
2.We added tracking and revocation capabilities for greater control over shared data
3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement
2.We added tracking and revocation capabilities for greater control over shared data
3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
Data is born protected,
Using companies’ criteria
Enforced by IT
Enforced on any device
<keep personal data.... Personal>
Scoped Policies allow you to build sets of labels that are only visible and usable to specific employees and groups of employees such as teams, business units or projects.
In all instances, a global set of policies is made available to all users. The new scoped policies are layered over this global set, available to just users in the specified security group membership. It is important to note that scoped policies are an admin concept, users will not be aware as they just see a combined set of labels they are assigned.
Each set of scoped policies allows for customization, including labels, sub-labels, and settings like mandatory labeling, default label, and justifications. The scoping model is consistent with Azure RMS template scoping, in that it is based on Azure Active Directory users and groups.
A few important notes on scoped policies:
Scopes are optional, you don’t have to define a set or group for a policy. If not set, the policy has global scope for everyone in the tenant.
Policies are ordered by administrators. This order defines which scopes are considered higher than others. Policies are combined into an effective policy, which is given to the client.
Flexibility for users to reclassify because policies won’t get it right all the time. But everything is logged so IT can audit in case of violation
Users also have the option to label if they deem necessary, even when not automatically classified
With the new, unified AIP client, Classification, Labeling and Protection support is now extended beyond ‘just’ Office files. We have brought together the existing AIP client with the RMS Sharing App features to provide a more complete Information Protection experience in AIP. When you install this new client, you can now classify, label and protect your files through Office applications, through the Windows Explorer shell extension and through PowerShell commands.
A user can label and protect any file through the windows shell-explorer, select either one file, multiple files or a folder and apply a label. (Note: some file types do not offer an ability to attach persistent metadata, for these file types you can only label when protecting).
RMS PowerShell commands have been updated to support Label and Protection actions based on Azure Information Protection policies. Administrators and data-owners can label and protect files in bulk on File stores, or query for the file’s status. The PowerShell cmdlets, which are installed as part of the new unified client, are now GA and enable our customers to:
Query for a files Label and Protection attributes
Set a Label and/or Protection for documents stored locally or on file servers and network shares that are accessible through SMB/CIFS (e.g. \\server\finance\)
In this example, sensitive data is protected even as it is uploaded to a cloud app
This has become a very common scenario, as workers store and share data across potentially several cloud storage services and SaaS apps.
When a user creates a document that contains sensitive data, such as credit card information or confidential project information, Azure Information Project labels the document as “INTERNAL”, which means it shouldn’t be shared with others.
If the user then tries to upload this document to a cloud storage location, such as using Box, this is detected by Microsoft Cloud App Security
MCAS will understand the INTERNAL label and enforce policy to move the file to quarantine and then restrict access to only the file owner
Labels stay with the data to enforce the policies and classification
Extra protection is available for sensitive data
Not just encryption, but rights of who can access it and what they can do with the data
-
Context: Email is also main source of sharing information therefore Email prone to unintended disclosure. Encryption typically is also too difficult to use. For a lot of organizations one of their biggest hurdles is making it easy enough so users can adopt the technology and collaborate securely.
At Ignite we announced new capabilities in Office 365 Message Encryption that protect and control your sensitive emails. These enhancements are aimed squarely at helping you better safeguard your sensitive email communications without hampering the ability for your users to be productive and to easily collaborate with those inside or outside of your organization.
PROTECT: Mitigate the risk of unintended disclosure of emails to anyone inside or outside your organization, so that only the indented recipient with the right identity can read the encrypted message. Recipients outside of the organization can use their email provider. OME provides added layer of encryption at the content level. OME also enables organizations to rights protect the email so only the people with the right identity can read the message and the Office application that’s attached also inherit the protections applied to the email.
Ex. Greg from Big Bank needs to send a sensitive message to his client on his recommended stock picks but does not want him to forward.
CONTROL: Admins can apply automatic policies and end users can be empowered to apply ad hoc policies that encrypt and rights protect messages sent inside and outside the organization. Additionally, recipients can easily read protected messages using their consumer identities such as Google, Yahoo or Microsoft Accounts – or use a one time passcode.
Ex. secret acquisition, company wishes to encrypt all messages between the external company. Admin applies mail flow rule.
Ex. Doctor wants to communicate with his/her patients who uses gmail. Patient can authenticate using their Google identity to read and reply to the protected message
COMPLIANCE: We’re also providing more enterprise grade capabilities - for regulated customers, Office 365 Message Encryption will enable you to provide and manage your own tenant encryption keys with BYOK with Azure Information Protection for Exchange Online.
Only use this slide for customers that have obligations with regard to the GDPR
Summary of the key benefits
Protect all data with the right level
Help share
Easy to use with great IT control
Data is born protected,
Using companies’ criteria
Enforced by IT
Enforced on any device
<keep personal data.... Personal>