SlideShare a Scribd company logo
1 of 19
Copyright © 2017 Forcepoint | 1
DRIVING THE SUCCESSFUL ADOPTION
OF MICROSOFT OFFICE 365
MIKE SMART
Product & Solutions Director
Copyright © 2017 Forcepoint. | 2
%
OF ORGANIZATIONS
HAVE MOVED
OFFICE 365
ONLY 1 in 20
HAVE
FULLY MIGRATED
USERS TO OFFICE 365
1
2
Copyright © 2017 Forcepoint. | 3
WHAT’S GETTING IN THE WAY OF THE SUCCESS?
SECURITY & COMPLIANCE
CONCERNS
WORKFORCE UNAWARE
OF CAPABILITIES
NETWORK ARCHITECTURE
IMPACTS USER EXPERIENCE
70% of users don’t know how to
use most of the Office 365 apps
69% of O365 customers experience
bandwidth issue weekly
91% of organizations are very or moderately
concerned about public cloud security.
Copyright © 2017 Forcepoint. | 4
ProviderManaged
ProviderManaged
THE SHARED SECURITY MODEL
Enterprise IT
Infrastructure
(as a Service)
Platform
(as a Service)
Software
(as a Service)
Identity & Access
Management
Client & Endpoint Protection
Data Classification &
Accountability
Identity & Access
Management
Client & Endpoint Protection
Data Classification &
Accountability
Identity & Access
Management
Client & Endpoint Protection
Data Classification &
Accountability
Identity & Access
Management
Client & Endpoint Protection
Data Classification &
Accountability
Databases
Security
Applications
Servers
Virtualization
Operating Systems
Data Centers
Networking
Storage
Databases
Security
Applications
Operating Systems
Databases
Security
Applications
Servers
Virtualization
Operating Systems
Data Centers
Networking
Storage
Databases
Security
Applications
Servers
Virtualization
Operating Systems
Data Centers
Networking
Storage
CustomerManaged
CustomerManaged
CustomerManaged
CustomerManaged
ProviderManaged
Servers
Virtualization
Data Centers
Networking
Storage
Copyright © 2017 Forcepoint. | 5
25% Shared
Broadly
THE NEED TO GAIN VISIBILITY & CONTROL OF CRITICAL DATA
18% Uploaded files
contain sensitive data
12.5% Broadly
shared files contain
sensitive data
Business Partners
Personal Email Users
28%
6.2%
Anyone with the link
5.5%
Skyhigh & Symantec 2017
2.7%
Publicly Accessible
Copyright © 2017 Forcepoint. | 6
THE FORMULA FOR SUCCESSFUL ADOPTION
Enhance Microsoft’s
Integrated Cloud Security
Improve the visibility & protection against
advanced threats and data loss across
Office 365 and other cloud applications
Maintain Consistent
Compliance
into the Microsoft ecosystem and beyond
Take back control of
Unsanctioned IT
impacting the full adoption of Office
365 and maintain workforce
productivity with reduced risk.
Implement The Right
Network Architecture
to improve user experience and reduce cost
as you fully adopt the Microsoft applications
and migrate users to the cloud
To foster innovation and
increase productivity
whilst maintaining compliance
and reducing risks
SUCCESSFUL
ADOPTION
Copyright © 2017 Forcepoint. | 7
Gain visibility &
control of BYOD
access across O365 &
Other Cloud Apps
Enterprise-class, hybrid
cloud data protection
Detect and prevent
advanced threats
Identify & prevent
high risk user
behaviour including
compromised
account access, and
malicious users
ENHANCE MICROSOFT’S INTEGRATED CLOUD SECURITY
Reduce security
operational costs
and configuration
risk
Copyright © 2017 Forcepoint. | 8
ENTERPRISE-CLASS, HYBRID CLOUD DATA PROTECTION
Forcepoint DLP Integrates with Office 365 to enable organisations to:
Improved visibility and control of a broader set of data
Consistent DLP policies across your environment
Protect your critical data wherever needs to flow
ENDPOINTS NETWORK EMAIL WEB
3rd PARTY
CLOUD
Azure
Information
Protection
O365
FORCEPOINT DLPFORCEPOINT DLP
Copyright © 2017 Forcepoint. | 9
UNDERSTANDING USER RISK & ADAPTING PROTECTION
Copyright © 2017 Forcepoint. | 10
Forcepoint helps maintain compliance in five key ways
CONSISTENT COMPLIANCE AS USERS AND DATA MIGRATE TO OFFICE 365 ECOSYSTEM & BEYOND
MAINTAIN CONSISTENT COMPLIANCE ACROSS 365 & BEYOND
FORCEPOINT HELPS MAINTAIN COMPLIANCE INTO OFFICE 365 & OTHER CLOUD APPS
IN FIVE KEY WAYS:
Data protection
standards,
including data
migration and
sovereignty
Identify license
over-spend
across all cloud
applications
Auditing of
workforce
and supplier
access activity
Privileged
access
management,
segregation of
duty & risk
adaptive access
management
Benchmarking
Office 365 and other
cloud application
deployment and
configuration to
industry or
regulatory standards
Copyright © 2017 Forcepoint. | 11
MAINTAIN CONSISTENT COMPLIANCE ACROSS 365 & BEYOND
Copyright © 2017 Forcepoint. | 12
TAKE BACK CONTROL OF UNSANCTIONED IT
Identify use of all cloud apps (sanctioned
and unsanctioned) and understand
organizational risk
Work with employees to migrate to
sanctioned alternative (for apps that are
competing with Office 365 apps), and block
access to ungoverned apps
On-board legitimate Line of Business IT
that was not acquired via IT
procurement process (& apply correct
due-diligence)
1 2 3
Identify and take control of unsanctioned cloud applications impacting full adoption of O365
Copyright © 2017 Forcepoint. | 13
TAKE BACK CONTROL OF UNSANCTIONED IT
Copyright © 2017 Forcepoint. | 14
NETWORKING
SD-WAN connects sites directly to the Internet
for performance needed for Office 365
Traffic prioritization & link selection improves
user experience
SECURITY
Once connected to the Internet, each site needs
strong security
OPERATIONS
Centralized management of distributed
networking and security ties it all together
Rethink your network to improve user experience and reduce
cost as you fully adopt the Microsoft O365
IMPLEMENT THE RIGHT NETWORK ARCHITECTURE
Copyright © 2017 Forcepoint. | 15
FORCEPOINT NGFW BUSINESS VALUE SNAPSHOT
Copyright © 2017 Forcepoint. | 16
FORCEPOINT’S OFFICE 365 SECURITY & COMPLIANCE SOLUTION
Enhance Microsoft’s
Integrated Cloud Security
Improve the visibility & protection against
advanced threats and data loss across
Office 365 and other cloud applications
Maintain Consistent
Compliance
into the Microsoft ecosystem and beyond
Take back control of
Unsanctioned IT
impacting the full adoption of Office
365 and maintain workforce
productivity with reduced risk.
Implement The Right
Network Architecture
to improve user experience and reduce cost
as you fully adopt the Microsoft applications
and migrate users to the cloud
To foster innovation and
increase productivity
whilst maintaining compliance
and reducing risks
SUCCESSFUL
ADOPTION
Copyright © 2017 Forcepoint. | 17
A NEXT GENERATION OFFICE 365 SECURITY & COMPLIANCE SOLUTION
Identify & manage the risk of unsanctioned
cloud apps and BYO device access
Centralize security and compliance
management and reporting
Provide security operations with actionable
security management information
Transform the effectiveness of the security
program with pro-active security
Visibility
 Forcepoint provides centralized view of unsanctioned cloud app use
impacting the full adoption of O365
 Single point of visibility and enforcement of BYOD and managed device
access for Office 365 and other sanctioned cloud application in use
Program
Efficacy
 Forcepoint integrates into the Microsoft ecosystem to improve the
accuracy and efficacy of data protection programs
 Detect and prevent advanced threats, compromised account access,
malicious users & reduce risk of data loss or theft
Dynamic
Enforcement
 Uniquely, Forcepoint DLP integrates user risk scoring from
behavior analytics to automate security policy enforcement to
remediate fraudulent activity before it happens
Integrated
System
 Forcepoint’s Human Point System provides an integrated view of
users, data and cloud applications.
 Forcepoint analytics provides context into user actions across
disparate data sources including O365 to identify high risk activity
Removes the barriers to successful
adoption of Office 365
 Extends Microsoft’s integrated security to increase efficacy and
drive increased value in investments
 Reduce risks and operational costs through centralized visibility &
control of security & compliance across O365 & other cloud apps
Copyright © 2017 Forcepoint. | 18
NEXT STEPS
Introducing the Cloud Threat Assessment
Cloud Threat Assessment Report details your cloud-application risk posture:
• Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization.
• Geographical usage. Which countries your data is traveling to and from (you may be surprised).
• Privileged users. Do you have more administrators than you need?
• Dormant users. Are you overspending on unused licenses?
• Riskiest users. Who are your riskiest users and why?
Copyright © 2017 Forcepoint. | 19
Thank you

More Related Content

What's hot

Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Bitglass
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 

What's hot (20)

Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 

Similar to Driving the successful adoption of Microsoft Office 365

Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityFlexera
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...GWAVA
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityDoug Copley
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise ebuc
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Learning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@eduLearning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@edupearce.alex
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdftest888649
 

Similar to Driving the successful adoption of Microsoft Office 365 (20)

Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
MS CLOUD DECK
MS CLOUD DECKMS CLOUD DECK
MS CLOUD DECK
 
Learning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@eduLearning Gateway Conference: A look at live@edu
Learning Gateway Conference: A look at live@edu
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
 

More from Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryForcepoint LLC
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human PsycheForcepoint LLC
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 

More from Forcepoint LLC (19)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
 
The Human Point
The Human PointThe Human Point
The Human Point
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 

Recently uploaded

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Driving the successful adoption of Microsoft Office 365

  • 1. Copyright © 2017 Forcepoint | 1 DRIVING THE SUCCESSFUL ADOPTION OF MICROSOFT OFFICE 365 MIKE SMART Product & Solutions Director
  • 2. Copyright © 2017 Forcepoint. | 2 % OF ORGANIZATIONS HAVE MOVED OFFICE 365 ONLY 1 in 20 HAVE FULLY MIGRATED USERS TO OFFICE 365 1 2
  • 3. Copyright © 2017 Forcepoint. | 3 WHAT’S GETTING IN THE WAY OF THE SUCCESS? SECURITY & COMPLIANCE CONCERNS WORKFORCE UNAWARE OF CAPABILITIES NETWORK ARCHITECTURE IMPACTS USER EXPERIENCE 70% of users don’t know how to use most of the Office 365 apps 69% of O365 customers experience bandwidth issue weekly 91% of organizations are very or moderately concerned about public cloud security.
  • 4. Copyright © 2017 Forcepoint. | 4 ProviderManaged ProviderManaged THE SHARED SECURITY MODEL Enterprise IT Infrastructure (as a Service) Platform (as a Service) Software (as a Service) Identity & Access Management Client & Endpoint Protection Data Classification & Accountability Identity & Access Management Client & Endpoint Protection Data Classification & Accountability Identity & Access Management Client & Endpoint Protection Data Classification & Accountability Identity & Access Management Client & Endpoint Protection Data Classification & Accountability Databases Security Applications Servers Virtualization Operating Systems Data Centers Networking Storage Databases Security Applications Operating Systems Databases Security Applications Servers Virtualization Operating Systems Data Centers Networking Storage Databases Security Applications Servers Virtualization Operating Systems Data Centers Networking Storage CustomerManaged CustomerManaged CustomerManaged CustomerManaged ProviderManaged Servers Virtualization Data Centers Networking Storage
  • 5. Copyright © 2017 Forcepoint. | 5 25% Shared Broadly THE NEED TO GAIN VISIBILITY & CONTROL OF CRITICAL DATA 18% Uploaded files contain sensitive data 12.5% Broadly shared files contain sensitive data Business Partners Personal Email Users 28% 6.2% Anyone with the link 5.5% Skyhigh & Symantec 2017 2.7% Publicly Accessible
  • 6. Copyright © 2017 Forcepoint. | 6 THE FORMULA FOR SUCCESSFUL ADOPTION Enhance Microsoft’s Integrated Cloud Security Improve the visibility & protection against advanced threats and data loss across Office 365 and other cloud applications Maintain Consistent Compliance into the Microsoft ecosystem and beyond Take back control of Unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk. Implement The Right Network Architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud To foster innovation and increase productivity whilst maintaining compliance and reducing risks SUCCESSFUL ADOPTION
  • 7. Copyright © 2017 Forcepoint. | 7 Gain visibility & control of BYOD access across O365 & Other Cloud Apps Enterprise-class, hybrid cloud data protection Detect and prevent advanced threats Identify & prevent high risk user behaviour including compromised account access, and malicious users ENHANCE MICROSOFT’S INTEGRATED CLOUD SECURITY Reduce security operational costs and configuration risk
  • 8. Copyright © 2017 Forcepoint. | 8 ENTERPRISE-CLASS, HYBRID CLOUD DATA PROTECTION Forcepoint DLP Integrates with Office 365 to enable organisations to: Improved visibility and control of a broader set of data Consistent DLP policies across your environment Protect your critical data wherever needs to flow ENDPOINTS NETWORK EMAIL WEB 3rd PARTY CLOUD Azure Information Protection O365 FORCEPOINT DLPFORCEPOINT DLP
  • 9. Copyright © 2017 Forcepoint. | 9 UNDERSTANDING USER RISK & ADAPTING PROTECTION
  • 10. Copyright © 2017 Forcepoint. | 10 Forcepoint helps maintain compliance in five key ways CONSISTENT COMPLIANCE AS USERS AND DATA MIGRATE TO OFFICE 365 ECOSYSTEM & BEYOND MAINTAIN CONSISTENT COMPLIANCE ACROSS 365 & BEYOND FORCEPOINT HELPS MAINTAIN COMPLIANCE INTO OFFICE 365 & OTHER CLOUD APPS IN FIVE KEY WAYS: Data protection standards, including data migration and sovereignty Identify license over-spend across all cloud applications Auditing of workforce and supplier access activity Privileged access management, segregation of duty & risk adaptive access management Benchmarking Office 365 and other cloud application deployment and configuration to industry or regulatory standards
  • 11. Copyright © 2017 Forcepoint. | 11 MAINTAIN CONSISTENT COMPLIANCE ACROSS 365 & BEYOND
  • 12. Copyright © 2017 Forcepoint. | 12 TAKE BACK CONTROL OF UNSANCTIONED IT Identify use of all cloud apps (sanctioned and unsanctioned) and understand organizational risk Work with employees to migrate to sanctioned alternative (for apps that are competing with Office 365 apps), and block access to ungoverned apps On-board legitimate Line of Business IT that was not acquired via IT procurement process (& apply correct due-diligence) 1 2 3 Identify and take control of unsanctioned cloud applications impacting full adoption of O365
  • 13. Copyright © 2017 Forcepoint. | 13 TAKE BACK CONTROL OF UNSANCTIONED IT
  • 14. Copyright © 2017 Forcepoint. | 14 NETWORKING SD-WAN connects sites directly to the Internet for performance needed for Office 365 Traffic prioritization & link selection improves user experience SECURITY Once connected to the Internet, each site needs strong security OPERATIONS Centralized management of distributed networking and security ties it all together Rethink your network to improve user experience and reduce cost as you fully adopt the Microsoft O365 IMPLEMENT THE RIGHT NETWORK ARCHITECTURE
  • 15. Copyright © 2017 Forcepoint. | 15 FORCEPOINT NGFW BUSINESS VALUE SNAPSHOT
  • 16. Copyright © 2017 Forcepoint. | 16 FORCEPOINT’S OFFICE 365 SECURITY & COMPLIANCE SOLUTION Enhance Microsoft’s Integrated Cloud Security Improve the visibility & protection against advanced threats and data loss across Office 365 and other cloud applications Maintain Consistent Compliance into the Microsoft ecosystem and beyond Take back control of Unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk. Implement The Right Network Architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud To foster innovation and increase productivity whilst maintaining compliance and reducing risks SUCCESSFUL ADOPTION
  • 17. Copyright © 2017 Forcepoint. | 17 A NEXT GENERATION OFFICE 365 SECURITY & COMPLIANCE SOLUTION Identify & manage the risk of unsanctioned cloud apps and BYO device access Centralize security and compliance management and reporting Provide security operations with actionable security management information Transform the effectiveness of the security program with pro-active security Visibility  Forcepoint provides centralized view of unsanctioned cloud app use impacting the full adoption of O365  Single point of visibility and enforcement of BYOD and managed device access for Office 365 and other sanctioned cloud application in use Program Efficacy  Forcepoint integrates into the Microsoft ecosystem to improve the accuracy and efficacy of data protection programs  Detect and prevent advanced threats, compromised account access, malicious users & reduce risk of data loss or theft Dynamic Enforcement  Uniquely, Forcepoint DLP integrates user risk scoring from behavior analytics to automate security policy enforcement to remediate fraudulent activity before it happens Integrated System  Forcepoint’s Human Point System provides an integrated view of users, data and cloud applications.  Forcepoint analytics provides context into user actions across disparate data sources including O365 to identify high risk activity Removes the barriers to successful adoption of Office 365  Extends Microsoft’s integrated security to increase efficacy and drive increased value in investments  Reduce risks and operational costs through centralized visibility & control of security & compliance across O365 & other cloud apps
  • 18. Copyright © 2017 Forcepoint. | 18 NEXT STEPS Introducing the Cloud Threat Assessment Cloud Threat Assessment Report details your cloud-application risk posture: • Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. • Geographical usage. Which countries your data is traveling to and from (you may be surprised). • Privileged users. Do you have more administrators than you need? • Dormant users. Are you overspending on unused licenses? • Riskiest users. Who are your riskiest users and why?
  • 19. Copyright © 2017 Forcepoint. | 19 Thank you

Editor's Notes

  1. Forcepoint’s Office 365 Solution Positioning Statement   For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.   Other providers offer point solutions and lack deep Microsoft integration. Only Forcepoint is deeply integrated with Office 365, offering the most complete security Office 365 environment available.  
  2. CISO, we want to help you to be the hero by spearheading the successful adoption & conclusion of your long-standing O365 migration project. Source: 1)Barracuda 2017, 2) Skyhigh 2017 Also according to Microsoft Tech community, 87% of IT pros see driving adoption of O365 as a top priority. Source: https://www.binarytree.com/media/2226/journey-to-office-365-cloud-infographic.pdf (Microsoft 2017)
  3. Security & Compliance: This is the biggest barrier to full adoption. Often, Compliance teams restrict deployments while they ratify risk to compliance program, security teams may veto moving users to cloud alternative until they are confident that they have the security in place to maintain or increase the level of security to proect users and the data they are processing. Workforce Unaware of Capabilities: - IT & security can support the business here by identifying unsanctioned IT that is being used instead of the sanctioned O365 application alternative. Identifying overlapping IT and raising awareness to the business users of the correct alternative is a quick win for everyone. - Working with the business to organise user training / coaching sessions etc. Network Architecture Impacts User Experience: According to zScaler those organisations that migrate users over to O365 cloud apps see a 40% increase in bandwidth requirements. 70% of organisations see bandwidth issues reported on a weekly basis (30% report daily issues!).
  4. Why? Even with SaaS you need to look after users and data – e.g. compromised accounts, enforcing strong authentication, managing the devices they access cloud apps from etc.. Also, would you rely on the cloud provider’s security alone? – or would you prefer to have your own oversight (e.g look for advanced malware in file stores or email services that the cloud app provider says they do already? – you’ll always find things that were not detected.. Also even if SaaS provider offers security, each app (or platform) has it’s own security domain, and that means multiple places to create and manage security policies, as well as inconsistent capabilities too (This also applies to governance and compliance too)…
  5. Discover your files (Attack Surface) Manage the flow of data across the organization Integrate with Enterprise DLP to gain deeper visibility and control New data actions / incidents: (Public sharing, over sharing, saving into unsanctioned IT) Skyhigh: 21% of sensitive files that are shared externally are accessed within 5 minutes of the sharing action, making response time critical to preventing data breaches. – Overall, 18,1% of files uploaded to cloud-based file sharing and collaboration services contain sensitive data, which can be broken down into six categories: • 4.4% of data is confidential (e.g. financial records, business plans, source code, trading algorithms, etc.) • 3.9% of data contains personally identifiable information (e.g. Social Security numbers, tax ID numbers, phone numbers, date of birth, etc.) • 3.2% of data is password protected, and most security solutions do not inspect it (e.g. password protected ZIP files, Excel spreadsheets, etc.) • 2.7% of data is email (e.g. PST exports from Microsoft Outlook, individual EML messages, individual MSG messages, etc.) • 2.3% of data contains payment information (e.g. credit card numbers, debit card numbers, bank account numbers, etc.) • 1.6% of data contains protected health information (e.g. patient diagnoses, medical treatments, medical record IDs, etc.) https://info.skyhighnetworks.com/WPCloudAdoptionandRiskReportQ42016_BannerCloud.html?Source=Website&LSource=Website SYMC 2017: https://resource.elq.symantec.com/LP=4717?cid=70138000001QNHyAAO&inid=symc_cloud-application-security-cloudsoc_fam_to_leadgen_form_LP-4717_1H-2017-shadow-data-report SYMC 2016: http://www.computerweekly.com/news/450298345/Shadow-data-and-the-risks-posed-by-cloud-storage-and-apps (SYMC) Then there is over-sharing. Cloud security developer Elastica’s vice-president Eric Andrews says the company’s threat team analysed 63 million documents stored by its customers in 2015, looking for shadow data threats. It discovered that 25% of the documents owned by the average user were broadly shared; for example, shared with everyone in the company, with outside contractors or accessible to anyone with the web link. Of those broadly-shared documents, 12.5% (so 3% overall) contained sensitive or compliance-related data. The type of data at risk varied by industry.
  6. Forcepoint’s Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Confidence you can:   Enhance Microsoft’s integrated cloud security and regain visibility & protection against advanced attacks and data loss Maintain compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud Ask your audience – where do you want to start? Make sure we emphasise that we can do all of this, BUT NOT JUST LIMITED TO MICROSOFT – we can extend all of this to all cloud applications and legacy infrastructure too. Biggest Differentiators: Custom / Bespoke App mapping and security, Embedded UEBA provides Context & Adapt controls to block risky users, not just notify.
  7. Identify all cloud apps in use (Sanctioned & unsanctioned) User CASB and or Web gateway. Web gateway can also identify shadow IT, and then block access to unwanted apps. In the next release you can then provision CASB management of sanctioned apps from within Web Gateway console..
  8. Investigate each app to understand impact, compare similar apps to find a safer alternative etc..
  9. Improve user experience Take advantage of local broadband Improve availability Reduce operational costs by half Improve branch office security
  10. Forcepoint’s Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Confidence you can:   Enhance Microsoft’s integrated cloud security and regain visibility & protection against advanced attacks and data loss Maintain compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud Ask your audience – where do you want to start? Make sure we emphasise that we can do all of this, BUT NOT JUST LIMITED TO MICROSOFT – we can extend all of this to all cloud applications and legacy infrastructure too. Biggest Differentiators: Custom / Bespoke App mapping and security, Embedded UEBA provides Context & Adapt controls to block risky users, not just notify.
  11. OUR SYSTEM HOLISTICALLY ADDRESSES CISO CONCERNS Our system works together to effectively address all of the problems we’ve heard from CISOs: Problem: Data being stored in places that you can’t easily see, and being accessed from anywhere Human Point solution: DLP and Insider threat provide powerful investigation capabilities and NGFW = central visibility Problem: Too many point solutions w/ no unified security policy Human Point solution = integrated view of clouds, 3rd party apps and users, unifying multiple solutions into a single location Problem: Too many alerts – cannot determine critical signal Human Point solution: UEBA cuts through noise w/ analytics, DLP helps identify and offer guidance on riskiest behaviors Problem: Worried about enforcement – manual, reactive, and too late Human Point solution: UEBA = gives context to user actions across data sources to identify non-compliant activities, DLP remediates fraudulent activity before it happens
  12. Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control — we can help get it back. Register now for a FREE Cloud Threat Assessment Report that details your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why?