SlideShare a Scribd company logo
1 of 103
Future of Digital
Workplace
Luís João
Solution Sales – Modern Workplace
lujoao@microsoft.com / (+351) 92 540 45 22
Microsoft Portugal
Manuel Faria
Product Marketing Manager – Modern Workplace
v-mafari@microsoft.com / (+351) 96 978 75 30
Microsoft Portugal
2x
Teamwork
Universal toolkit
Microsoft 365
Pervasive availability. Targeted communications.
Email
Inner Loop
People you work with
regularly on core projects
Outer Loop
People you connect with
openly across the organization
Content collaboration
Video & live events
SharePoint
Content collaboration for the modern workplace
SharePoint
hub sites
Brings together related team sites and
communication sites
Cross-site navigation
Roll up news and site activity
Search across associated sites
Consistent look-and-feel across sites
Admins create, users adopt and use
Benefits
today…
Cohesive, rich relationships in Microsoft Graph
YOU
items in a library
https://aka.ms/gartner-csp17 https://aka.ms/odsp-csf
Transforming content collaboration
Immersive and engaging mixed reality experiences for everyone, on any device
www.exploresharepointspaces.com
Display Microsoft Forms on pages
hundreds
Microsoft Graph
ALL
Microsoft 365
Office 365
Windows 10
EMS
ALL ONE
https://graph.microsoft.com
https://graph.microsoft.com
Your app Your app
Outlook Azure ADSharePoint …
your
Your app
Gateway
Your or your
customer’s
data
Office 365 Windows 10 Enterprise Mobility + Security
1Microsoft Graph
SharePoint Framework
Modern client-side development
Lightweight web and mobile responsive
On-Premises and in the Cloud
Designed for 1st and 3rd parties
Backward compatible components
Opensource tools and JavaScript web frameworks
http://aka.ms/spfx-tutorials
Intuitive sharing controls with flexible policies
for internal and external sharing
Flexible sharing controls for targeted
scenarios
alerts of suspicious behavior using
Advanced Security Management
Minimize risk with secure external sharing
without sign-in
Actionable insights and management control
Control users
Manage
Restrict
Conditional access
Granular policies
Prevent
HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
The deepest and most comprehensive compliance coverage in the industry
Supporting you
with contractual
commitments
We will provide documentation
to help you demonstrate
compliance with GDPR
requirements applicable
to processors.
Our cloud services will meet
stringent security requirements.
We will help you manage data
subject requests.
Simplify GDPR
compliance with
Microsoft
3. Streamline processes
1. Assess and manage
compliance risk
2. Protect personal data
1. Assess and manage
compliance risk
Compliance Manager
View your compliance posture against
evolving regulations in real-time.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
2. Protect personal data
Identity and
Access Management
Threat
Protection
Information
Protection
Protecting personal data at the identity,
document, and network levels
Secure personal data at the
front door through proper
access controls across apps,
services and devices.
Identity and Access
Management
Apps
Devices
Users
Data
On-premises /
Private cloud
Microsoft Azure
Active Directory
On-premises /
Private cloud
Protect resources through identity
Hardware protection
for credentials
Privileged Identity
Management
Multifactor
authentication
Conditional
access
Easy to use passwordless authentication
Replace passwords with an easy to use, strong and
multifactor credential
Reduce risk from compromised credentials
Multifactor: your device plus biometric or PIN
Single sign-on to resources protected with
conditional access
Coming soon: use portable security keys
and authenticate to a shared device
******
Require MFA
Allow access
Deny access
Force
password reset
Limit access
Controls
Users
Devices
Location
Apps
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
10TB
Effective
policy
Conditional access
Limit access for the right
users from the right devices
and locations
Information protection
Govern sensitive data across
devices, apps, cloud services,
and on-premises.
Enable data governance
practices and processes
organization wide.
Search for and identify sensitive
and personal data.
Automatically classify and label
data with security policies.
Corporate
Public
Private
cloud
Vendors SaaS
Ex-
employees
Online
backup
Graphic
designer
Offshore
teams
Legal review
Agency
teams
Project
Lead
Sales teams
Project
Manager
Project
Lead
Remote
teamPersonal
Data is shared more often
and more widely than ever.
Create, import, or
modify data
Detect data
Classify and label
sensitive data
Protect data
based on policy
Send, share,
move data
Monitor data
Retain, expire,
delete data
Protect sensitive data throughout its lifecycle
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
Reclassification
You can override a
classification and
optionally be required
to provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
Due Diligence Documentation
Due Diligence
Category Documentation Task Owner Status
Business Plan, Corporate Structure, Financing
Business plan Current five-year business plan
Prior business plan
Corporate
organization
Articles of incorporation
Bylaws
Recent changes in corporate structure
Parent, subsidiaries, and affiliates
Shareholders’ agreements
Minutes from board meetings
Label and protect any file through
the windows shell-explorer
Select either one file, multiple files
or a folder and apply a label
Recognize known attacks and
suspicious behavior.
Threat protection
Recover quickly when attacked by
configuring automated responses.
Detect breaches and attackers
moving laterally.
Detect
suspicious
behavior
and threats
Alert
Remediate
Analyze
signals
Learn
common
behaviors
Protect against threats with behavioral analytics
Internal and incoming
network traffic
Unique insights, informed
by trillions of signals
Microsoft intelligent
security graph
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial
services
Detect threats with Advanced Threat Analytics
Suspicious logons
Multiple failed log-on
attempts, privileged
user/admin activity
Suspicious activities
Access from suspicious
devices or IPs,
new high volume
app, new risky app
Sensitive data
Mass file transfers, sensitive
and financial data
Suspicious sessions
Impossible travel, data
transfer to remote locations,
unfamiliar IP or location
Possible threats
Unique file extensions indicating
ransomware, known attacks
3. Streamline processes
Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
Simplify GDPR
compliance with
Microsoft 365
Enterprise
3. Streamline processes
1. Assess and manage
compliance risk
2. Protect personal data
- Identity and Access Mgmt.
- Information Protection
- Threat Protection
Content collaboration for the modern workplace
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security

More Related Content

What's hot

Content publishing and communication strategies for office 365
Content publishing and communication strategies for office 365Content publishing and communication strategies for office 365
Content publishing and communication strategies for office 365Maarten Visser
 
Rits Brown Bag - SharePoint 2016
Rits Brown Bag - SharePoint 2016Rits Brown Bag - SharePoint 2016
Rits Brown Bag - SharePoint 2016Right IT Services
 
Microsoft365 developer opportunity welcome keynote
Microsoft365 developer opportunity welcome keynoteMicrosoft365 developer opportunity welcome keynote
Microsoft365 developer opportunity welcome keynoteDipti Chhatrapati
 
Office 365 Plan Selection Flow Chart
Office 365 Plan Selection Flow ChartOffice 365 Plan Selection Flow Chart
Office 365 Plan Selection Flow ChartRobert Crane
 
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...Chirag Patel
 
SPSTC - SharePoint 2007 No Code App Slides
SPSTC - SharePoint 2007 No Code App SlidesSPSTC - SharePoint 2007 No Code App Slides
SPSTC - SharePoint 2007 No Code App SlidesDon Donais
 
Office 365 SUGUK march 2011
Office 365 SUGUK march 2011Office 365 SUGUK march 2011
Office 365 SUGUK march 2011pearce.alex
 
SharePoint as an Intranet Portal for Business
SharePoint as an Intranet Portal for BusinessSharePoint as an Intranet Portal for Business
SharePoint as an Intranet Portal for BusinessRashminPopat2
 
SharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects PerspectiveSharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects PerspectiveChris Bortlik
 
Seminar On Share Point By Maroof Ahmad
Seminar On Share Point By Maroof AhmadSeminar On Share Point By Maroof Ahmad
Seminar On Share Point By Maroof AhmadMaroofAhmad
 
Spt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolSpt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolBrian Culver
 
Improving your productivity using Microsoft Flow and PowerApps in Office 365
Improving your productivity using Microsoft Flow and PowerApps in Office 365Improving your productivity using Microsoft Flow and PowerApps in Office 365
Improving your productivity using Microsoft Flow and PowerApps in Office 365Vignesh Ganesan I Microsoft MVP
 
[Webinar Slides] Future-Proof Your SharePoint Investment
[Webinar Slides] Future-Proof Your SharePoint Investment[Webinar Slides] Future-Proof Your SharePoint Investment
[Webinar Slides] Future-Proof Your SharePoint InvestmentAIIM International
 
Building Digital Workplaces using Office 365 Content Services
Building Digital Workplaces using Office 365 Content ServicesBuilding Digital Workplaces using Office 365 Content Services
Building Digital Workplaces using Office 365 Content ServicesMaarten Visser
 
Presentation from SMBNation Spring 2011
Presentation from SMBNation Spring 2011Presentation from SMBNation Spring 2011
Presentation from SMBNation Spring 2011Robert Crane
 
What Makes an Ideal Microsoft 365 Intranet​
What Makes an Ideal Microsoft 365 Intranet​What Makes an Ideal Microsoft 365 Intranet​
What Makes an Ideal Microsoft 365 Intranet​BizPortals Solutions
 

What's hot (20)

Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2010Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2010
 
Content publishing and communication strategies for office 365
Content publishing and communication strategies for office 365Content publishing and communication strategies for office 365
Content publishing and communication strategies for office 365
 
Rits Brown Bag - SharePoint 2016
Rits Brown Bag - SharePoint 2016Rits Brown Bag - SharePoint 2016
Rits Brown Bag - SharePoint 2016
 
Microsoft365 developer opportunity welcome keynote
Microsoft365 developer opportunity welcome keynoteMicrosoft365 developer opportunity welcome keynote
Microsoft365 developer opportunity welcome keynote
 
Office 365 Plan Selection Flow Chart
Office 365 Plan Selection Flow ChartOffice 365 Plan Selection Flow Chart
Office 365 Plan Selection Flow Chart
 
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...
Administrators guide to managing Microsoft 365, SharePoint, Microsoft Teams a...
 
SPSTC - SharePoint 2007 No Code App Slides
SPSTC - SharePoint 2007 No Code App SlidesSPSTC - SharePoint 2007 No Code App Slides
SPSTC - SharePoint 2007 No Code App Slides
 
Office 365 SUGUK march 2011
Office 365 SUGUK march 2011Office 365 SUGUK march 2011
Office 365 SUGUK march 2011
 
SharePoint as an Intranet Portal for Business
SharePoint as an Intranet Portal for BusinessSharePoint as an Intranet Portal for Business
SharePoint as an Intranet Portal for Business
 
SharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects PerspectiveSharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects Perspective
 
Seminar On Share Point By Maroof Ahmad
Seminar On Share Point By Maroof AhmadSeminar On Share Point By Maroof Ahmad
Seminar On Share Point By Maroof Ahmad
 
Share Point online
Share Point onlineShare Point online
Share Point online
 
Rits Brown Bag - Office 365
Rits Brown Bag - Office 365Rits Brown Bag - Office 365
Rits Brown Bag - Office 365
 
Spt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity toolSpt 101 Loving Onedrive for business as a productivity tool
Spt 101 Loving Onedrive for business as a productivity tool
 
Improving your productivity using Microsoft Flow and PowerApps in Office 365
Improving your productivity using Microsoft Flow and PowerApps in Office 365Improving your productivity using Microsoft Flow and PowerApps in Office 365
Improving your productivity using Microsoft Flow and PowerApps in Office 365
 
isritechnologies
isritechnologiesisritechnologies
isritechnologies
 
[Webinar Slides] Future-Proof Your SharePoint Investment
[Webinar Slides] Future-Proof Your SharePoint Investment[Webinar Slides] Future-Proof Your SharePoint Investment
[Webinar Slides] Future-Proof Your SharePoint Investment
 
Building Digital Workplaces using Office 365 Content Services
Building Digital Workplaces using Office 365 Content ServicesBuilding Digital Workplaces using Office 365 Content Services
Building Digital Workplaces using Office 365 Content Services
 
Presentation from SMBNation Spring 2011
Presentation from SMBNation Spring 2011Presentation from SMBNation Spring 2011
Presentation from SMBNation Spring 2011
 
What Makes an Ideal Microsoft 365 Intranet​
What Makes an Ideal Microsoft 365 Intranet​What Makes an Ideal Microsoft 365 Intranet​
What Makes an Ideal Microsoft 365 Intranet​
 

Similar to 2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Azure-Casestudy.pptx
Azure-Casestudy.pptxAzure-Casestudy.pptx
Azure-Casestudy.pptxssuser2ae8bb
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Getting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanGetting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanVignesh Ganesan I Microsoft MVP
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Chris Bortlik
 
Solvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft TeamsSolvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft TeamsHolzerKerstin
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 

Similar to 2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security (20)

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Azure-Casestudy.pptx
Azure-Casestudy.pptxAzure-Casestudy.pptx
Azure-Casestudy.pptx
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Getting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanGetting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh Ganesan
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
 
Solvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft TeamsSolvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft Teams
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security