Delivered a session for C# Corner Bangalore Chapter Meet for "Workshop on Digital Transformation and Office 365" on the following topic: "Modern Workplace with Microsoft 365"
Event Url: http://www.c-sharpcorner.com/events/workshop-on-digital-transformation-and-office-365
This session will provide a basic overview of Microsoft 365 and will then dive into how to position its benefits for customers. You'll learn how the Microsoft 365 features help resolve many common business challenges today and how you should be speaking with customers about these.
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...David J Rosenthal
Microsoft 365 is a platform for workplace modernization across security, compliance, productivity, and communications.
Why one platform – the best of suite approach versus best of breed
Microsoft is now best of breed is many of these capabilities as well across security, compliance, meetings, and collaboration.
Differences between Enterprise contract levels. Articulation of benefits for moving to an E5.
(Note: This document is visible only for those with the link.)
This session will provide a basic overview of Microsoft 365 and will then dive into how to position its benefits for customers. You'll learn how the Microsoft 365 features help resolve many common business challenges today and how you should be speaking with customers about these.
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...David J Rosenthal
Microsoft 365 is a platform for workplace modernization across security, compliance, productivity, and communications.
Why one platform – the best of suite approach versus best of breed
Microsoft is now best of breed is many of these capabilities as well across security, compliance, meetings, and collaboration.
Differences between Enterprise contract levels. Articulation of benefits for moving to an E5.
(Note: This document is visible only for those with the link.)
Being more secure using Microsoft 365 BusinessRobert Crane
Microsoft 365 Business provides a range of services to make both data and devices more secure. This webinar will take you through the range of what these services are, the best practices way in which they should be configured and how you can extend security further with additional Microsoft solutions.
How Using Microsoft Office 365 Can Benefit Your OrganisationBright Technology
The growth of cloud infrastructure in recent years has led to a surge in popularity of Software as a Service (SaaS) packages such as Microsoft Office 365. This popularity stems from a variety of factors, including ease of use, reduced costs, and automatic updates. Recent research by IDC demonstrates that businesses are increasingly using cloud-first procurement strategies. As
a result of this and other factors, IDC forecasts that global public revenue from IT cloud services will grow at over 19% through 2019, nearly 6 times the growth rate of IT spending growth as a whole – with spending on SaaS leading the way. Currently, almost 80% of businesses deploy or fully embrace the cloud, according to IDC. Furthermore, the percentage of companies expressing no
interest in the cloud has declined to 8% from 21% in 2014. The cloud has truly become a mainstream IT tool for most businesses, offering enhanced productivity enabling companies to improve the efficiency of their operations. This guide will explain why the cloud matters to SMEs (small and medium-size enterprises) as well as covering in detail the various features and benefits of the Microsoft Office 365 cloud bundle.
Office 365 Presentation - Renato Civili, Infosoft SystemsInfosoft Systems
Office 365 is the best-in-class productivity platform for a modern business. It works the way you want to. It is a consistent, familiar and synced experience across your smartphone, tablet, and desktop.
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
We want to introduce you to Microsoft 365 Business — a single platform and security solution designed with you in mind. It’s built to keep things simple for you and your people, bringing together the best of what Microsoft has to offer: the security features and innovation of Windows 10 with the power and familiarity of Office 365, with easy management tools.
Windows 10 allows you and your team members to access your files, folders, and apps from virtually anywhere, on your devices. You can take advantage of your digital assistant, Cortana.
Office 365 gives you powerful apps and tools to enable you to collaborate inside and outside your company and make work on the go more productive and easier.
We are bringing the best of Intune to enable you to protect your data in your Office mobile apps, even on personal devices. If someone loses their device, or leaves your organization, you can easily wipe the company data.
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...Nikki Chapple
Microsoft 365 Copilot is a new technology that uses generative AI to help users create content, code, and data insights from within your Microsoft 365 Apps such as Word, Excel, PowerPoint, Outlook, Teams and Loop. It can boost productivity, creativity, and skills, but it also poses some challenges for governance and data security. To prepare for Microsoft 365 Copilot, users need to follow some best practices, such as:
- Assessing their technical , and data security readiness.
- Understand the importance of “Just enough access”
-How to build your data security and governance maturity by setting up data security, governance and access controls at the tenant level, the container (Team or Group) level and at the individual user level.
By following these best practices, users can ensure that they get the most out of Microsoft 365 Copilot while protecting their data and reputation.
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
Key components of the Enterprise Mobility Suite are Azure AD Premium, Windows Intune and Azure Rights Management.
Learn from Peter De Tender, Microsoft Infrastructure Architect, MCT and MVP not only what the Microsoft Enterprise Mobility Suite is, but also how one can deploy it in an enterprise organization. By attending this session, you will gain the knowledge to optimize the adoption of IT, BYOD and SaaS as the core cloud solution components. Key concepts that will be covered are identity and access management, mobile device management and data protection.
Being more secure using Microsoft 365 BusinessRobert Crane
Microsoft 365 Business provides a range of services to make both data and devices more secure. This webinar will take you through the range of what these services are, the best practices way in which they should be configured and how you can extend security further with additional Microsoft solutions.
How Using Microsoft Office 365 Can Benefit Your OrganisationBright Technology
The growth of cloud infrastructure in recent years has led to a surge in popularity of Software as a Service (SaaS) packages such as Microsoft Office 365. This popularity stems from a variety of factors, including ease of use, reduced costs, and automatic updates. Recent research by IDC demonstrates that businesses are increasingly using cloud-first procurement strategies. As
a result of this and other factors, IDC forecasts that global public revenue from IT cloud services will grow at over 19% through 2019, nearly 6 times the growth rate of IT spending growth as a whole – with spending on SaaS leading the way. Currently, almost 80% of businesses deploy or fully embrace the cloud, according to IDC. Furthermore, the percentage of companies expressing no
interest in the cloud has declined to 8% from 21% in 2014. The cloud has truly become a mainstream IT tool for most businesses, offering enhanced productivity enabling companies to improve the efficiency of their operations. This guide will explain why the cloud matters to SMEs (small and medium-size enterprises) as well as covering in detail the various features and benefits of the Microsoft Office 365 cloud bundle.
Office 365 Presentation - Renato Civili, Infosoft SystemsInfosoft Systems
Office 365 is the best-in-class productivity platform for a modern business. It works the way you want to. It is a consistent, familiar and synced experience across your smartphone, tablet, and desktop.
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
We want to introduce you to Microsoft 365 Business — a single platform and security solution designed with you in mind. It’s built to keep things simple for you and your people, bringing together the best of what Microsoft has to offer: the security features and innovation of Windows 10 with the power and familiarity of Office 365, with easy management tools.
Windows 10 allows you and your team members to access your files, folders, and apps from virtually anywhere, on your devices. You can take advantage of your digital assistant, Cortana.
Office 365 gives you powerful apps and tools to enable you to collaborate inside and outside your company and make work on the go more productive and easier.
We are bringing the best of Intune to enable you to protect your data in your Office mobile apps, even on personal devices. If someone loses their device, or leaves your organization, you can easily wipe the company data.
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...Nikki Chapple
Microsoft 365 Copilot is a new technology that uses generative AI to help users create content, code, and data insights from within your Microsoft 365 Apps such as Word, Excel, PowerPoint, Outlook, Teams and Loop. It can boost productivity, creativity, and skills, but it also poses some challenges for governance and data security. To prepare for Microsoft 365 Copilot, users need to follow some best practices, such as:
- Assessing their technical , and data security readiness.
- Understand the importance of “Just enough access”
-How to build your data security and governance maturity by setting up data security, governance and access controls at the tenant level, the container (Team or Group) level and at the individual user level.
By following these best practices, users can ensure that they get the most out of Microsoft 365 Copilot while protecting their data and reputation.
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
Key components of the Enterprise Mobility Suite are Azure AD Premium, Windows Intune and Azure Rights Management.
Learn from Peter De Tender, Microsoft Infrastructure Architect, MCT and MVP not only what the Microsoft Enterprise Mobility Suite is, but also how one can deploy it in an enterprise organization. By attending this session, you will gain the knowledge to optimize the adoption of IT, BYOD and SaaS as the core cloud solution components. Key concepts that will be covered are identity and access management, mobile device management and data protection.
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Community IT monthly webinar explores Single Sign On as a solution that can provide security and management for nonprofits with cloud-based IT solutions.
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
KEY FEATURES
Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away. Focus on what is important using a simple, convenient feed.
Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc. This includes support for multi factor authentication (MFA).
Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
Softwerx Microsoft 365 Security Webinar PresentationPatrick Leckie
We ran this webinar in October 2019 to provide a better understanding of the security settings and options that are included in your Microsoft 365 but may not be fully optimised to protect your businesses.
WHAT WE COVERED:
1. The Advanced Security Features In Microsoft 365, Office 365 And The EMS Portfolio
Understanding your current Microsoft security portfolio and better leveraging the features you’ve already paid for.
2. Securing Your Microsoft Environment
Critical considerations in securing your Microsoft cloud environment and why there isn’t a one size fit’s all solution to securing your business.
3. A Real World Business Case Study
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
Delivered a session focusing on Microsoft Teams at SharePoint Saturday @ Chennai,
Link: http://www.spsevents.org/city/Chennai/Chennai2019/speakers#
This session Provides an Overview of Microsoft Teams and Primarily focus on the Security and Compliance features available with Microsoft Teams, and also show how you can plan for Governance in Teams.
Solvion Trendwerkstatt - Microsoft TeamsHolzerKerstin
In der Solvion Trendwerkstatt zu Microsoft Teams erfahren die Teilnehmer alle Trends rund um die Collaboration Lösung Teams. Microsoft MVP Thomas Gölles leitet durch den Workshop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
15. As the world of work is changing, so do our technology
needs… Are we prepared for it ?
16.
17. A complete, intelligent solution that empowers
everyone to be creative and work together, securely
Unlock
creativity
Built for
teamwork
Integrated
for simplicity
Intelligent
security
Microsoft 365
Office 365 + Windows 10 + Enterprise Mobility + Security
18. Unlocks creativity
Work naturally with ink, voice and touch
Visualize information in new ways
Create compelling content with intelligent apps
Build on the work and expertise of others
19. Enterprise-class email, voice and video
Connect everyone with company-wide communities
Share and collaborate on documents in real time
Includes Microsoft Teams, the new chat-based workspace
Built for teamwork
20. Integrated for simplicity
Always up-to-date
Self-service deployment
Cloud-based management
Rich telemetry from your environment
Reduce TCO with consolidated solutions
21. Intelligent security
Protect identity, apps, data & devices
Thwart advanced threats
Manage data archiving, governance & discovery
Powered by Microsoft Intelligent Security Graph
Accelerate GDPR compliance
22. Microsoft 365 Momentum
Monthly Active
Users
100M+
Office 365
Monthly Active
Devices
500M+
Windows 10
Growth in Cloud
Data Stored
250%
SharePoint
Authentications Per
Month
60B
Azure Active Directory
24. Office 365 Enterprise
Chat- centric workspace
Email & Calendar
Voice, Video & Meetings
Office applications/ co-authoring
Sites & Content Management
Analytics
Advanced Security & Compliance
Enterprise Mobility+ Security
Identity & Access Management
Managed Mobile Productivity
Information Protection
Identity Driven Security
Windows 10 Enterprise
Advanced Endpoint Security
Designed For Modern IT
More Productive
Powerful, Modern devices
Microsoft 365 Enterprise
25. Microsoft 365: Universal Toolkit for Teamwork
Hub for TeamworkCo-AuthorConnect Across
the Organization
Intranets &
Content Management
Email & Calendar
TeamsOffice AppsYammerSharePointOutlook
Office 365 Groups
Single team membership
across apps and services
Microsoft Graph
Suite-wide intelligence
connecting people and content
Security and Compliance
Centralized policy management
26. Office 365 Groups
Microsoft 365 Teamwork: Where to start a
conversation
Outer LoopInner Loop
Files
Sites
Content
SharePoint
Email
27. ENTERPRISE MOBILITY + SECURITY
Holistic, intelligent,
innovative security to keep
up with new threats.
Identity-driven
security
Secure your enterprise fast –
while keeping what you have
and saving money.
Comprehensive
solution
Encourage secure work habits
by providing the best apps
with built-in security.
Managed mobile
productivity
28. Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
Azure Information
Protection Premium P2
Intelligent classification and
encryption for files shared
inside and outside your
organization
(includes all capabilities in P1)
Azure Information
Protection Premium P1
Encryption for all files and
storage locations
Cloud-based file tracking
Microsoft Cloud
App Security
Enterprise-grade visibility,
control, and protection for
your cloud applications
Microsoft Advanced
Threat Analytics
Protection from advanced
targeted attacks leveraging
user and entity behavioral
analytics
Microsoft Intune
Mobile device and app
management to protect
corporate apps and data on
any device
Azure Active Directory
Premium P2
Identity and access
management with advanced
protection for users and
privileged identities
(includes all capabilities in P1)
Azure Active Directory
Premium P1
Secure single sign-on to
cloud and on-premises apps
MFA, conditional access, and
advanced security reporting
EMS
E3
EMS
E5
30. Enterprise
Mobility
+ Security
Basic identity mgmt.
via Azure AD for O365:
• Single sign-on for O365
• Basic multi-factor
authentication (MFA) for O365
Basic mobile device
management
via MDM for O365
• Device settings management
• Selective wipe
• Built into O365 management
console
RMS protection
via RMS for O365
• Protection for content stored in
Office (on-premises or O365)
• Access to RMS SDK
• Bring your own key
Azure AD for O365+
• Advanced security reports
• Single sign-on for all apps
• Advanced MFA
• Self-service group management
& password reset & write back
to on-premises,
• Dynamic Groups, Group based
licensing assignment
MDM for O365+
• PC management
• Mobile app management
(prevent cut/copy/paste/save as
from corporate apps to
personal apps)
• Secure content viewers
• Certificate provisioning
• System Center integration
RMS for O365+
• Automated intelligent
classification and labeling of
data
• Tracking and notifications for
shared documents
• Protection for on-premises
Windows Server file shares
Advanced Security
Management
• Insights into suspicious activity in
Office 365
Cloud App Security
• Visibility and control for all cloud
apps
Advanced Threat Analytics
• Identify advanced threats in on
premises identities
Azure AD Premium P2
• Risk based conditional access
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
31.
32. Windows
10
Enterprise
Mobility
+Security
• Single sign-on for business
cloud apps
• Device setup and registration
for Windows devices
• Windows Store for Business
• Traditional domain join
manageability
• Manageability via MDM and
MAM
• Encryption for data at rest and
generated on device
• Encryption for data included in
roaming settings
• Conditional access policies for
secure single sign-on
• MDM auto-enrollment
• Self-Service Bitlocker recovery
• Password reset with write back
to on-premises
• Cloud-based advanced security
reports and monitoring
• Enterprise State-Roaming
• Mobile device management
• Mobile app management
• Secure content viewer
• Certificate, Wi-Fi, VPN, email
profile provisioning
• Agent-based management of
Windows devices (domain-
joined via ConfigMgr and
internet-based via Intune)
• Automated intelligent
classification and labeling of
data
• Tracking and notifications for
shared documents
• Protection for content stored in
Office and Office 365 &
Windows Server on premises
Windows Defender Advanced
Threat Protection
• Identify advanced threats focused
on Windows 10 behavioral sensors
Cloud App Security
• Visibility and control for all cloud
apps
Advanced Threat Analytics
• Behavioral analytics for advanced
threat detection
Azure AD Premium
• Risk based conditional access
Information
protection
Identity-driven
security
Managed mobile
productivity
Identity and access
management
34. Traditional IT
Multiple Devices
User and Business Owned
Cloud Managed & SaaS Apps
Automated
Proactive
Self-Service
Modern IT
Single Device
Business Owned
Corporate Network & Legacy Apps
Manual
Reactive
High-touch
35. Multiple Devices
User and Business Owned
Cloud Managed & SaaS Apps
Automated
Proactive
Self-Service
Modern IT
Simpler
More secure
Lower TCO
Better experience
37. The best way to experience
Microsoft 365
Low TCO
for all workers
38. 38
Microsoft 365 EnterpriseMicrosoft 365 Business
Microsoft 365 Business Microsoft 365 E3 & E5Microsoft 365 F1
For large organizations or advanced requirementsFor Firstline WorkersFor organizations with less than 300 people
Microsoft 365 powered device – target companies of all sizes
39. P L AT F O R M S E R V I C E
Knowledge Workers Windows 10 Pro Microsoft 365 E3/E5
Firstline Workers Windows 10 S Microsoft 365 F1
40. Windows 10 S devices for Microsoft 365 F1
Aspire 1
14” Ultraslim
USD $299
Available Q4 2017
Swift 1
13” Ultraslim
USD $349
Available Q4 2017
V330
14” Ultraslim
USD $349
Available February 2018
Stream 14 Pro
14” Ultraslim
USD $275
Available October 2017
43. FastTrack for Microsoft 365
Move to the cloud with confidence
Migrate email, content, and light up Microsoft 365 services
Deploy and securely manage devices
Enable your business and gain end-user adoption
Delivered by Microsoft engineers as part of your subscription
Tight integration with qualified partners for additional services
Maximized
ROI
Faster
Deployment
Higher
Adoption
FastTrack.microsoft.com