We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Communication Compliance in Microsoft 365Joanne Klein
Communication Compliance is part of the Insider Risk solution set in Microsoft 365. Its purpose is to monitor communication methods used both within and outside of the Microsoft 365 cloud to help identify insider non-compliant and risky communication. In the modern workplace today, communication methods are vast and varied and all can be a potential channel for non-compliance. The Communication Compliance tool has been purpose-built to help identify potential areas of non-compliance across these communication methods and remediation actions that can be taken depending on the severity of the activity.
Symantec Data Loss Prevention 11 simplifies the detection and protection of intellectual property. Symantec’s market-leading data security suite features Vector Machine Learning, which makes it easier to detect hard-to-find intellectual property, and enhancements to Data Insight that streamline remediation, increasing the effectiveness of an organization’s data protection initiatives.
At the highest level, our mission continues to be about keeping our customers (companies and governments) safe from ever-evolving digital threats, so they are confident to move business forward. Our strategy to accomplish this mission centers around four key pillars: Advanced Threat Protection, Information Protection for On Premise and Cloud, Security as a Service -- all anchored by a Unified Security Analytics Platform. Symantec Data Loss Prevention is a foundational product in the Information Protection for On Premise and Cloud pillar.
Everyone knows that storing and accessing data and applications in the cloud and on mobile devices provides makes work much easier and productive by allowing employees to work everywhere they need to.
It allows for great business agility – applications are always up to date, new functionality and processes can be deployed and activated quickly and organizations can adjust things on the fly if they need to.
It also brings the convenience factor – all employees to work in the way that they need to, collaboration and sharing is made vastly easier with cloud applications and storage.
But it brings with it all the challenges of securing devices and applications that your don’t own, and whilst saying NO might be the right thing for security, end users will find a way around it. Right now, close to 30% of employees use their personal devices for work. And that number is on the rise, potentially turning BYOD into Bring Your Own Disaster.
Symantec Data Loss Prevention. Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Communication Compliance in Microsoft 365Joanne Klein
Communication Compliance is part of the Insider Risk solution set in Microsoft 365. Its purpose is to monitor communication methods used both within and outside of the Microsoft 365 cloud to help identify insider non-compliant and risky communication. In the modern workplace today, communication methods are vast and varied and all can be a potential channel for non-compliance. The Communication Compliance tool has been purpose-built to help identify potential areas of non-compliance across these communication methods and remediation actions that can be taken depending on the severity of the activity.
Symantec Data Loss Prevention 11 simplifies the detection and protection of intellectual property. Symantec’s market-leading data security suite features Vector Machine Learning, which makes it easier to detect hard-to-find intellectual property, and enhancements to Data Insight that streamline remediation, increasing the effectiveness of an organization’s data protection initiatives.
At the highest level, our mission continues to be about keeping our customers (companies and governments) safe from ever-evolving digital threats, so they are confident to move business forward. Our strategy to accomplish this mission centers around four key pillars: Advanced Threat Protection, Information Protection for On Premise and Cloud, Security as a Service -- all anchored by a Unified Security Analytics Platform. Symantec Data Loss Prevention is a foundational product in the Information Protection for On Premise and Cloud pillar.
Everyone knows that storing and accessing data and applications in the cloud and on mobile devices provides makes work much easier and productive by allowing employees to work everywhere they need to.
It allows for great business agility – applications are always up to date, new functionality and processes can be deployed and activated quickly and organizations can adjust things on the fly if they need to.
It also brings the convenience factor – all employees to work in the way that they need to, collaboration and sharing is made vastly easier with cloud applications and storage.
But it brings with it all the challenges of securing devices and applications that your don’t own, and whilst saying NO might be the right thing for security, end users will find a way around it. Right now, close to 30% of employees use their personal devices for work. And that number is on the rise, potentially turning BYOD into Bring Your Own Disaster.
Symantec Data Loss Prevention. Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
Triggered by the corona virus lock down, the abrupt transition to a work from home ( W F H) venue forced organizations to scramble to support a larger remote workforce. Such a quick shift means that certain security measures and requirements inevitably fell by the wayside. At the same time, cybercriminals found a new opportunity for attack with remote workers and improperly secured connections and technologies. Together, these trends have created a more vulnerable environment affecting the cyber security defenses of many organizations.
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
We want to introduce you to Microsoft 365 Business — a single platform and security solution designed with you in mind. It’s built to keep things simple for you and your people, bringing together the best of what Microsoft has to offer: the security features and innovation of Windows 10 with the power and familiarity of Office 365, with easy management tools.
Windows 10 allows you and your team members to access your files, folders, and apps from virtually anywhere, on your devices. You can take advantage of your digital assistant, Cortana.
Office 365 gives you powerful apps and tools to enable you to collaborate inside and outside your company and make work on the go more productive and easier.
We are bringing the best of Intune to enable you to protect your data in your Office mobile apps, even on personal devices. If someone loses their device, or leaves your organization, you can easily wipe the company data.
Where in the world is your Corporate data?Ashish Patel
Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data.
In this webinar you will learn about:
How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications
Consequences of weak corporate security mechanisms
How to give your IT department control of your data and its’ security
Michael Jay Freer - Information Obfuscationiasaglobal
In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
Data leakage prevention is one of the key topics which we have been talking in present. Due to the organizations moving towards big data, financial systems.. which resides in cyber space, there is an increasing number of frauds associated with the technology revolution in the cyberspace.This post highlights the threats and the counter measures, so we can protect the sensitive personal data. I prefer the approach of “ Trust but verify model ”.
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
Title: Where Data Security and Data Value Meet in the Cloud
Abstract:
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
BrightTALK webinar, January 14, 2014
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
An examination of ever growing cyber threats which continue to develop and successfully execute cyber attacks and fraud scams, which cost businesses billions of dollars globally. This session will step through different current and emerging cyber attacks and cyber fraud scenarios, and then discuss how basic but effective security controls can help to significantly reduce the risks.
Presented at the Gartner Identity & Access Management Summit, London, Travis Greene discussed the opportunities and challenges of the Internet of Things (IoT), as well as the early indicators of what the IoT world will look like. He also addressed IoT security and privacy, and the critical role that identity will play in the future.
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
Delivered a session focusing on Microsoft Teams at SharePoint Saturday @ Chennai,
Link: http://www.spsevents.org/city/Chennai/Chennai2019/speakers#
This session Provides an Overview of Microsoft Teams and Primarily focus on the Security and Compliance features available with Microsoft Teams, and also show how you can plan for Governance in Teams.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
Triggered by the corona virus lock down, the abrupt transition to a work from home ( W F H) venue forced organizations to scramble to support a larger remote workforce. Such a quick shift means that certain security measures and requirements inevitably fell by the wayside. At the same time, cybercriminals found a new opportunity for attack with remote workers and improperly secured connections and technologies. Together, these trends have created a more vulnerable environment affecting the cyber security defenses of many organizations.
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
We want to introduce you to Microsoft 365 Business — a single platform and security solution designed with you in mind. It’s built to keep things simple for you and your people, bringing together the best of what Microsoft has to offer: the security features and innovation of Windows 10 with the power and familiarity of Office 365, with easy management tools.
Windows 10 allows you and your team members to access your files, folders, and apps from virtually anywhere, on your devices. You can take advantage of your digital assistant, Cortana.
Office 365 gives you powerful apps and tools to enable you to collaborate inside and outside your company and make work on the go more productive and easier.
We are bringing the best of Intune to enable you to protect your data in your Office mobile apps, even on personal devices. If someone loses their device, or leaves your organization, you can easily wipe the company data.
Where in the world is your Corporate data?Ashish Patel
Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data.
In this webinar you will learn about:
How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications
Consequences of weak corporate security mechanisms
How to give your IT department control of your data and its’ security
Michael Jay Freer - Information Obfuscationiasaglobal
In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
Data leakage prevention is one of the key topics which we have been talking in present. Due to the organizations moving towards big data, financial systems.. which resides in cyber space, there is an increasing number of frauds associated with the technology revolution in the cyberspace.This post highlights the threats and the counter measures, so we can protect the sensitive personal data. I prefer the approach of “ Trust but verify model ”.
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
Title: Where Data Security and Data Value Meet in the Cloud
Abstract:
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
BrightTALK webinar, January 14, 2014
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
An examination of ever growing cyber threats which continue to develop and successfully execute cyber attacks and fraud scams, which cost businesses billions of dollars globally. This session will step through different current and emerging cyber attacks and cyber fraud scenarios, and then discuss how basic but effective security controls can help to significantly reduce the risks.
Presented at the Gartner Identity & Access Management Summit, London, Travis Greene discussed the opportunities and challenges of the Internet of Things (IoT), as well as the early indicators of what the IoT world will look like. He also addressed IoT security and privacy, and the critical role that identity will play in the future.
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
Delivered a session focusing on Microsoft Teams at SharePoint Saturday @ Chennai,
Link: http://www.spsevents.org/city/Chennai/Chennai2019/speakers#
This session Provides an Overview of Microsoft Teams and Primarily focus on the Security and Compliance features available with Microsoft Teams, and also show how you can plan for Governance in Teams.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Our end-to-end, integrated portfolio of cloud solutions across Microsoft 365, Dynamics 365, and Azure is built on a foundation of security and privacy and helps every organization in every industry build resilience and improve the bottom line.
This session will provide a basic overview of Microsoft 365 and will then dive into how to position its benefits for customers. You'll learn how the Microsoft 365 features help resolve many common business challenges today and how you should be speaking with customers about these.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
The crown jewels of any IT environment is the valuable information you manage. This session will explore techniques and Microsoft technologies that can ensure documents are well-managed, secured, and only available to approved individuals in your organization. We will also look at advanced ediscovery and data governance approaches and technologies that can support these.
Security and Compliance with SharePoint and Office 365Richard Harbridge
Whether you’re new to security and compliance in Office 365 or a seasoned veteran, we’ll have something for you in this session. Hear about Microsoft’s overall security story from Microsoft MVP Richard Harbridge, and better understand how it relates to SharePoint services, catch up on new developments over the past year, and learn about the new capabilities Microsoft provides. From advanced security management and threat intelligence to sensitive content encryption, governance and sharing there is plenty to discuss.
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
So what is Microsoft Purview really?
How is it supposed to help organisations with their overall Cloud Security Posture?
In this session, we cover:
- Data classification
- Data loss prevention
- Data lifecyle management
- Data privacy management
By approaching security from a compliance perspective, companies can manage governance and mitigate risk by using out of the box compliance solutions from Microsoft Purview
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Microsoft 365 | Modern workplace
1. Microsoft 365 |
Modernisez, optimisez et sécurisez
votre entreprise
Siddick ELAHEEBOCUS
Directeur
SPILOG PARTNER
CONSULTING SERVICES
2. Siddick ELAHEEBOCUS @ SPILOG Partner Consulting Services (SPCS)
▪ Directeur & Stratégiste informatique.
▪ Originaire de l’Ile Maurice.
▪ Conférencier, formateur et expert des technologies Microsoft (cloud, datacenter, productivité, mobilité, sécurité), VEEAM,
Citrix, Dell, entre autres.
▪ 18 années d’expériences à l’international :
o L’intégration des systèmes, stratégie, consulting, la formation informatique.
▪ Territoire : Polynésie Française, Nouvelle Calédonie, Vanuatu, Fiji, Nouvelle Zélande, Ile Maurice, Afrique.
▪ Microsoft : Ex-P-SSP / Ex-TSP, Ex-MCT Lead, MCT et autres à venir 😊 !
▪ Membre actif :
Organisation Pays
Communauté aOS Mondial
Organisation des Professionnels de l'Économie Numérique (OPEN)
(Référent Infras & liaisons (PR/privé) du projet SMART Polynesia) Polynésie
FrançaiseClub de la Sécurité de l'Information Région Tahiti (CLUSIR)
Incubateur de projets polynésiens (PRISM) (Mentor)
Organisation des Professionnels de l'Économie Numérique (OPEN)
Nouvelle
Calédonie
Fédération des enterprises (MEDEF)
Syndicat du Numérique Nouvelle-Calédonie (SNNC)
IT Professionals New Zealand Nouvelle Zélande
3. Références
• Profile LinkedIn| https://tinyurl.com/ydxuws6a
• Etude de cas Microsoft (Tahiti Nui Fortress) | https://tinyurl.com/y9cv4lsz
• Etude de cas Microsoft (VITI) | https://tinyurl.com/y8tkfjvt
• Article de presse | https://tinyurl.com/y9tbztr6
• Speaker au Pacific Business Forum | https://tinyurl.com/y7abdwlp
• Speaker au conférence Microsoft Docker | https://tinyurl.com/ycqdpp99
• Speaker au Microsoft Techdays | https://tinyurl.com/yazq8ezp
• Canal YouTube | https://tinyurl.com/y8ob4c7v
4. Les grands défis technologiques auxquels
sont confrontés les PME aujourd'hui
Maintenir une
technologie à jour
Favoriser la
mobilité
Protéger vos
données sensibles
Lutter contre les
Cyber-menaces
5. Local Logins
/MSA
New PCs
bought adhoc
PCs refreshed
when dead
Employees
using personal
mobile devices
IT purchasing
decisions
made “on the spot”
What does today look
like for the customers?
“Good
enough”
platforms
No
technology
strategy
Legacy
back office
Fragmented
end-point
solutions
6. Cybercriminals target businesses of all sizes
24% customer’s privacy violated
20% trade secrets leaked
(1) Source: Small Business Cyber Security Study, Microsoft & YouGov, April 2018
(2) Source: Better Business Bureau “2017 State of Cybersecurity Among Small Businesses in North America. https://www.bbb.org/globalassets/shared/media/state-of-
cybersecurity/updates/cybersecurity_final-lowres.pdf
33%
(1)
One in four SMBs targeted (1)
Average loss (2)
$79,841
7. A complete, intelligent solution
to empower employees to be
creative and work together, securely.
Microsoft 365
Windows 10 + Office 365 + Enterprise Mobility + Security
8. Productivity
Office Applications
Word, Excel, PowerPoint, Outlook,
and more
Online Services
Exchange, OneDrive (1TB), Teams, and
more
Advanced Services
Exchange Online Archiving
Advanced Security
External Threat Protection
Office 365 Advanced Threat
Protection
Multi-Factor Authentication
Enforce Windows Defender Exploit
Guard
Enforce BitLocker encryption
Internal data leak prevention
Data Loss Prevention
Azure Information Protection
Device management
Device management
Microsoft Intune
Single Sign On (SSO) > 10 apps
Deployment assistance
Windows Autopilot
Auto-installation of Office apps
AAD Auto-enroll
+ +
What is
Additional benefits
Consistent security configuration across
Windows 10, macOS, Android, and iOS
devices
Upgrade from Windows 7 Pro or Windows 8.1
Pro to Windows 10 Pro ad no additional cost
99.9% financially-backed uptime guarantee;
24x7 online and phone support
Microsoft 365 Business
9. Microsoft 365 Business | Simplifying SMB technology investment
3rd party solutions
Productivity Software
File Storage
Online Meetings
Device Anti Virus
Email Filtering
Chat-based teamwork
Cloud identity management
Device Management
Archiving
>$100 Microsoft offerings $20
Microsoft 365 Business
A single, integrated solution
with support for hybrid identity
Windows 10 Business
Intune
Office 365 Advanced Threat Protection
Data Loss Prevention
Azure Information Protection P1
AAD Features
Exchange Online Archiving
Office 365 Business Premium
13. Gagnez en éfficacité avec des outils
intelligents simples et familiers
Travaillez efficacement avec l’intégration
de toutes vos applications et solutions
Accédez à tous vos fichiers où que
vous soyez, et sécurisez votre
travail avec le stockage de fichiers en
ligne
Travaillez en mobilité avec des fonctions
de messagerie et de calendrier pour
organiser vos réunions facilement
Plus efficace
23. Threat protection
Help avoid OS
tampering with
System Guard
Safely browse the
internet with
Application Guard
Protect against
malware with
Anti-Virus
Block malware and
untrusted apps with
Application Control
Block connections
to malicious sites
with Exploit Guard
Prevent attacks, isolate threats and control malicious code execution with Windows Defender
24. Plan upgrades by identifying devices
that are ready, identify and resolve
app and driver compatibility blockers
Ensure update and antimalware
compliance with timely reports for
all your devices (even those on the
road)
Upgrade Readiness Update Compliance Device Health*
Reduce support costs by pro-
actively identifying and
remediating top end-user
impacting issues
Windows Analytics is a free solution that provides data-driven insights to reduce the cost of
deploying, servicing, and supporting Windows 10
30. Traditional Windows deployment // The old way
Build a custom image,
gathering everything else
that’s necessary to deploy
Time means money, making
this an expensive proposition
Deploy image to a new
computer, overwriting what
was originally on it
DRIVERS POLICIES
OFFICE & APPS
SETTINGS
31. Modern Windows deployment // The new way
Un-box and turn on
off-the-shelf Windows PC
Device is ready
for productive use
Transform with minimal
user interaction
32. Hardware vendor
Register devices
you purchased
Set OOBE
policy
Employee unboxes
device, powers on
Ship device directly to employee
Sync
IT Admin
Windows Autopilot Service
Intune
Configure
OOBE
Known
device?
35. What is it?
ATP Safe Attachments
ATP Safe Links
ATP for SharePoint, OneDrive, and Microsoft Teams
spoof intelligence
ATP anti-
phishing capabilities in Office 365
36. View reports to see how ATP is working
ATP reports include:
Threat protection status report
ATP Message Disposition report
ATP File Types report
If there is no data in the report, double check
that policies are set up correctly. Organizations
must have ATP Safe Links policies and ATP Safe
Attachments policies defined in order for ATP
protection to be in place.
37. GDPR (RGPD)
Lengthy and complex requirements
Enhanced personal privacy rights
Increased duty to protect data
Mandatory breach reporting
Significant penalties for non-compliance Improved data policies and processes
Tighter controls
Better data governance tools
39. What is it?
What you need to know:
A DLP policy contains a few basic things:
Where to protect the content – locations such as Exchange Online,
SharePoint Online, and OneDrive for Business sites.
When and how to protect the content by enforcing rules comprised of:
▪ Conditions the content must match before the rule is enforced – for
example, look only for content containing Social Security numbers
that's been shared with people outside your organization.
▪ Actions that you want the rule to take automatically when content
matching the conditions is found – for example, block access to
the document and send both the user and compliance officer an
email notification.
41. Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
42. Compliance Manager
View your compliance posture against
evolving regulations.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
44. What is it?
What you need to know:
AIP works by classifying data based on sensitivity. You
configure policies to classify, label, and protect data
based on its sensitivity. Classification with Azure
Information Protection is fully automatic, driven by users,
or based on recommendation.
Classification and protection information follows the
data—ensuring it remains protected regardless of where
it’s stored or who it’s shared with. You can define who
can access data and what they can do with it—such as
allowing to view and edit files, but not print or forward.
45. WIP – Copying Highly Confidential file to Personal One
Drive
49. Helps you manage sensitive data prior to migrating to
Office 365 or other cloud services
Use discover mode to identify and report on files
containing sensitive data
Use enforce mode to automatically classify, label and
protect files with sensitive data
Can be configured to scan:
• CIFS file shares
• SharePoint Server 2016
• SharePoint Server 2013
• SharePoint Server 2010