Love Cloud
30 March 2017
Kieran McDonnell
Country Manager
Vuzion Ireland
Digital transformation is
the next industrial revolution
Steam, water,
mechanical
production
equipment
Division of labor,
electricity, mass
production
Electronics,
IT, automated
production
Blurring the
physical and
the digital
divide
1784 1870 1969 2017
Industrial Revolution 4.0
About Vuzion
We can help make your business future proof
• A cloud aggregator
• Built on 20 years of delivering and selling
cloud services
• A rich portfolio of cloud services
• A smart ecosystem of partners
Vuzion GTM Model
p
Operational
Delivery
•Managed Service
•Billing & Support
Capability
Development
•Technical
•Sales
Pre-Sales
Engagement
•Technical review
•POCs & Trials
Services &
Frameworks
•Backup
•Identity
•IaaS/PaaS
Bespoke Solutions
•Solution Design
•ISV Enablement
• Help resellers build their own
solutions based around a set of
defined frameworks
• Solutions based on “finished”
services that can be resold
• Bespoke solution development
support
• Service wraps to deliver
operational efficiency
Direction on Microsoft
Julian Dyer
Vuzion
o Cloud and Hosting Summit 2017
o Reseller & Vuzion (Partner
Center)
o Skype for Business update
o Security as a Service
o Business Premium Update
o Q&A
Cloud and Hosting Summit 2017 – Bellevue
Seattle
| 2017 Microsoft Cloud and Hosting Summit
Cloud Model driving Digital Transformation
Growth of SaaS and IaaS
Vuzion Partner smart ecosystem
Partner Center – Reseller update
Skype for Business – Ireland Update
Title.
Security as a Service – SMB opportunity
Security As A Service
SECURE CONTENT
PROTECT CONTENT:
CREATION, TRANSIT,
CONSUMPTION
SECURE DEVICES
WORKPLACE ISSUED OR
BYOD DEVICES
GREAT EMPLOYEE
EXPERIENCE
PRODUCTIVITY WITHOUT
COMPROMISE
SECURE THE FRONT
DOOR
IDENTITY DRIVEN
SECURITY
IDENTITY IS THE NEW CONTROL PLANE:
Stickiness, Future Growth (On-Prem, SalesForce, DropBox and 2600+ other SaaS, AWS, Azure)
Secure the Front Door
Leaked
credentials
Infected devices
Configuration
vulnerabilities
Risk-based
policies
MFA Challenge Risky
Logins
Block attacks
Change bad credentials
Suspicious sign-in
activities
MACHINE LEARNING AND RISK PROFILING OPEN THE FRONT DOOR BASED ON RISK
Shadow IT
Risk
Assessment
User
MFA
Conditions
Location (IP range)
Device state
User group
Risk
Block access
Enforce MFA per
user/per app
Allow access
Leaked credentialsInfected devices Configuration
vulnerabilities
RISK BASED
POLICIES
MFA Challenge
Risky Logins
Block attacks
Change bad
credentials
Machine-Learning Engine
Brute force attacks Suspicious sign-in activities
EXTENSIBILITY
POWER BI,
SIEM
REPORTING APIs
NOTIFICATIONS
DATA EXTRACTS
Security As A Service – Enabling SKU’s
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P2
Azure Active Directory Premium P1
(included in P2)
Cloud App Security
No Pre-requisites.
Best Position with:
1. Business Premium,
2. E3
3. E5
4. Azure Deals
SECURE THE FRONT
DOOR
IDENTITY DRIVEN SECURITY
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1
Cloud App Security
Azure Information Protection P2
Microsoft Intune
Pre-requisites: Office Mobile Apps
Best Position with:
1. Business Premium,
2. E3
3. E5
SECURE CONTENT
PROTECT CONTENT: CREATION,
TRANSIT, CONSUMPTION
Azure Active Directory Premium P1
Microsoft Intune
No Perquisites.
Best Position with:
1. Business Premium,
2. E3
3. E5
SECURE DEVICES
WORKPLACE ISSUED OR BYOD
DEVICES
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1
No Perquisites, up-sell with any
Office 365 offer
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
GREAT EMPLOYEE
EXPERIENCE
PRODUCTIVITY WITHOUT
COMPROMISE
Microsoft Update
Jonathan Eustace
Microsoft
15
new
releases
359
updates
(this past year)
Packaged IP
Average Revenue: $1-$15 per
user/per month4
Margin: 65%
• SharePoint-Based Vertical Workflows
• Middleware for Hybrid
Synchronization
• Industry-specific Workflows
• Function-specific Workflows (e.g. HR,
Procurement)
• Automated O365 Telemetry
(Availability & Performance)
• Office Connectivity & Other Plug-Ins &
Add-ons
• External Portals for End Customer
Information
• Pre-Configured Dashboards
Project Services
Average Revenue: $2.5K-$15K4
Margin: 35%
• Cloud Readiness Assessment
• Solution Analysis, Scope, & Design
• Office 365 Set up and Remediation
• Simple File Server Migration
• Workflow Creation in SharePoint
• Yammer Adoption
• End User Training
Managed Services
Average Revenue: $5-$15+ per
user/per month4
Margin: 45%
• Office 365 Tenant Management
• Reactive Help Desk Support (Office, Skype for
Business, Intune, CRM Online) and interface to
MSFT.
• Performance and Application Troubleshooting
• Desktop & Device Management & Support
• Reports & View Adjustments
• Software Asset Management (licensing
management & optimization)
• Security Management & Identity Protection
• Office Client Connectivity Setup
• Mobile Device Connectivity & Management
• Web defense (restricting URLs, phishing
malware, spam)
• Hybrid Environment Support (Basic
Infrastructure)
• VoIP Maintenance
• Regulatory Compliance via Office 365
Infrastructure
Exchange Online Skype for Business OneDrive for Business SharePoint Online Yammer
Build long-term, value-added services for Office 365
Based on an average 25 seat deal
PartnerRevenue
Pitch incremental project services to
light up each Office 365 workload
post deployment
Add managed services to your Office
365 practice and become your
customer’s outsourced IT department
Create SharePoint templates and
extension apps, package as repeatable
IP and monetize
Capitalize on the
market opportunity
Insights to maximize
profitability
Managed services opportunity by
2018: $256B1
2018 projected worldwide Public IT
cloud services revenue: $127B2
Run-rate Fastest Growing Business:
$2.5B3
1. Markets and Markets : Managed Services Market worth $256.05 Billion by 2018(c)
2014 M2 COMMUNICATIONS IDC Worldwide and Regional Public IT Cloud Services 2014–
2018 Forecast Oct 2014 | Doc #251730 ​ 4. MDC Research, Microsoft Cloud
Profitability Scenarios May 2015
Creating Differentiation
Concurrency, 2017 http://www.concurrency.com/landing/azure-periodic-table
Project Services
Average Revenue: $2.5-$10K4
Margin: 35%
• Cloud Planning and Readiness
Assessment
• Solution Analysis, Scope, & Design
• Backup Deployment
• Deployment Services
• Heath Checks
• Proof of Concept
Packaged IP
Average Revenue: $2.5-$7.5K4
Margin: 65%
• Automated Monitoring, Alerting, &
Logging
• Middleware for Hybrid
Synchronization
• Automated Backups & Disaster
Recovery
• Automated Disaster Recovery Testing
• Office Connectivity & Other Plug-Ins &
Add-ons
• External Portals for End Customer
Information
• Pre-Configured Dashboards
Managed Services
Average Revenue: $2.5-$10K4
Margin: 45%
• Critical Response Support
• Azure Consumption Monitoring &
Optimization
• Performance Monitoring & Reporting
• Troubleshooting
PartnerRevenue
Microsoft Azure Azure Backup Azure Recovery
Build long-term, value-added services for Backup
64% of organizations are currently
purchasing backup and restoration
services from partners1
$30 billion worth of smartphones are
lost in the US in a year2
Nearly a third of all data stored in the
cloud is made up of backup and
recovery files3
Capitalize on the
market opportunity
Insights to maximize
profitability
Concentrate on niches to better
differentiate yourself and value-price
Look to move additional workloads
to Azure over time
Build out automated tools and own
IP to lessen reliance on project
services and boost margins
Source: 1. BCSG, 2015 The Small business revolution: Trends in SMB Cloud Adoption enquiries@bcsg.com 2. Lookout Security, March 2012, “Lookout Predicts Americans Lose $30Billion in Smartphones a Year” permissions@readwrite.com 3. Intronis Cloud backup + Recovery , 2013 “2013 State of Cloud Backup MSPs Mission the Mark” 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
Backup
as a
Service
Creating Differentiation
On-Premises Datacenter
Automated Backup Solution
Provides customers with
regular reporting on
successful completion of
backups
Fixed monthly fee
Includes four restores per
annum
Four core pillars of the modern partner
Being Ready for GDPR
Darren Roberts
Vuzion
SHAREPOINT METADATA & TAXONOMIES AUTOMATED
Successful SharePoint projects are built on metadata
• SharePoint is a powerful document management system, but in order to get
the return on your investment you need rich metadata added to your
documents.
• Without metadata, users will struggle to find and organise their content and
organisations will be unable to govern the ever-growing store of information
within SharePoint.
• Whether you are migrating content into SharePoint, or looking to improve
your existing sites then metadata is the difference between a successful or
failed project.
Building taxonomies & adding metadata has always been a
tough job
• Building taxonomies from scratch is a time-consuming trial and error
prone process.
• Asking users to fill in metadata fields to save their documents to
SharePoint impacts productivity and creates user adoption problems.
• Migrated content will have no metadata.
Next-generation taxonomy creation and metadata tagging
TermSet uses Natural Language Processing and Machine Learning to add
accurate consistent metadata to SharePoint content, without placing any
burden on end users or the IT team. No manual work, it just happens.
Taxonomy Creation
Creates and maintains SharePoint taxonomies
unique to your content
Powerful natural language processing ensures
your taxonomies are accurate and always up to
date
Cloud or On Premises
Choose from a software as a service or a local
installation
Metadata Tagging
SharePoint content is automatically tagged with
rich and consistent metadata
Tagging can be part of a migration process or as
new documents are added to a library
Packed with Powerful Features
Language analysis
Document summary generation
Pattern and phrase matching
Concept classification
See the following benefits to your SharePoint project
Smarter SharePoint migrations
Enrich your documents with meaningful
and consistent metadata as part of your
migration project
Improve your Information Architecture
Build your SharePoint sites to reflect the
information you store and remove the
need for folders and views
Supercharge SharePoint Search
Dramatically improve SharePoint search
by providing refinable metadata to your
users
Power Compliance & Workflows
Use metadata to drive compliance
and governance of your
documents and drive workflows.
Before TermSet
After TermSet
GDPR
What is GDPR?
General Data Protection Regulation. A
huge change for how we all handle data,
PII (Personal Identifiable Information).
What happens if non-compliant?
Up to €20M or 4% of global turnover
(which ever is greater)
When does GDPR come into force?
25th May 2018.
Who does GDPR apply to?
Any organisation who hold PII on
any other person or organisation
TermSet for GDPR Compliance
Address: 77 Sixth avenue
Phone number: 847-334-2345
Address: 3608 Walnut Creek Road
City: Chicago
Company: Arnold Associates
Salary: $37,500
Person: Manuel Santiago
TermSet Customers
Protect Data & Recover from
Disaster using Microsoft Azure
Alex McLoughlin
Union Solutions
About Union Managed Services
• 10 Year pedigree transforming the largest IT Infrastructure Environments
• Data Services where your customers need them, how your customers want them.
• Our expertise is Infrastructure, Data Protection and Business Recovery, with a human touch.
• We deliver managed infrastructure on premise, from our UK datacentres or in the Microsoft Azure public.
• Our sole focus is delivering business outcomes for customers in the 100 - 1,000 seat SME marketplace.
Union Solutions Limited 2017
Manage
Infrastructure
Protect Data Survive a Disaster
Our Customers
Union Solutions Limited 2017
Protect Data
Union Solutions Limited 2017
What challenges do your customers face…?
• Ransomware, user error, system failure, datacentre loss, malicious intent or
degenerative IT bugs .
• Protection windows are shrinking, data is doubling, and many fail to protect data in
appropriate to need.
• Trying to compete in a global economy with tech savvy consumers that expect a 24×7
always-on service
• If they lost a significant amount of data, the business would struggle to operate
• Legacy backup software is a huge problem. Proprietary software that locks data in a
proprietary format.
Protect Data
Union Solutions Limited 2017
Protect Data
Union Solutions Limited 2017
Visible
Monitored 24×7x365. Daily Exception reporting
showing compromised services and regular service
reports delivered in a language you and the
business can understand.
Specialist Expertise
Data protection has been our area of expertise for
more than 20 years.
Designed and built some of the most sophisticated
solutions for some of the most demanding
corporate environments.
Union – Data Protection as a Service
Secure and Portable
Protected data is encrypted in transit and at rest. It
never leaves your network. Historical copies needed
for compliance demands provided to you in native
format. No lock-in to proprietary software
Pay as You Grow
You pay on a consumed capacity basis. It’s an OPEX
model based on per protected GB of data, with cloud
enabled scale and economies.
Hybrid
An appliance deployed on premise, storing 31 days of
backups for Instant data restore. We replicate a copy
of your data between sites every night
Survive a Disaster
Union Solutions Limited 2017
What challenges are you facing…?
• A disaster can put your customer out of business.
• They need (it’s demanded) to provide evidence of continuity plans for customers of
your customers and regulated industry inspectors.
• Unfortunately, most SME organisations are still playing catch up.
• Disaster Recovery is often at the back of the budget queue:
• Cost of delivering is substantial.
• Chews up cash and profitability.
• They’ve never had a disaster (yet…)
Survive a Disaster
Union Solutions Limited 2017
Survive a Disaster
Union Solutions Limited 2017
Survive a Disaster
Union Solutions Limited 2017
Cloud Automated
Recover all IT services inside 60 minutes.
Instant fail-over of any VM or Physical server to the
Microsoft Azure cloud.
We operate your infrastructure services all the
time they’re running in Azure
Bespoke
We create a Dynamic DR Runbook (invocation plan
which we automated against) for each customer.
Your customers are then armed with a
demonstrable plan for customers, auditors, and
regulators.
Union – Disaster Recovery as a Service
Tested
Full test invocation every year, issuing a certificate to
publish to third parties.
Union manage the entire fail-over and fail-back
processes.
Clever technology in Azure enables us to test any
server or application for DR, at anytime
Responsive
You pay on a consumed capacity basis. It’s an OPEX
model with cloud enabled scale and economies.
RPO of 60 Minutes, RTO of 60 Minutes at an SME
price point (charged per protected VM + storage)
Summary
Union Solutions Limited 2017
Talk to Union and Vuzion
• Create recurring margin by selling cloud enabled managed services
• Both Products orderable through Vuzion (launching on the portal in weeks to come)
• This is a big conversation to have with customers. Multi year contracts drive
significant committed income for your organisations.
• Deal registration process locks a qualified opportunity to a Vuzion partner
• Union has marketing support and expert gun slingers ready to support your sales
effort to win business
Sign Documents Anytime,
Anywhere, on any Device
Elaine Pakes
DocuSign
Drive usage and adoption to all Microsoft
applications: SharePoint, Dynamics CRM, O365, MS
Word, Outlook, Windows, Azure
Sign anytime, anywhere, on any device
Get approvals done, faster than ever
DocuSign
Ensure secure and compliant business processes
Fastest & most secure way to make every decision
and approval digital
DOCUSIGN CONFIDENTIAL
Disconnected
Systems
Manual
Processes
Poor Customer
Experience
Consumers
Customers
Partners
Suppliers
Employees
Disconnected
Systems
Manual
Processes
Poor Customer
Experience
Consumers
Customers
Partners
Suppliers
Employees
DocuSign Digitizes
Decisions &
Approvals
With DocuSign
Manage digital transactions and eSignatures directly from
Microsoft applications
Office 365 and SharePoint Dynamics CRM Online Windows 10|Windows Phone
Customers can sign or send
agreements for signature from any
object in Dynamics CRM Online
Electronically send documents
for signature(s) and manage
the documents you send from
any device. Log in with Azure
AD.
1,500 Documented Use Cases and Counting
– How does Office 365 fit into these use cases?
 Sales Order Processing
 Account Provisioning
 Sales Compensation
Agreements
 Referral Agreements
 Reseller Agreements
 Field Sales Agreements
 New Customer Sign Ups
 Terms and Conditions
 Event Registration
 Customer Communication
Approvals
 Mass Mailing / Email Approvals
 Customer Communication
Approvals
 Brand Compliance / Audits
 Event and Vendor Approvals
 New Hire Paperwork
 Candidate NDA
 On/Off-boarding Checklist
 Employee Policy Distribution &
Signature
 Contractor Agreements
 Non-disclosure
 PTO Management
 Payroll Forms
 Front Desk Sign-in
 Work Orders
 Lease Agreements
 Move In / Move Out Requests
 Parking Permits
 Equipment Rentals
 Lien Releases
 Site Passes and Onsite Waivers
 Invoice Processing
 Expense Reporting
 Capitalization Management
 Audit Sign Off
 Policy Management
 Inventory Signoff
 Asset Transfer / Retirement
 Hiring Freeze Exemption
 M&A Documentation
 Account Changes
 Service / Work Orders
 Term Changes
 Self Service Requests
 Compliance
 Field Service
 Cancellation Requests
 Internal Cancellation Processing
 Asset Tracking
 Change Requests
 Requirements Sign Off
 Access Management
 Incident Reporting
 Production Change
Authorization
 Maintenance Authorization
 Order Fulfillment
 Change Management
 Release Management
 Code Review Reporting
 Requirements Acceptance
 Release Scope Commitments
 Project Charter Templates
 NDAs
 Contract Management
 Internal Compliance
 IP Licensing
 Patent Applications
 Board Minutes
 Trade Name Assignment
 Trademark Assignment
 Finance Agreements
 Purchase Orders
 Statements of Work
 Master Service Agreement
 RFP Sign Off
 Supplier Compliance
 Competitive Procurement
Summaries
 Sole-Source Justifications
 Procurement Card Applications
Why
Should
You Care?
Increase deal size
for TAV. 15%
margin from MSRP
Easy to set-up,
Simple to use, No
implementation
needed
Increase initial
deal size.
Land & expand
within LoB
Average sales
cycle; deals
between 5 - 50
seats < 45 days
Average Deals
Closed Per Q; 63
SMB
Increase
adoption usage
& penetration of
MSFT
Applications
DOCUSIGN CONFIDENTIAL
Develop adoption with end customers on cloud based solutions
Increase the value attached to O365 with our additional services and differentiation
Stronger foot print with customers providing the ability to tackle many
LOB/expansion use cases
Increase revenue through sales and ROI for customers
DocuSign Value Drivers to Resellers
Leverage MSFT Integrations
Existing O365 Customers
Net New Customers
Special MSFT O365 Bundle
Land & Expand
Where To Execute
Is DocuSign Legal?
DOCUSIGN CONFIDENTIAL
https://www.docusign.co.uk/how-it-works/legality/global
DOCUSIGN CONFIDENTIAL
DocuSign is the only provider with bank-grade security
Broadest Set of Security Certifications
PCI DSS 3.1
Global Security Gold
Standard: ISO 27001
Streamlined Process for EU
Privacy Law Compliance
SSAE 16 SOC 1 Type II
AT 101 SOC 2 Type II
Data Privacy
https://trust.docusign.com/en-us/
Try it for yourself
DOCUSIGN CONFIDENTIAL
https://secure.docusign.com/demo
Organisations run on email –
give it the protection it needs
Nessa Lynchehaun
Mimecast
Session Overview
• Introduction to Mimecast
• Solution overview: understand the platform
& problems we solve
• Maximising the opportunity for Partners
• Partner Resources
• Questions
Confidential |
Mimecast at a glance
Founded 2003
in London, UK
Cloud services designed to
‘Make Business Email Safer’
Over 25,000 Customers
Growing at 30% YoY
MIME
Nasdaq Traded
97% Retention Rate
Over 7 million end
users
14% Annual Turnover
Invested in R&D
Over 20 PB or Archive Data
Under Management
Email and three critical business risks
Vulnerability to attack
Your users and email infrastructure are under constant attack from
a wide range of adversaries.
Total operational dependency
Tolerance for email downtime is almost zero as it costs money,
damages reputations and cripples business operations.
Highest concentration of corporate data
Massive volumes of your most valuable corporate data are in email.
Data loss, leakage or breach will have devastating effects.
Protect against Email Cyber Threat
Prevent Email Outages to Maintain Productivity
Eliminate Data Loss and Maintain Compliance
Reduce Cost and Complexity of Email Infrastructure
We help our customers …
Beyond the mailbox
server your business
needs…
Archiving
Email and File Storage
Compliance
e-Discovery & Legal Hold
Enterprise Search
End-User Access
Storage Infrastructure
Security
Email Gateway (MTA)
Anti Virus/Anti Spam
Anti Malware
Anti (Spear) Phishing
Email Encryption
Data Leak Prevention
Security Monitoring
& Reporting
Large File Transfer
Clustered Mail Servers
Failover Data Centers
Backup & Recovery Systems
Continuity
Mimecast
tackles
risks and
reduces
complexity HIGH AVAILABILITY
Email is under attack
› Mimecast › Products › Email Security › Targeted Threat Protection
How Secure Is Your Infrastructure
› Mimecast › Products › Email Security › Targeted Threat Protection
Which Category do you fall under
› Mimecast › Products › Email Security › Targeted Threat Protection
91% Cyber attacks
65% Unprepared
37% = $1m> loss
Confidential
Top Attack Vector Impacting
Global Organizations:
• Phishing
• Spear Phishing
• Whaling
• Social Engineering
› Mimecast › Products › Email Security › Targeted Threat Protection
Ignoring the risk of
spear-phishing
can spell disaster
Breaches
happen
Increase of
23%
since 2013
Ave. cost
of breach
$6.5m
The results can
be devastating
Ponemon, 2015
Confidential |
The anatomy of an
attack
Three main attack methods:
• Malicious URLs in email
• Weaponized attachments
• Impersonation attacks
40% of emails have an attachment
80% are potentially vulnerable PDF
or office docs:
~ 50% open emails and
click on links within 1 hour*
Median time to first click:
1m.22s*
233% increase in phishing
URLs tracked in 1 year**
* Verizon Data Breach Report 2015 ** Cyren Cyber Threat Yearbook 2015
*** Analysis of 1 Terabyte of Mimecast platform data, 2015
Attack Stats
3%
POWERPOINT
documents
51%
PDF
documents
9%
EXCEL
documents
17%
WORD
documents
***
› Mimecast › Products › Email Security › Targeted Threat Protection
Existing
anti-spam
and anti-virus
is not enough
Standard Email
Protection
Known threat
Targeted attack
Targeted attack
Spear-phishing
Protection
Threat stopped
Security breach
Attack stopped by advanced
protection layer
• Traditional email security was never
designed to stop targeted attacks
• A specialized second layer of
defense is needed to protect data
and employees
› Mimecast › Products › Email Security › Targeted Threat Protection
Mimecast
Targeted Threat Protection URL Protect
with URL rewriting and dynamic user awareness
Attachment Protect
with file transcription, on-demand and pre-emptive
sandboxing
Impersonation Protect
with dedicated detection of whaling and malware-less
phishing
Internal Email Protect
with file transcription, on-demand and pre-emptive
sandboxing
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
URL Protect
• All URLs in every inbound mail are
rewritten at the gateway
• On click, every click real-time
scanning of destination site
• Access is granted to clean sites
without delay. Access to
compromised sites is blocked
• Dynamic user awareness built-in -
helps build a human firewall
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
Attachment
Protect
• Pre-emptive sandbox checks email
attachments pre-delivery
• Option of innovative transcription with
on-demand sandbox
• Potentially harmful attachments
replaced with transcribed safe
versions
• Employees have instant access
to safe files
• Request original via cloud-based
sandbox if required
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat
Protection
Impersonation
Protect
Name is One of my Users Names
Domain is like one of my domains
Keyword Dictionary
Reply-to-address mismatch
Newly Observed Domain
Confidential |
Detection and remediation of
security threats where the
sender and recipient are on
the internal network
Plus inspection of outbound emails
Internal Email Protect
Confidential |
Internal Email Protect
Defending against the three types of internal threats
• The Compromised Insider
• The Careless Insider
• The Malicious Insider
Confidential |
• Compromised Insider
– User’s credentials stolen by attacker
– Leverages organization’s web-based email to spread attack internally
or externally to partners/customers
• Careless Insider
– Sending sensitive data inappropriately via email to colleagues
• Secret projects, Excel sheets with credit cards/SSNs etc…
• Malicious Insider
– Purposely distributing malware or malicious URLs
– Selling sensitive data to outsiders
– Taking sensitive data for personal use
Example Use Cases
Confidential |
• TTP inspection for journaled internal emails
• DLP, URL, & attachment checks
• Unsafe attachment and/or emails removed from
inboxes
• Adds URL & attachment checks to outbound email
Key Capabilities
› Mimecast › Products › Email Security › Targeted Threat Protection
Mimecast
Targeted Threat Protection URL Protect
with URL rewriting and dynamic user awareness
Attachment Protect
with file transcription, on-demand and pre-emptive
sandboxing
Impersonation Protect
with dedicated detection of whaling and malware-less
phishing
Internal Email Protect
with file transcription, on-demand and pre-emptive
sandboxing
Maximising the
opportunity for
Vuzion Partners
Confidential
Partner Benefits
•Unified email solution - single platform, single AdCon
•Simple licensing model – monthly buy price per user
•Happy customers - over 97% customer retention
•Exciting roadmap - massive Upsell opportunity
•Partner Portal - all the tools you need for on-boarding
and managing your customers, training and marketing
resources
What does our ideal
client look like?
• Any size! SaaS model allows us to
scale
• We work well with any sector, but it
helps if:
 Their business relies on email for
communication
 There would be a high impact with
a data breach or targeted attack
 Compliance needs – data
jurisdiction, retention period, data
protection, tamperproof store
Confidential
Partner Resources
• Mimecast Knowledge Base & Mimecast Central
https://www.mimecast.com/customer-success/
• Supporting collateral
• https://www.mimecast.com/solutions/platforms/office-365/
• Recommendations
• Technical Workshop/Demo
• Microsoft MVP Positioning Session
Mail server migration Spam, virus &
targeted attack
protection
Protecting sensitive &
confidential data
Protection
against email
downtime & data
loss
Email storage &
eDiscovery
Sending large files
Email access for remote users
Email
branding &
marketing
Compliance/regulation
Summary
Unlock a lucrative SharePoint
business, without additional
investment
Nick Benham
ICS / FLEX
Copyright ICS Solutions 2017
WHAT IS FLEX LITE?
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
Trusted Microsoft Gold Partner for over 20 years
• Established in 1994
• Microsoft Tier 1 managed Gold Partner
• Founding Partner of the Microsoft Azure Circle
• UK’s First Office 365 Partner
• UK’s most experienced SharePoint Partner with over 500 Projects
Copyright ICS Solutions 2017
FLEX ENTERPRISE – 70,000 USERS AND £2.7M INVESTED
Established since September 2014
FLEX - BUILT ON EXPERIENCE AND INVESTMENT
“Speedy implementation of SharePoint was our main motivating force
for selecting FLEX….”
Tony Foot, IT Delivery Manager, WaterAid
“Rapid deployment of SharePoint was our main driving force in
selecting FLEX…...”
Debbie Jupe, Senior Project Manager, WM Housing
“FLEX has allowed our end users to be much more self-sufficient with regards
to content creation….”
Adam Doswell, Enterprise Systems Developer, Malvern Instruments
Copyright ICS Solutions 2017
Email
Networking
Email
Networking
Servers
Support
Collaboration
Applications Desktop
Consulting
Servers
Support
Collaboration
Applications Desktop
Consulting
HOW DO I GROW REVENUE IN A CLOUD WORLD?
Pre-cloud revenue landscape for SME partners Post-cloud revenue landscape for SME partners
Support
Consulting
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
FLEX helps partners grow customer revenue in a post cloud world
Copyright ICS Solutions 2017
FLEX MAKES YOU MONEY, OUT-OF-THE-BOX
You don’t need to set up a SharePoint practice
No consulting sale, FLEX is like other ISV software
Compelling customer materials are provided
FLEX is highly affordable reducing costs by up to 90%
Good margins recurring licence and services
FLEX allows partners to quickly generate margin with low investment
Copyright ICS Solutions 2017
SOLUTION IN A BOX MARKETING IN A BOX SELLING IN A BOX DEPLOYMENT IN A BOX
Out-of-the-box software
Best-of-Breed Intranet
Next Generation Collaboration
Digital Workplace
Easy to sell (non consulting)
Software & service pricing tool
Standard demo’s etc..
Standard collateral
Sales support
Easy to market
Pre-built campaigns
Pre-built webinars
Web content
Branded collateral
Easy to deploy
Standard deployment materials
Standard training
3rd Party deployment if needed
HOW DOES THAT WORK?
FLEX provides the partner with everything they need out-of-the-box
Copyright ICS Solutions 2017
WHY DO MY CUSTOMERS NEED FLEX LITE?
Small organisations have the same need to collaborate digitally with
customers, partners and employees as large organisations but a
fraction of the budget.
FLEX uses automation technology and SME business templates to
configure Office 365 and Azure to drive user adoption for a fraction of
the time and cost of doing it manually.
ENTERPRISE
FLEX Lite gives SME’s Enterprise solutions at a realistic cost
SME
Copyright ICS Solutions 2017
WHAT DO I GET OUT-OF-THE-BOX?
Deployment Choice 1
Traditional ManualINTRANET - INFORMATION WORKPLACE – SELF SERVICE
75 BUSINESS FORMS
50+ BUSINESS APPS
11 GENERIC
COLLABORATION APPS
Affordable business critical Microsoft technology for SMEs
7 DEPARTMENT HUBS
Copyright ICS Solutions 2017
WHAT CAN I DO WITH IT?
Deployment Choice 1
Traditional Manual
Affordable business critical Microsoft technology for SMEs
BUSINESS COMMUNICATION
What’s going on in the business?
Easily create news, events and
articles
SELF-SERVICE
COLLABORATION
Ability for end users to
effortlessly share and
collaborate internally and
externally
SIMPLE DOCUMENTATION AND
INFORMATION MANAGEMENT
Ability to store and find documents easily
Copyright ICS Solutions 2017
HOW DO I USE IT?
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Office 365 Interface Azure Interface
FLEX Business Apps
FLEX AVOIDS THE NEED TO TRAIN ORDINARY USERS IN THE OFFICE 365 OR AZURE TECHNOLOGY
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1
Traditional Manual
Deployment Choice 2
FLEX Automation
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
WHAT DOES IT COST?
DEPLOYMENT COSTS
FLEX Enterprise
Baseline Deployment
£37,000
FLEX Lite
Baseline Deployment
from £5,995
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
Deployment Choice 1
Traditional Manual
FLEX Achieves the
following benefits:
EXAMPLES
Affordable business critical Microsoft technology for SMEs
Join the conversation
#LoveCloud

30 March 2017 - Vuzion Ireland Love Cloud

  • 1.
  • 2.
  • 3.
    Digital transformation is thenext industrial revolution Steam, water, mechanical production equipment Division of labor, electricity, mass production Electronics, IT, automated production Blurring the physical and the digital divide 1784 1870 1969 2017 Industrial Revolution 4.0
  • 4.
    About Vuzion We canhelp make your business future proof • A cloud aggregator • Built on 20 years of delivering and selling cloud services • A rich portfolio of cloud services • A smart ecosystem of partners
  • 5.
    Vuzion GTM Model p Operational Delivery •ManagedService •Billing & Support Capability Development •Technical •Sales Pre-Sales Engagement •Technical review •POCs & Trials Services & Frameworks •Backup •Identity •IaaS/PaaS Bespoke Solutions •Solution Design •ISV Enablement • Help resellers build their own solutions based around a set of defined frameworks • Solutions based on “finished” services that can be resold • Bespoke solution development support • Service wraps to deliver operational efficiency
  • 6.
  • 7.
    o Cloud andHosting Summit 2017 o Reseller & Vuzion (Partner Center) o Skype for Business update o Security as a Service o Business Premium Update o Q&A
  • 8.
    Cloud and HostingSummit 2017 – Bellevue Seattle
  • 9.
    | 2017 MicrosoftCloud and Hosting Summit
  • 10.
    Cloud Model drivingDigital Transformation
  • 11.
  • 12.
  • 13.
    Partner Center –Reseller update
  • 15.
    Skype for Business– Ireland Update
  • 17.
  • 18.
    Security as aService – SMB opportunity
  • 19.
    Security As AService SECURE CONTENT PROTECT CONTENT: CREATION, TRANSIT, CONSUMPTION SECURE DEVICES WORKPLACE ISSUED OR BYOD DEVICES GREAT EMPLOYEE EXPERIENCE PRODUCTIVITY WITHOUT COMPROMISE SECURE THE FRONT DOOR IDENTITY DRIVEN SECURITY IDENTITY IS THE NEW CONTROL PLANE: Stickiness, Future Growth (On-Prem, SalesForce, DropBox and 2600+ other SaaS, AWS, Azure)
  • 20.
    Secure the FrontDoor Leaked credentials Infected devices Configuration vulnerabilities Risk-based policies MFA Challenge Risky Logins Block attacks Change bad credentials Suspicious sign-in activities MACHINE LEARNING AND RISK PROFILING OPEN THE FRONT DOOR BASED ON RISK Shadow IT Risk Assessment User MFA Conditions Location (IP range) Device state User group Risk Block access Enforce MFA per user/per app Allow access Leaked credentialsInfected devices Configuration vulnerabilities RISK BASED POLICIES MFA Challenge Risky Logins Block attacks Change bad credentials Machine-Learning Engine Brute force attacks Suspicious sign-in activities EXTENSIBILITY POWER BI, SIEM REPORTING APIs NOTIFICATIONS DATA EXTRACTS
  • 21.
    Security As AService – Enabling SKU’s ENABLING TECHNOLOGIES UP-SELL/CROSS-SELL Azure Active Directory Premium P2 Azure Active Directory Premium P1 (included in P2) Cloud App Security No Pre-requisites. Best Position with: 1. Business Premium, 2. E3 3. E5 4. Azure Deals SECURE THE FRONT DOOR IDENTITY DRIVEN SECURITY ENABLING TECHNOLOGIES UP-SELL/CROSS-SELL Azure Active Directory Premium P1 Cloud App Security Azure Information Protection P2 Microsoft Intune Pre-requisites: Office Mobile Apps Best Position with: 1. Business Premium, 2. E3 3. E5 SECURE CONTENT PROTECT CONTENT: CREATION, TRANSIT, CONSUMPTION Azure Active Directory Premium P1 Microsoft Intune No Perquisites. Best Position with: 1. Business Premium, 2. E3 3. E5 SECURE DEVICES WORKPLACE ISSUED OR BYOD DEVICES ENABLING TECHNOLOGIES UP-SELL/CROSS-SELL Azure Active Directory Premium P1 No Perquisites, up-sell with any Office 365 offer ENABLING TECHNOLOGIES UP-SELL/CROSS-SELL GREAT EMPLOYEE EXPERIENCE PRODUCTIVITY WITHOUT COMPROMISE
  • 22.
  • 23.
  • 24.
    Packaged IP Average Revenue:$1-$15 per user/per month4 Margin: 65% • SharePoint-Based Vertical Workflows • Middleware for Hybrid Synchronization • Industry-specific Workflows • Function-specific Workflows (e.g. HR, Procurement) • Automated O365 Telemetry (Availability & Performance) • Office Connectivity & Other Plug-Ins & Add-ons • External Portals for End Customer Information • Pre-Configured Dashboards Project Services Average Revenue: $2.5K-$15K4 Margin: 35% • Cloud Readiness Assessment • Solution Analysis, Scope, & Design • Office 365 Set up and Remediation • Simple File Server Migration • Workflow Creation in SharePoint • Yammer Adoption • End User Training Managed Services Average Revenue: $5-$15+ per user/per month4 Margin: 45% • Office 365 Tenant Management • Reactive Help Desk Support (Office, Skype for Business, Intune, CRM Online) and interface to MSFT. • Performance and Application Troubleshooting • Desktop & Device Management & Support • Reports & View Adjustments • Software Asset Management (licensing management & optimization) • Security Management & Identity Protection • Office Client Connectivity Setup • Mobile Device Connectivity & Management • Web defense (restricting URLs, phishing malware, spam) • Hybrid Environment Support (Basic Infrastructure) • VoIP Maintenance • Regulatory Compliance via Office 365 Infrastructure Exchange Online Skype for Business OneDrive for Business SharePoint Online Yammer Build long-term, value-added services for Office 365 Based on an average 25 seat deal PartnerRevenue Pitch incremental project services to light up each Office 365 workload post deployment Add managed services to your Office 365 practice and become your customer’s outsourced IT department Create SharePoint templates and extension apps, package as repeatable IP and monetize Capitalize on the market opportunity Insights to maximize profitability Managed services opportunity by 2018: $256B1 2018 projected worldwide Public IT cloud services revenue: $127B2 Run-rate Fastest Growing Business: $2.5B3 1. Markets and Markets : Managed Services Market worth $256.05 Billion by 2018(c) 2014 M2 COMMUNICATIONS IDC Worldwide and Regional Public IT Cloud Services 2014– 2018 Forecast Oct 2014 | Doc #251730 ​ 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
  • 25.
  • 26.
  • 27.
    Project Services Average Revenue:$2.5-$10K4 Margin: 35% • Cloud Planning and Readiness Assessment • Solution Analysis, Scope, & Design • Backup Deployment • Deployment Services • Heath Checks • Proof of Concept Packaged IP Average Revenue: $2.5-$7.5K4 Margin: 65% • Automated Monitoring, Alerting, & Logging • Middleware for Hybrid Synchronization • Automated Backups & Disaster Recovery • Automated Disaster Recovery Testing • Office Connectivity & Other Plug-Ins & Add-ons • External Portals for End Customer Information • Pre-Configured Dashboards Managed Services Average Revenue: $2.5-$10K4 Margin: 45% • Critical Response Support • Azure Consumption Monitoring & Optimization • Performance Monitoring & Reporting • Troubleshooting PartnerRevenue Microsoft Azure Azure Backup Azure Recovery Build long-term, value-added services for Backup 64% of organizations are currently purchasing backup and restoration services from partners1 $30 billion worth of smartphones are lost in the US in a year2 Nearly a third of all data stored in the cloud is made up of backup and recovery files3 Capitalize on the market opportunity Insights to maximize profitability Concentrate on niches to better differentiate yourself and value-price Look to move additional workloads to Azure over time Build out automated tools and own IP to lessen reliance on project services and boost margins Source: 1. BCSG, 2015 The Small business revolution: Trends in SMB Cloud Adoption enquiries@bcsg.com 2. Lookout Security, March 2012, “Lookout Predicts Americans Lose $30Billion in Smartphones a Year” permissions@readwrite.com 3. Intronis Cloud backup + Recovery , 2013 “2013 State of Cloud Backup MSPs Mission the Mark” 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
  • 28.
    Backup as a Service Creating Differentiation On-PremisesDatacenter Automated Backup Solution Provides customers with regular reporting on successful completion of backups Fixed monthly fee Includes four restores per annum
  • 30.
    Four core pillarsof the modern partner
  • 31.
    Being Ready forGDPR Darren Roberts Vuzion
  • 32.
    SHAREPOINT METADATA &TAXONOMIES AUTOMATED
  • 33.
    Successful SharePoint projectsare built on metadata • SharePoint is a powerful document management system, but in order to get the return on your investment you need rich metadata added to your documents. • Without metadata, users will struggle to find and organise their content and organisations will be unable to govern the ever-growing store of information within SharePoint. • Whether you are migrating content into SharePoint, or looking to improve your existing sites then metadata is the difference between a successful or failed project.
  • 34.
    Building taxonomies &adding metadata has always been a tough job • Building taxonomies from scratch is a time-consuming trial and error prone process. • Asking users to fill in metadata fields to save their documents to SharePoint impacts productivity and creates user adoption problems. • Migrated content will have no metadata.
  • 35.
    Next-generation taxonomy creationand metadata tagging TermSet uses Natural Language Processing and Machine Learning to add accurate consistent metadata to SharePoint content, without placing any burden on end users or the IT team. No manual work, it just happens. Taxonomy Creation Creates and maintains SharePoint taxonomies unique to your content Powerful natural language processing ensures your taxonomies are accurate and always up to date Cloud or On Premises Choose from a software as a service or a local installation Metadata Tagging SharePoint content is automatically tagged with rich and consistent metadata Tagging can be part of a migration process or as new documents are added to a library Packed with Powerful Features Language analysis Document summary generation Pattern and phrase matching Concept classification
  • 36.
    See the followingbenefits to your SharePoint project Smarter SharePoint migrations Enrich your documents with meaningful and consistent metadata as part of your migration project Improve your Information Architecture Build your SharePoint sites to reflect the information you store and remove the need for folders and views Supercharge SharePoint Search Dramatically improve SharePoint search by providing refinable metadata to your users Power Compliance & Workflows Use metadata to drive compliance and governance of your documents and drive workflows.
  • 37.
  • 38.
  • 39.
    GDPR What is GDPR? GeneralData Protection Regulation. A huge change for how we all handle data, PII (Personal Identifiable Information). What happens if non-compliant? Up to €20M or 4% of global turnover (which ever is greater) When does GDPR come into force? 25th May 2018. Who does GDPR apply to? Any organisation who hold PII on any other person or organisation
  • 40.
    TermSet for GDPRCompliance Address: 77 Sixth avenue Phone number: 847-334-2345 Address: 3608 Walnut Creek Road City: Chicago Company: Arnold Associates Salary: $37,500 Person: Manuel Santiago
  • 41.
  • 42.
    Protect Data &Recover from Disaster using Microsoft Azure Alex McLoughlin Union Solutions
  • 43.
    About Union ManagedServices • 10 Year pedigree transforming the largest IT Infrastructure Environments • Data Services where your customers need them, how your customers want them. • Our expertise is Infrastructure, Data Protection and Business Recovery, with a human touch. • We deliver managed infrastructure on premise, from our UK datacentres or in the Microsoft Azure public. • Our sole focus is delivering business outcomes for customers in the 100 - 1,000 seat SME marketplace. Union Solutions Limited 2017 Manage Infrastructure Protect Data Survive a Disaster
  • 44.
  • 45.
    Protect Data Union SolutionsLimited 2017 What challenges do your customers face…? • Ransomware, user error, system failure, datacentre loss, malicious intent or degenerative IT bugs . • Protection windows are shrinking, data is doubling, and many fail to protect data in appropriate to need. • Trying to compete in a global economy with tech savvy consumers that expect a 24×7 always-on service • If they lost a significant amount of data, the business would struggle to operate • Legacy backup software is a huge problem. Proprietary software that locks data in a proprietary format.
  • 46.
  • 47.
    Protect Data Union SolutionsLimited 2017 Visible Monitored 24×7x365. Daily Exception reporting showing compromised services and regular service reports delivered in a language you and the business can understand. Specialist Expertise Data protection has been our area of expertise for more than 20 years. Designed and built some of the most sophisticated solutions for some of the most demanding corporate environments. Union – Data Protection as a Service Secure and Portable Protected data is encrypted in transit and at rest. It never leaves your network. Historical copies needed for compliance demands provided to you in native format. No lock-in to proprietary software Pay as You Grow You pay on a consumed capacity basis. It’s an OPEX model based on per protected GB of data, with cloud enabled scale and economies. Hybrid An appliance deployed on premise, storing 31 days of backups for Instant data restore. We replicate a copy of your data between sites every night
  • 48.
    Survive a Disaster UnionSolutions Limited 2017 What challenges are you facing…? • A disaster can put your customer out of business. • They need (it’s demanded) to provide evidence of continuity plans for customers of your customers and regulated industry inspectors. • Unfortunately, most SME organisations are still playing catch up. • Disaster Recovery is often at the back of the budget queue: • Cost of delivering is substantial. • Chews up cash and profitability. • They’ve never had a disaster (yet…)
  • 49.
    Survive a Disaster UnionSolutions Limited 2017
  • 50.
    Survive a Disaster UnionSolutions Limited 2017
  • 51.
    Survive a Disaster UnionSolutions Limited 2017 Cloud Automated Recover all IT services inside 60 minutes. Instant fail-over of any VM or Physical server to the Microsoft Azure cloud. We operate your infrastructure services all the time they’re running in Azure Bespoke We create a Dynamic DR Runbook (invocation plan which we automated against) for each customer. Your customers are then armed with a demonstrable plan for customers, auditors, and regulators. Union – Disaster Recovery as a Service Tested Full test invocation every year, issuing a certificate to publish to third parties. Union manage the entire fail-over and fail-back processes. Clever technology in Azure enables us to test any server or application for DR, at anytime Responsive You pay on a consumed capacity basis. It’s an OPEX model with cloud enabled scale and economies. RPO of 60 Minutes, RTO of 60 Minutes at an SME price point (charged per protected VM + storage)
  • 52.
    Summary Union Solutions Limited2017 Talk to Union and Vuzion • Create recurring margin by selling cloud enabled managed services • Both Products orderable through Vuzion (launching on the portal in weeks to come) • This is a big conversation to have with customers. Multi year contracts drive significant committed income for your organisations. • Deal registration process locks a qualified opportunity to a Vuzion partner • Union has marketing support and expert gun slingers ready to support your sales effort to win business
  • 53.
    Sign Documents Anytime, Anywhere,on any Device Elaine Pakes DocuSign
  • 54.
    Drive usage andadoption to all Microsoft applications: SharePoint, Dynamics CRM, O365, MS Word, Outlook, Windows, Azure Sign anytime, anywhere, on any device Get approvals done, faster than ever DocuSign Ensure secure and compliant business processes Fastest & most secure way to make every decision and approval digital
  • 55.
  • 56.
  • 57.
  • 58.
    Manage digital transactionsand eSignatures directly from Microsoft applications Office 365 and SharePoint Dynamics CRM Online Windows 10|Windows Phone Customers can sign or send agreements for signature from any object in Dynamics CRM Online Electronically send documents for signature(s) and manage the documents you send from any device. Log in with Azure AD.
  • 59.
    1,500 Documented UseCases and Counting – How does Office 365 fit into these use cases?  Sales Order Processing  Account Provisioning  Sales Compensation Agreements  Referral Agreements  Reseller Agreements  Field Sales Agreements  New Customer Sign Ups  Terms and Conditions  Event Registration  Customer Communication Approvals  Mass Mailing / Email Approvals  Customer Communication Approvals  Brand Compliance / Audits  Event and Vendor Approvals  New Hire Paperwork  Candidate NDA  On/Off-boarding Checklist  Employee Policy Distribution & Signature  Contractor Agreements  Non-disclosure  PTO Management  Payroll Forms  Front Desk Sign-in  Work Orders  Lease Agreements  Move In / Move Out Requests  Parking Permits  Equipment Rentals  Lien Releases  Site Passes and Onsite Waivers  Invoice Processing  Expense Reporting  Capitalization Management  Audit Sign Off  Policy Management  Inventory Signoff  Asset Transfer / Retirement  Hiring Freeze Exemption  M&A Documentation  Account Changes  Service / Work Orders  Term Changes  Self Service Requests  Compliance  Field Service  Cancellation Requests  Internal Cancellation Processing  Asset Tracking  Change Requests  Requirements Sign Off  Access Management  Incident Reporting  Production Change Authorization  Maintenance Authorization  Order Fulfillment  Change Management  Release Management  Code Review Reporting  Requirements Acceptance  Release Scope Commitments  Project Charter Templates  NDAs  Contract Management  Internal Compliance  IP Licensing  Patent Applications  Board Minutes  Trade Name Assignment  Trademark Assignment  Finance Agreements  Purchase Orders  Statements of Work  Master Service Agreement  RFP Sign Off  Supplier Compliance  Competitive Procurement Summaries  Sole-Source Justifications  Procurement Card Applications
  • 60.
    Why Should You Care? Increase dealsize for TAV. 15% margin from MSRP Easy to set-up, Simple to use, No implementation needed Increase initial deal size. Land & expand within LoB Average sales cycle; deals between 5 - 50 seats < 45 days Average Deals Closed Per Q; 63 SMB Increase adoption usage & penetration of MSFT Applications
  • 61.
    DOCUSIGN CONFIDENTIAL Develop adoptionwith end customers on cloud based solutions Increase the value attached to O365 with our additional services and differentiation Stronger foot print with customers providing the ability to tackle many LOB/expansion use cases Increase revenue through sales and ROI for customers DocuSign Value Drivers to Resellers
  • 62.
    Leverage MSFT Integrations ExistingO365 Customers Net New Customers Special MSFT O365 Bundle Land & Expand Where To Execute
  • 63.
    Is DocuSign Legal? DOCUSIGNCONFIDENTIAL https://www.docusign.co.uk/how-it-works/legality/global
  • 64.
    DOCUSIGN CONFIDENTIAL DocuSign isthe only provider with bank-grade security Broadest Set of Security Certifications PCI DSS 3.1 Global Security Gold Standard: ISO 27001 Streamlined Process for EU Privacy Law Compliance SSAE 16 SOC 1 Type II AT 101 SOC 2 Type II Data Privacy https://trust.docusign.com/en-us/
  • 65.
    Try it foryourself DOCUSIGN CONFIDENTIAL https://secure.docusign.com/demo
  • 66.
    Organisations run onemail – give it the protection it needs Nessa Lynchehaun Mimecast
  • 67.
    Session Overview • Introductionto Mimecast • Solution overview: understand the platform & problems we solve • Maximising the opportunity for Partners • Partner Resources • Questions
  • 68.
    Confidential | Mimecast ata glance Founded 2003 in London, UK Cloud services designed to ‘Make Business Email Safer’ Over 25,000 Customers Growing at 30% YoY MIME Nasdaq Traded 97% Retention Rate Over 7 million end users 14% Annual Turnover Invested in R&D Over 20 PB or Archive Data Under Management
  • 70.
    Email and threecritical business risks Vulnerability to attack Your users and email infrastructure are under constant attack from a wide range of adversaries. Total operational dependency Tolerance for email downtime is almost zero as it costs money, damages reputations and cripples business operations. Highest concentration of corporate data Massive volumes of your most valuable corporate data are in email. Data loss, leakage or breach will have devastating effects.
  • 71.
    Protect against EmailCyber Threat Prevent Email Outages to Maintain Productivity Eliminate Data Loss and Maintain Compliance Reduce Cost and Complexity of Email Infrastructure We help our customers …
  • 72.
    Beyond the mailbox serveryour business needs… Archiving Email and File Storage Compliance e-Discovery & Legal Hold Enterprise Search End-User Access Storage Infrastructure Security Email Gateway (MTA) Anti Virus/Anti Spam Anti Malware Anti (Spear) Phishing Email Encryption Data Leak Prevention Security Monitoring & Reporting Large File Transfer Clustered Mail Servers Failover Data Centers Backup & Recovery Systems Continuity
  • 73.
  • 74.
  • 75.
    › Mimecast ›Products › Email Security › Targeted Threat Protection How Secure Is Your Infrastructure
  • 76.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Which Category do you fall under
  • 77.
    › Mimecast ›Products › Email Security › Targeted Threat Protection 91% Cyber attacks 65% Unprepared 37% = $1m> loss
  • 78.
    Confidential Top Attack VectorImpacting Global Organizations: • Phishing • Spear Phishing • Whaling • Social Engineering
  • 79.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Ignoring the risk of spear-phishing can spell disaster Breaches happen Increase of 23% since 2013 Ave. cost of breach $6.5m The results can be devastating Ponemon, 2015
  • 80.
    Confidential | The anatomyof an attack Three main attack methods: • Malicious URLs in email • Weaponized attachments • Impersonation attacks 40% of emails have an attachment 80% are potentially vulnerable PDF or office docs: ~ 50% open emails and click on links within 1 hour* Median time to first click: 1m.22s* 233% increase in phishing URLs tracked in 1 year** * Verizon Data Breach Report 2015 ** Cyren Cyber Threat Yearbook 2015 *** Analysis of 1 Terabyte of Mimecast platform data, 2015 Attack Stats 3% POWERPOINT documents 51% PDF documents 9% EXCEL documents 17% WORD documents ***
  • 81.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Existing anti-spam and anti-virus is not enough Standard Email Protection Known threat Targeted attack Targeted attack Spear-phishing Protection Threat stopped Security breach Attack stopped by advanced protection layer • Traditional email security was never designed to stop targeted attacks • A specialized second layer of defense is needed to protect data and employees
  • 82.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Mimecast Targeted Threat Protection URL Protect with URL rewriting and dynamic user awareness Attachment Protect with file transcription, on-demand and pre-emptive sandboxing Impersonation Protect with dedicated detection of whaling and malware-less phishing Internal Email Protect with file transcription, on-demand and pre-emptive sandboxing
  • 83.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Targeted Threat Protection URL Protect • All URLs in every inbound mail are rewritten at the gateway • On click, every click real-time scanning of destination site • Access is granted to clean sites without delay. Access to compromised sites is blocked • Dynamic user awareness built-in - helps build a human firewall
  • 84.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Targeted Threat Protection Attachment Protect • Pre-emptive sandbox checks email attachments pre-delivery • Option of innovative transcription with on-demand sandbox • Potentially harmful attachments replaced with transcribed safe versions • Employees have instant access to safe files • Request original via cloud-based sandbox if required
  • 85.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Targeted Threat Protection Impersonation Protect Name is One of my Users Names Domain is like one of my domains Keyword Dictionary Reply-to-address mismatch Newly Observed Domain
  • 86.
    Confidential | Detection andremediation of security threats where the sender and recipient are on the internal network Plus inspection of outbound emails Internal Email Protect
  • 87.
    Confidential | Internal EmailProtect Defending against the three types of internal threats • The Compromised Insider • The Careless Insider • The Malicious Insider
  • 88.
    Confidential | • CompromisedInsider – User’s credentials stolen by attacker – Leverages organization’s web-based email to spread attack internally or externally to partners/customers • Careless Insider – Sending sensitive data inappropriately via email to colleagues • Secret projects, Excel sheets with credit cards/SSNs etc… • Malicious Insider – Purposely distributing malware or malicious URLs – Selling sensitive data to outsiders – Taking sensitive data for personal use Example Use Cases
  • 89.
    Confidential | • TTPinspection for journaled internal emails • DLP, URL, & attachment checks • Unsafe attachment and/or emails removed from inboxes • Adds URL & attachment checks to outbound email Key Capabilities
  • 90.
    › Mimecast ›Products › Email Security › Targeted Threat Protection Mimecast Targeted Threat Protection URL Protect with URL rewriting and dynamic user awareness Attachment Protect with file transcription, on-demand and pre-emptive sandboxing Impersonation Protect with dedicated detection of whaling and malware-less phishing Internal Email Protect with file transcription, on-demand and pre-emptive sandboxing
  • 91.
  • 92.
    Confidential Partner Benefits •Unified emailsolution - single platform, single AdCon •Simple licensing model – monthly buy price per user •Happy customers - over 97% customer retention •Exciting roadmap - massive Upsell opportunity •Partner Portal - all the tools you need for on-boarding and managing your customers, training and marketing resources
  • 93.
    What does ourideal client look like? • Any size! SaaS model allows us to scale • We work well with any sector, but it helps if:  Their business relies on email for communication  There would be a high impact with a data breach or targeted attack  Compliance needs – data jurisdiction, retention period, data protection, tamperproof store
  • 95.
    Confidential Partner Resources • MimecastKnowledge Base & Mimecast Central https://www.mimecast.com/customer-success/ • Supporting collateral • https://www.mimecast.com/solutions/platforms/office-365/ • Recommendations • Technical Workshop/Demo • Microsoft MVP Positioning Session
  • 96.
    Mail server migrationSpam, virus & targeted attack protection Protecting sensitive & confidential data Protection against email downtime & data loss Email storage & eDiscovery Sending large files Email access for remote users Email branding & marketing Compliance/regulation Summary
  • 97.
    Unlock a lucrativeSharePoint business, without additional investment Nick Benham ICS / FLEX
  • 98.
    Copyright ICS Solutions2017 WHAT IS FLEX LITE? Affordable business critical Microsoft technology for SMEs
  • 99.
    Copyright ICS Solutions2017 Trusted Microsoft Gold Partner for over 20 years • Established in 1994 • Microsoft Tier 1 managed Gold Partner • Founding Partner of the Microsoft Azure Circle • UK’s First Office 365 Partner • UK’s most experienced SharePoint Partner with over 500 Projects
  • 100.
    Copyright ICS Solutions2017 FLEX ENTERPRISE – 70,000 USERS AND £2.7M INVESTED Established since September 2014 FLEX - BUILT ON EXPERIENCE AND INVESTMENT “Speedy implementation of SharePoint was our main motivating force for selecting FLEX….” Tony Foot, IT Delivery Manager, WaterAid “Rapid deployment of SharePoint was our main driving force in selecting FLEX…...” Debbie Jupe, Senior Project Manager, WM Housing “FLEX has allowed our end users to be much more self-sufficient with regards to content creation….” Adam Doswell, Enterprise Systems Developer, Malvern Instruments
  • 101.
    Copyright ICS Solutions2017 Email Networking Email Networking Servers Support Collaboration Applications Desktop Consulting Servers Support Collaboration Applications Desktop Consulting HOW DO I GROW REVENUE IN A CLOUD WORLD? Pre-cloud revenue landscape for SME partners Post-cloud revenue landscape for SME partners Support Consulting Value Add ISV’s Value Add ISV’s Value Add ISV’s Value Add ISV’s Value Add ISV’s FLEX helps partners grow customer revenue in a post cloud world
  • 102.
    Copyright ICS Solutions2017 FLEX MAKES YOU MONEY, OUT-OF-THE-BOX You don’t need to set up a SharePoint practice No consulting sale, FLEX is like other ISV software Compelling customer materials are provided FLEX is highly affordable reducing costs by up to 90% Good margins recurring licence and services FLEX allows partners to quickly generate margin with low investment
  • 103.
    Copyright ICS Solutions2017 SOLUTION IN A BOX MARKETING IN A BOX SELLING IN A BOX DEPLOYMENT IN A BOX Out-of-the-box software Best-of-Breed Intranet Next Generation Collaboration Digital Workplace Easy to sell (non consulting) Software & service pricing tool Standard demo’s etc.. Standard collateral Sales support Easy to market Pre-built campaigns Pre-built webinars Web content Branded collateral Easy to deploy Standard deployment materials Standard training 3rd Party deployment if needed HOW DOES THAT WORK? FLEX provides the partner with everything they need out-of-the-box
  • 104.
    Copyright ICS Solutions2017 WHY DO MY CUSTOMERS NEED FLEX LITE? Small organisations have the same need to collaborate digitally with customers, partners and employees as large organisations but a fraction of the budget. FLEX uses automation technology and SME business templates to configure Office 365 and Azure to drive user adoption for a fraction of the time and cost of doing it manually. ENTERPRISE FLEX Lite gives SME’s Enterprise solutions at a realistic cost SME
  • 105.
    Copyright ICS Solutions2017 WHAT DO I GET OUT-OF-THE-BOX? Deployment Choice 1 Traditional ManualINTRANET - INFORMATION WORKPLACE – SELF SERVICE 75 BUSINESS FORMS 50+ BUSINESS APPS 11 GENERIC COLLABORATION APPS Affordable business critical Microsoft technology for SMEs 7 DEPARTMENT HUBS
  • 106.
    Copyright ICS Solutions2017 WHAT CAN I DO WITH IT? Deployment Choice 1 Traditional Manual Affordable business critical Microsoft technology for SMEs BUSINESS COMMUNICATION What’s going on in the business? Easily create news, events and articles SELF-SERVICE COLLABORATION Ability for end users to effortlessly share and collaborate internally and externally SIMPLE DOCUMENTATION AND INFORMATION MANAGEMENT Ability to store and find documents easily
  • 107.
    Copyright ICS Solutions2017 HOW DO I USE IT? Deployment Choice 1 Traditional Manual Deployment Choice 2 FLEX Automation Office 365 Interface Azure Interface FLEX Business Apps FLEX AVOIDS THE NEED TO TRAIN ORDINARY USERS IN THE OFFICE 365 OR AZURE TECHNOLOGY Affordable business critical Microsoft technology for SMEs
  • 108.
    Copyright ICS Solutions2017 FLEX LITE PLAN COMPARISONS Deployment Choice 1 Traditional Manual Deployment Choice 2 FLEX Automation Affordable business critical Microsoft technology for SMEs
  • 109.
    Copyright ICS Solutions2017 FLEX LITE PLAN COMPARISONS Deployment Choice 1 Traditional Manual Deployment Choice 2 FLEX Automation Affordable business critical Microsoft technology for SMEs
  • 110.
    Copyright ICS Solutions2017 WHAT DOES IT COST? DEPLOYMENT COSTS FLEX Enterprise Baseline Deployment £37,000 FLEX Lite Baseline Deployment from £5,995 Affordable business critical Microsoft technology for SMEs
  • 111.
    Copyright ICS Solutions2017 Deployment Choice 1 Traditional Manual FLEX Achieves the following benefits: EXAMPLES Affordable business critical Microsoft technology for SMEs
  • 112.