SlideShare a Scribd company logo
Microsoft 365 |
Modernisez, optimisez et sécurisez
votre entreprise
Siddick ELAHEEBOCUS
Directeur
SPILOG PARTNER
CONSULTING SERVICES
Siddick ELAHEEBOCUS @ SPILOG Partner Consulting Services (SPCS)
▪ Directeur & Stratégiste informatique.
▪ Originaire de l’Ile Maurice.
▪ Conférencier, formateur et expert des technologies Microsoft (cloud, datacenter, productivité, mobilité, sécurité), VEEAM,
Citrix, Dell, entre autres.
▪ 18 années d’expériences à l’international :
o L’intégration des systèmes, stratégie, consulting, la formation informatique.
▪ Territoire : Polynésie Française, Nouvelle Calédonie, Vanuatu, Fiji, Nouvelle Zélande, Ile Maurice, Afrique.
▪ Microsoft : Ex-P-SSP / Ex-TSP, Ex-MCT Lead, MCT et autres à venir 😊 !
▪ Membre actif :
Organisation Pays
Communauté aOS Mondial
Organisation des Professionnels de l'Économie Numérique (OPEN)
(Référent Infras & liaisons (PR/privé) du projet SMART Polynesia) Polynésie
FrançaiseClub de la Sécurité de l'Information Région Tahiti (CLUSIR)
Incubateur de projets polynésiens (PRISM) (Mentor)
Organisation des Professionnels de l'Économie Numérique (OPEN)
Nouvelle
Calédonie
Fédération des enterprises (MEDEF)
Syndicat du Numérique Nouvelle-Calédonie (SNNC)
IT Professionals New Zealand Nouvelle Zélande
Références
• Profile LinkedIn| https://tinyurl.com/ydxuws6a
• Etude de cas Microsoft (Tahiti Nui Fortress) | https://tinyurl.com/y9cv4lsz
• Etude de cas Microsoft (VITI) | https://tinyurl.com/y8tkfjvt
• Article de presse | https://tinyurl.com/y9tbztr6
• Speaker au Pacific Business Forum | https://tinyurl.com/y7abdwlp
• Speaker au conférence Microsoft Docker | https://tinyurl.com/ycqdpp99
• Speaker au Microsoft Techdays | https://tinyurl.com/yazq8ezp
• Canal YouTube | https://tinyurl.com/y8ob4c7v
Les grands défis technologiques auxquels
sont confrontés les PME aujourd'hui
Maintenir une
technologie à jour
Favoriser la
mobilité
Protéger vos
données sensibles
Lutter contre les
Cyber-menaces
Local Logins
/MSA
New PCs
bought adhoc
PCs refreshed
when dead
Employees
using personal
mobile devices
IT purchasing
decisions
made “on the spot”
What does today look
like for the customers?
“Good
enough”
platforms
No
technology
strategy
Legacy
back office
Fragmented
end-point
solutions
Cybercriminals target businesses of all sizes
24% customer’s privacy violated
20% trade secrets leaked
(1) Source: Small Business Cyber Security Study, Microsoft & YouGov, April 2018
(2) Source: Better Business Bureau “2017 State of Cybersecurity Among Small Businesses in North America. https://www.bbb.org/globalassets/shared/media/state-of-
cybersecurity/updates/cybersecurity_final-lowres.pdf
33%
(1)
One in four SMBs targeted (1)
Average loss (2)
$79,841
A complete, intelligent solution
to empower employees to be
creative and work together, securely.
Microsoft 365
Windows 10 + Office 365 + Enterprise Mobility + Security
Productivity
Office Applications
Word, Excel, PowerPoint, Outlook,
and more
Online Services
Exchange, OneDrive (1TB), Teams, and
more
Advanced Services
Exchange Online Archiving
Advanced Security
External Threat Protection
Office 365 Advanced Threat
Protection
Multi-Factor Authentication
Enforce Windows Defender Exploit
Guard
Enforce BitLocker encryption
Internal data leak prevention
Data Loss Prevention
Azure Information Protection
Device management
Device management
Microsoft Intune
Single Sign On (SSO) > 10 apps
Deployment assistance
Windows Autopilot
Auto-installation of Office apps
AAD Auto-enroll
+ +
What is
Additional benefits
Consistent security configuration across
Windows 10, macOS, Android, and iOS
devices
Upgrade from Windows 7 Pro or Windows 8.1
Pro to Windows 10 Pro ad no additional cost
99.9% financially-backed uptime guarantee;
24x7 online and phone support
Microsoft 365 Business
Microsoft 365 Business | Simplifying SMB technology investment
3rd party solutions
Productivity Software
File Storage
Online Meetings
Device Anti Virus
Email Filtering
Chat-based teamwork
Cloud identity management
Device Management
Archiving
>$100 Microsoft offerings $20
Microsoft 365 Business
A single, integrated solution
with support for hybrid identity
Windows 10 Business
Intune
Office 365 Advanced Threat Protection
Data Loss Prevention
Azure Information Protection P1
AAD Features
Exchange Online Archiving
Office 365 Business Premium
Microsoft 365
Microsoft 365
Enterprise
Microsoft 365
Education
Microsoft 365 E5
Microsoft 365 E3
Microsoft 365 F1
Microsoft 365
Business
Single entry point with a rationalized
set of specialist workspaces
Microsoft 365
Admin Center
Demo
Gagnez en éfficacité avec des outils
intelligents simples et familiers
Travaillez efficacement avec l’intégration
de toutes vos applications et solutions
Accédez à tous vos fichiers où que
vous soyez, et sécurisez votre
travail avec le stockage de fichiers en
ligne
Travaillez en mobilité avec des fonctions
de messagerie et de calendrier pour
organiser vos réunions facilement
Plus efficace
Mieux collaborer
ensemble
Des outils qui permettent
à votre équipe de mieux
travailler ensemble
Familiar Workflow Easy to Use Financial Peace of Mind
Easy to Schedule:
No Changes. Same Workflow
No 3rd party plug-ins
Simply schedule a Teams
meeting
“VTC Dial-in” info is
automatically included
Easy to Join:
One Click. You’re IN!
One touch dialing on video endpointsClick to join from native client
Demo
Windows 10
Enables creativity
& teamwork
Intelligent
security
Integrated for
simplicity
Threat protection
Help avoid OS
tampering with
System Guard
Safely browse the
internet with
Application Guard
Protect against
malware with
Anti-Virus
Block malware and
untrusted apps with
Application Control
Block connections
to malicious sites
with Exploit Guard
Prevent attacks, isolate threats and control malicious code execution with Windows Defender
Plan upgrades by identifying devices
that are ready, identify and resolve
app and driver compatibility blockers
Ensure update and antimalware
compliance with timely reports for
all your devices (even those on the
road)
Upgrade Readiness Update Compliance Device Health*
Reduce support costs by pro-
actively identifying and
remediating top end-user
impacting issues
Windows Analytics is a free solution that provides data-driven insights to reduce the cost of
deploying, servicing, and supporting Windows 10
Demo
Demo
Traditional Windows deployment // The old way
Build a custom image,
gathering everything else
that’s necessary to deploy
Time means money, making
this an expensive proposition
Deploy image to a new
computer, overwriting what
was originally on it
DRIVERS POLICIES
OFFICE & APPS
SETTINGS
Modern Windows deployment // The new way
Un-box and turn on
off-the-shelf Windows PC
Device is ready
for productive use
Transform with minimal
user interaction
Hardware vendor
Register devices
you purchased
Set OOBE
policy
Employee unboxes
device, powers on
Ship device directly to employee
Sync
IT Admin
Windows Autopilot Service
Intune
Configure
OOBE
Known
device?
Demo
What is it?
ATP Safe Attachments
ATP Safe Links
ATP for SharePoint, OneDrive, and Microsoft Teams
spoof intelligence
ATP anti-
phishing capabilities in Office 365
View reports to see how ATP is working
ATP reports include:
Threat protection status report
ATP Message Disposition report
ATP File Types report
If there is no data in the report, double check
that policies are set up correctly. Organizations
must have ATP Safe Links policies and ATP Safe
Attachments policies defined in order for ATP
protection to be in place.
GDPR (RGPD)
Lengthy and complex requirements
Enhanced personal privacy rights
Increased duty to protect data
Mandatory breach reporting
Significant penalties for non-compliance Improved data policies and processes
Tighter controls
Better data governance tools
What is it?
What is it?
What you need to know:
A DLP policy contains a few basic things:
Where to protect the content – locations such as Exchange Online,
SharePoint Online, and OneDrive for Business sites.
When and how to protect the content by enforcing rules comprised of:
▪ Conditions the content must match before the rule is enforced – for
example, look only for content containing Social Security numbers
that's been shared with people outside your organization.
▪ Actions that you want the rule to take automatically when content
matching the conditions is found – for example, block access to
the document and send both the user and compliance officer an
email notification.
Demo
Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
Compliance Manager
View your compliance posture against
evolving regulations.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
Demo
What is it?
What you need to know:
AIP works by classifying data based on sensitivity. You
configure policies to classify, label, and protect data
based on its sensitivity. Classification with Azure
Information Protection is fully automatic, driven by users,
or based on recommendation.
Classification and protection information follows the
data—ensuring it remains protected regardless of where
it’s stored or who it’s shared with. You can define who
can access data and what they can do with it—such as
allowing to view and edit files, but not print or forward.
WIP – Copying Highly Confidential file to Personal One
Drive
WIP – Copying Highly Confidential file to Gmail
WIP – Copying Highly Confidential file to USB Drive
Demo
Helps you manage sensitive data prior to migrating to
Office 365 or other cloud services
Use discover mode to identify and report on files
containing sensitive data
Use enforce mode to automatically classify, label and
protect files with sensitive data
Can be configured to scan:
• CIFS file shares
• SharePoint Server 2016
• SharePoint Server 2013
• SharePoint Server 2010
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace

More Related Content

What's hot

Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TC
Bill Watters
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal Enterprises
AdhereSolutions
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
David J Rosenthal
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
iasaglobal
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
Ulf Mattsson
 
Big data and analytics
Big data and analytics Big data and analytics
Big data and analytics
Freeform Dynamics
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
DLP
DLPDLP
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 

What's hot (20)

Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TC
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal Enterprises
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Big data and analytics
Big data and analytics Big data and analytics
Big data and analytics
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
DLP
DLPDLP
DLP
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Similar to Microsoft 365 | Modern workplace

Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
BizTalk360
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
Joanne Klein
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
Drew Madelung
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
David J Rosenthal
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
Robert Crane
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
 
Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365
RalSejas
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Getting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanGetting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh Ganesan
Vignesh Ganesan I Microsoft MVP
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
Mighty Guides, Inc.
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
Vignesh Ganesan I Microsoft MVP
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
Alistair Pugin
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017
Owen Allen
 

Similar to Microsoft 365 | Modern workplace (20)

Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Getting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanGetting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh Ganesan
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Microsoft 365 | Modern workplace

  • 1. Microsoft 365 | Modernisez, optimisez et sécurisez votre entreprise Siddick ELAHEEBOCUS Directeur SPILOG PARTNER CONSULTING SERVICES
  • 2. Siddick ELAHEEBOCUS @ SPILOG Partner Consulting Services (SPCS) ▪ Directeur & Stratégiste informatique. ▪ Originaire de l’Ile Maurice. ▪ Conférencier, formateur et expert des technologies Microsoft (cloud, datacenter, productivité, mobilité, sécurité), VEEAM, Citrix, Dell, entre autres. ▪ 18 années d’expériences à l’international : o L’intégration des systèmes, stratégie, consulting, la formation informatique. ▪ Territoire : Polynésie Française, Nouvelle Calédonie, Vanuatu, Fiji, Nouvelle Zélande, Ile Maurice, Afrique. ▪ Microsoft : Ex-P-SSP / Ex-TSP, Ex-MCT Lead, MCT et autres à venir 😊 ! ▪ Membre actif : Organisation Pays Communauté aOS Mondial Organisation des Professionnels de l'Économie Numérique (OPEN) (Référent Infras & liaisons (PR/privé) du projet SMART Polynesia) Polynésie FrançaiseClub de la Sécurité de l'Information Région Tahiti (CLUSIR) Incubateur de projets polynésiens (PRISM) (Mentor) Organisation des Professionnels de l'Économie Numérique (OPEN) Nouvelle Calédonie Fédération des enterprises (MEDEF) Syndicat du Numérique Nouvelle-Calédonie (SNNC) IT Professionals New Zealand Nouvelle Zélande
  • 3. Références • Profile LinkedIn| https://tinyurl.com/ydxuws6a • Etude de cas Microsoft (Tahiti Nui Fortress) | https://tinyurl.com/y9cv4lsz • Etude de cas Microsoft (VITI) | https://tinyurl.com/y8tkfjvt • Article de presse | https://tinyurl.com/y9tbztr6 • Speaker au Pacific Business Forum | https://tinyurl.com/y7abdwlp • Speaker au conférence Microsoft Docker | https://tinyurl.com/ycqdpp99 • Speaker au Microsoft Techdays | https://tinyurl.com/yazq8ezp • Canal YouTube | https://tinyurl.com/y8ob4c7v
  • 4. Les grands défis technologiques auxquels sont confrontés les PME aujourd'hui Maintenir une technologie à jour Favoriser la mobilité Protéger vos données sensibles Lutter contre les Cyber-menaces
  • 5. Local Logins /MSA New PCs bought adhoc PCs refreshed when dead Employees using personal mobile devices IT purchasing decisions made “on the spot” What does today look like for the customers? “Good enough” platforms No technology strategy Legacy back office Fragmented end-point solutions
  • 6. Cybercriminals target businesses of all sizes 24% customer’s privacy violated 20% trade secrets leaked (1) Source: Small Business Cyber Security Study, Microsoft & YouGov, April 2018 (2) Source: Better Business Bureau “2017 State of Cybersecurity Among Small Businesses in North America. https://www.bbb.org/globalassets/shared/media/state-of- cybersecurity/updates/cybersecurity_final-lowres.pdf 33% (1) One in four SMBs targeted (1) Average loss (2) $79,841
  • 7. A complete, intelligent solution to empower employees to be creative and work together, securely. Microsoft 365 Windows 10 + Office 365 + Enterprise Mobility + Security
  • 8. Productivity Office Applications Word, Excel, PowerPoint, Outlook, and more Online Services Exchange, OneDrive (1TB), Teams, and more Advanced Services Exchange Online Archiving Advanced Security External Threat Protection Office 365 Advanced Threat Protection Multi-Factor Authentication Enforce Windows Defender Exploit Guard Enforce BitLocker encryption Internal data leak prevention Data Loss Prevention Azure Information Protection Device management Device management Microsoft Intune Single Sign On (SSO) > 10 apps Deployment assistance Windows Autopilot Auto-installation of Office apps AAD Auto-enroll + + What is Additional benefits Consistent security configuration across Windows 10, macOS, Android, and iOS devices Upgrade from Windows 7 Pro or Windows 8.1 Pro to Windows 10 Pro ad no additional cost 99.9% financially-backed uptime guarantee; 24x7 online and phone support Microsoft 365 Business
  • 9. Microsoft 365 Business | Simplifying SMB technology investment 3rd party solutions Productivity Software File Storage Online Meetings Device Anti Virus Email Filtering Chat-based teamwork Cloud identity management Device Management Archiving >$100 Microsoft offerings $20 Microsoft 365 Business A single, integrated solution with support for hybrid identity Windows 10 Business Intune Office 365 Advanced Threat Protection Data Loss Prevention Azure Information Protection P1 AAD Features Exchange Online Archiving Office 365 Business Premium
  • 10. Microsoft 365 Microsoft 365 Enterprise Microsoft 365 Education Microsoft 365 E5 Microsoft 365 E3 Microsoft 365 F1 Microsoft 365 Business
  • 11. Single entry point with a rationalized set of specialist workspaces Microsoft 365 Admin Center
  • 12. Demo
  • 13. Gagnez en éfficacité avec des outils intelligents simples et familiers Travaillez efficacement avec l’intégration de toutes vos applications et solutions Accédez à tous vos fichiers où que vous soyez, et sécurisez votre travail avec le stockage de fichiers en ligne Travaillez en mobilité avec des fonctions de messagerie et de calendrier pour organiser vos réunions facilement Plus efficace
  • 14. Mieux collaborer ensemble Des outils qui permettent à votre équipe de mieux travailler ensemble
  • 15.
  • 16. Familiar Workflow Easy to Use Financial Peace of Mind
  • 17. Easy to Schedule: No Changes. Same Workflow No 3rd party plug-ins Simply schedule a Teams meeting “VTC Dial-in” info is automatically included
  • 18. Easy to Join: One Click. You’re IN! One touch dialing on video endpointsClick to join from native client
  • 19.
  • 20.
  • 21. Demo
  • 22. Windows 10 Enables creativity & teamwork Intelligent security Integrated for simplicity
  • 23. Threat protection Help avoid OS tampering with System Guard Safely browse the internet with Application Guard Protect against malware with Anti-Virus Block malware and untrusted apps with Application Control Block connections to malicious sites with Exploit Guard Prevent attacks, isolate threats and control malicious code execution with Windows Defender
  • 24. Plan upgrades by identifying devices that are ready, identify and resolve app and driver compatibility blockers Ensure update and antimalware compliance with timely reports for all your devices (even those on the road) Upgrade Readiness Update Compliance Device Health* Reduce support costs by pro- actively identifying and remediating top end-user impacting issues Windows Analytics is a free solution that provides data-driven insights to reduce the cost of deploying, servicing, and supporting Windows 10
  • 25. Demo
  • 26.
  • 27.
  • 28. Demo
  • 29.
  • 30. Traditional Windows deployment // The old way Build a custom image, gathering everything else that’s necessary to deploy Time means money, making this an expensive proposition Deploy image to a new computer, overwriting what was originally on it DRIVERS POLICIES OFFICE & APPS SETTINGS
  • 31. Modern Windows deployment // The new way Un-box and turn on off-the-shelf Windows PC Device is ready for productive use Transform with minimal user interaction
  • 32. Hardware vendor Register devices you purchased Set OOBE policy Employee unboxes device, powers on Ship device directly to employee Sync IT Admin Windows Autopilot Service Intune Configure OOBE Known device?
  • 33.
  • 34. Demo
  • 35. What is it? ATP Safe Attachments ATP Safe Links ATP for SharePoint, OneDrive, and Microsoft Teams spoof intelligence ATP anti- phishing capabilities in Office 365
  • 36. View reports to see how ATP is working ATP reports include: Threat protection status report ATP Message Disposition report ATP File Types report If there is no data in the report, double check that policies are set up correctly. Organizations must have ATP Safe Links policies and ATP Safe Attachments policies defined in order for ATP protection to be in place.
  • 37. GDPR (RGPD) Lengthy and complex requirements Enhanced personal privacy rights Increased duty to protect data Mandatory breach reporting Significant penalties for non-compliance Improved data policies and processes Tighter controls Better data governance tools
  • 39. What is it? What you need to know: A DLP policy contains a few basic things: Where to protect the content – locations such as Exchange Online, SharePoint Online, and OneDrive for Business sites. When and how to protect the content by enforcing rules comprised of: ▪ Conditions the content must match before the rule is enforced – for example, look only for content containing Social Security numbers that's been shared with people outside your organization. ▪ Actions that you want the rule to take automatically when content matching the conditions is found – for example, block access to the document and send both the user and compliance officer an email notification.
  • 40. Demo
  • 41. Manage data subject requests Search across Exchange Online, SharePoint Online, OneDrive for business (including Teams and Groups) and public folders Search for 80+ supported sensitive data types or create custom types Download results for further review prior to providing reports to requestors Find data associated with an individual with Office 365 Content Search
  • 42. Compliance Manager View your compliance posture against evolving regulations. Take recommended actions to improve your data protection capabilities. Conduct pre-audits to prepare for external audits. Manage your compliance in one place
  • 43. Demo
  • 44. What is it? What you need to know: AIP works by classifying data based on sensitivity. You configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Classification and protection information follows the data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. You can define who can access data and what they can do with it—such as allowing to view and edit files, but not print or forward.
  • 45. WIP – Copying Highly Confidential file to Personal One Drive
  • 46. WIP – Copying Highly Confidential file to Gmail
  • 47. WIP – Copying Highly Confidential file to USB Drive
  • 48. Demo
  • 49. Helps you manage sensitive data prior to migrating to Office 365 or other cloud services Use discover mode to identify and report on files containing sensitive data Use enforce mode to automatically classify, label and protect files with sensitive data Can be configured to scan: • CIFS file shares • SharePoint Server 2016 • SharePoint Server 2013 • SharePoint Server 2010