SlideShare a Scribd company logo
1
Proven Practices for Office 365
Deployment, Security and Management
June 3, 2015
2
Proven Practices for Office 365
Deployment, Security and Management
3
PERFICIENT PROFILE
Founded in 1997
Public, NASDAQ: PRFT
2014 revenue ~$456 million
Major market locations:
Allentown, Atlanta, Ann Arbor, Boston, Charlotte, Chicago,
Cincinnati, Columbus, Dallas, Denver, Detroit, Fairfax, Houston,
Indianapolis, Lafayette, Milwaukee, Minneapolis, New York City,
Northern California, Oxford (UK), Southern California, St. Louis,
Toronto
Global delivery centers in China and India
>2,600 colleagues
Dedicated solution practices
~90% repeat business rate
Alliance partnerships with major technology vendors
Multiple vendor/industry technology and growth awards
4
Perficient has consistently been recognized by
Microsoft as one of the software giant’s most
valuable partners– and especially in regards to
the cloud.
With nationally-known experts on the Office 365,
Azure and Yammer platforms– as well as a deep
and rich history in SharePoint, Lync (now Skype
for Business), and Exchange– we are well
positioned to partner with you as you transform
your business.
www.perficient.com/microsoft
Perficient & Microsoft
A rich relationship that has made us a
Premier Cloud Partner, Nationwide
5
Why Office 365?
Aging On-Premises Infrastructure
• Exchange 2003 / 2007 environments
• Storage constraints
• Eliminate the burden of upgrades
Lack of Security / Compliance Functionality
• Data Loss Prevention (DLP)
• Rights Management Services (RMS)
• Multi-Factor Authentication (MFA)
• Encryption
Need for Mobile Enablement
• Support for laptops, tablets, phones
6
35% of Exchange install base is on Office 365
Nearly 80% of the Fortune 500 have Office 365
Over 80% of Office 365 Enterprise customers have two or
more workloads
7
Best Practices
Get Started… Now
• Acquire licensing (trial, EA)
• Identify an appropriate pilot group
• Consider workloads such as OneDrive
for Business or Office 365 ProPlus
Accept Changes
• Network
• Security
• Provisioning
Seek Support & Experience
• Look for certified vendors
• Leverage Microsoft documentation
and training
• Work with a deployment partner
8
Common Mistakes
To Avoid
Organizational
• Excluding groups such as IT Security
• Lack of buy-in from the necessary parties
• Insufficient resource planning / prioritization
Project Execution
• Executing a pilot without a good cross-section of users
• Lack of understanding of product functionality
• New feature overload
User Impact
• Lack of communication
9
First Step to the Cloud:
Identity & Authentication
IDENTITY
Questions
• What is our source of user identities?
• How do we manage the lifecycle of these identities?
Goals
• Leverage existing directories we have in place
• Reduce the required IT management of directories
• Don’t ask our users to manage another account for every cloud
application
• Implement cloud solutions without adding additional on-premises
dependencies
10
First Step to the Cloud:
Identity & Authentication
AUTHENTICATION
Questions
• Is it secure?
• How fast can I have it?
Goals
• Fast deployment
• Achieving “Single-Sign On Zen”
• Ensure high-availability of authentication services
• Implement cloud solutions with minimal additional on-premises
dependencies
• Provide a consistent login experience across devices and platforms
• Deploy a solution that supports all of our cloud services
Copyright © 2015 Centrify Corporation. All Rights Reserved. 11
Centrify Identity Service
Reduce time, cost and risk of migrating to Office 365
Copyright © 2015 Centrify Corporation. All Rights Reserved. 12
First Step to the Cloud: Identity & Authentication
• Leverage existing directories
• Reduce the required IT management
of directories
• Don’t ask our users to manage
another account for every cloud
application (No more passwords!)
• Deploy a solution that supports all of
our cloud services
• Fast Deployment
• Achieving Single-Sign On Zen
• Ensure High-Availability
• Provide a consistent login experience
across devices and platforms
Security Goals Deployment Goals
Implement cloud solutions with minimal additional on-premises dependencies
Copyright © 2015 Centrify Corporation. All Rights Reserved. 13
Centrify Identity Service
Secure and simplify your Office 365 deployment
app app app
Secure Deployment
Copyright © 2015 Centrify Corporation. All Rights Reserved. 15
Secure by Design: Powered by Azure
Current and planned
• Zero-downtime
architecture
• Worldwide multi-region
data centers
• Localized into
15+ languages
• 24x7 support with
regional sales teams
and more than
250 resellers
• SSAE 16 SOC 2,
TRUSTe,
EU Safe Harbor
+
Copyright © 2015 Centrify Corporation. All Rights Reserved. 16
Secure by Design: Validated by Microsoft
Microsoft has tested and certified
Centrify Identity Service as a
“Works with Office 365” solution
Established protocols and premier
support agreements between
Centrify and Microsoft ensure
quality joint customer support
Best-in-class support for Office365 deployments
Copyright © 2015 Centrify Corporation. All Rights Reserved. 17
Leverage Existing Directories — Reduce IT Overhead
The most flexible options for storing identity
Purely in the cloud
No replication to cloud
(On-prem with class-leading
AD/LDAP integration)
Combination
(Subset of users in AD/LDAP +
another subset in cloud)
Copyright © 2015 Centrify Corporation. All Rights Reserved. 18
No New Passwords to Hack — Single Sign-On (SSO)
Robust app support
• Class-leading support O365
• Direct support for thousands of other apps
Add your own apps
• Easy to customize generic SAML app
• Add your own username/password apps
Rich mobile app support
• Leading ISVs (Box, Dropbox) support SDK
• Mobile Authentication Services SDK
for your custom apps (developers.centrify.com)
Centrify infinite apps
• Browser plugin to discover username/password apps
• Auto-detection with manual fallback
Copyright © 2015 Centrify Corporation. All Rights Reserved. 19
Secure Office 365 access starts at the device
• MDM: IT needs to ensure security of
underlying mobile devices
• MAM: IT needs to deploy appropriate apps
to the device
• ZSO: End users hate typing in passwords,
especially on mobile
• MFA: Trusted devices and wearables are
simplest method for step-up authentication
Centrify uniquely combines
identity + mobility management
Integrated Mobile Management
Device
Management
(MDM)
Container
Management
(MCM)
Samsung
KNOX
Application
Management
(MAM)
Authentication
Services (MAS)
App Zero
Sign-On
(ZSO)
Centrify
Mobile
Authenticator
Mobile User
Self-Service
Copyright © 2015 Centrify Corporation. All Rights Reserved. 20
Policy & MFA to Strengthen Security for Office 365
Per-App Authentication Policies
• Allow/deny or step-up authentication
• Based on
• Time of day, work hours
• Inside/outside corporate network
• User role or attributes
• Device attributes (type, management status)
• Location
• App client attributes
• Custom logic
Multifactor Authentication
• Centrify Authenticator soft token with unique one-button authentication
• One time passcode (OTP) over SMS text, email, or push notification
• Interactive phone call to user’s mobile device plus required confirmation
for authentication to proceed
Fast and Easy
Deployment
Copyright © 2015 Centrify Corporation. All Rights Reserved. 22
Automated Lifecycle Management for Office 365
Onboard
Update
Create
Enable Mobile
Monitor/
Report
Offboard
Granular Licensing
With integrated counts and
role-based consumption
Single Sign-On
Multifactor Authentication
Integrated Windows Authentication
Copyright © 2015 Centrify Corporation. All Rights Reserved. 23
Centrify Identity Platform…
Centrify Cloud
Connector
App Gateway AD/LDAP Proxy
Centrify Identity
Platform
Cloud
Directory
Authentication
Engine
MFA and Policy
Engine
Reporting
Engine
CENTRIFY CLOUD
Mobile App
User Portal
Application Single Sign-On
Enterprise Mobility Management
User Provisioning
Mac Management
Centrify Identity
Service
Admin
Portal
Copyright © 2015 Centrify Corporation. All Rights Reserved. 24
Installs in
minutes
…Supports On-prem, Cloud, and Hybrid Deployment
CENTRIFY CLOUD
Centrify Cloud
Connector
App Gateway AD Proxy
Copyright © 2015 Centrify Corporation. All Rights Reserved. 25
SSO for On-Prem SharePoint via App Gateway
Secure on-premises access – without VPN
• Securely deliver remote access to internal SharePoint
and other applications
• Reduce risk by eliminating need for VPN access
to internal network
• Allow remote or mobile access for users
without hassle of VPN
Built into Centrify Cloud Connector with
automatic failover and load balancing
Copyright © 2015 Centrify Corporation. All Rights Reserved. 26
Why Centrify Identity Service?
Simplify and Secure your Office 365 Deployment
Tied to AD
Class-leading AD integration
without replication
Automated provisioning,
including granular licensing
for Office 365
Full mobile management
Mobile device and app
management
MFA with granular per-app
policies
Turnkey IDaaS offering
SSO for O365 and thousands
of other apps
User portal for self-service
password reset, app access,
mobile enrollment, and more
Powered By Azure
“Works with Office 365”
Certified
Localized into 15+ local
languages
SSAE 16 SOC 2, TRUSTe,
EU Safe Harbor
Thank You!
Request a trial
http://www.centrify.com/free-trial/

More Related Content

What's hot

Extending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration AExtending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration A
ridwansassman
 

What's hot (20)

What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx
 
SharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online comparedSharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online compared
 
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
 
Overview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public PreviewOverview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public Preview
 
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
 
SharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportalSharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportal
 
The Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical HubThe Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical Hub
 
SPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint FactorySPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint Factory
 
OneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersOneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-users
 
Office 365 deployment fast track
Office 365 deployment fast trackOffice 365 deployment fast track
Office 365 deployment fast track
 
Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016
 
Extending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration AExtending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration A
 
Tech Ed 2010 Attended Sessions
Tech Ed 2010 Attended SessionsTech Ed 2010 Attended Sessions
Tech Ed 2010 Attended Sessions
 
SharePoint Overview
SharePoint OverviewSharePoint Overview
SharePoint Overview
 
Intro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterIntro to the Office 365 Admin Center
Intro to the Office 365 Admin Center
 
Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016
 
Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...
 
Sharepoint Overview
Sharepoint OverviewSharepoint Overview
Sharepoint Overview
 
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBIOffice 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
 
SharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 editionSharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 edition
 

Similar to Proven Practices for Office 365 Deployment, Security and Management

Why should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App DevelopmentWhy should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App Development
WSO2
 
Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the Cloud
Prolifics
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
OracleIDM
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Micro Focus
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Similar to Proven Practices for Office 365 Deployment, Security and Management (20)

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Horizon 6 what's new
Horizon 6   what's newHorizon 6   what's new
Horizon 6 what's new
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
 
Why should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App DevelopmentWhy should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App Development
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
 
Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the Cloud
 
What is Comindware
What is ComindwareWhat is Comindware
What is Comindware
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
The Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITThe Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise IT
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
 
Saa sure
Saa sureSaa sure
Saa sure
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 

More from Perficient, Inc.

More from Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Proven Practices for Office 365 Deployment, Security and Management

  • 1. 1 Proven Practices for Office 365 Deployment, Security and Management June 3, 2015
  • 2. 2 Proven Practices for Office 365 Deployment, Security and Management
  • 3. 3 PERFICIENT PROFILE Founded in 1997 Public, NASDAQ: PRFT 2014 revenue ~$456 million Major market locations: Allentown, Atlanta, Ann Arbor, Boston, Charlotte, Chicago, Cincinnati, Columbus, Dallas, Denver, Detroit, Fairfax, Houston, Indianapolis, Lafayette, Milwaukee, Minneapolis, New York City, Northern California, Oxford (UK), Southern California, St. Louis, Toronto Global delivery centers in China and India >2,600 colleagues Dedicated solution practices ~90% repeat business rate Alliance partnerships with major technology vendors Multiple vendor/industry technology and growth awards
  • 4. 4 Perficient has consistently been recognized by Microsoft as one of the software giant’s most valuable partners– and especially in regards to the cloud. With nationally-known experts on the Office 365, Azure and Yammer platforms– as well as a deep and rich history in SharePoint, Lync (now Skype for Business), and Exchange– we are well positioned to partner with you as you transform your business. www.perficient.com/microsoft Perficient & Microsoft A rich relationship that has made us a Premier Cloud Partner, Nationwide
  • 5. 5 Why Office 365? Aging On-Premises Infrastructure • Exchange 2003 / 2007 environments • Storage constraints • Eliminate the burden of upgrades Lack of Security / Compliance Functionality • Data Loss Prevention (DLP) • Rights Management Services (RMS) • Multi-Factor Authentication (MFA) • Encryption Need for Mobile Enablement • Support for laptops, tablets, phones
  • 6. 6 35% of Exchange install base is on Office 365 Nearly 80% of the Fortune 500 have Office 365 Over 80% of Office 365 Enterprise customers have two or more workloads
  • 7. 7 Best Practices Get Started… Now • Acquire licensing (trial, EA) • Identify an appropriate pilot group • Consider workloads such as OneDrive for Business or Office 365 ProPlus Accept Changes • Network • Security • Provisioning Seek Support & Experience • Look for certified vendors • Leverage Microsoft documentation and training • Work with a deployment partner
  • 8. 8 Common Mistakes To Avoid Organizational • Excluding groups such as IT Security • Lack of buy-in from the necessary parties • Insufficient resource planning / prioritization Project Execution • Executing a pilot without a good cross-section of users • Lack of understanding of product functionality • New feature overload User Impact • Lack of communication
  • 9. 9 First Step to the Cloud: Identity & Authentication IDENTITY Questions • What is our source of user identities? • How do we manage the lifecycle of these identities? Goals • Leverage existing directories we have in place • Reduce the required IT management of directories • Don’t ask our users to manage another account for every cloud application • Implement cloud solutions without adding additional on-premises dependencies
  • 10. 10 First Step to the Cloud: Identity & Authentication AUTHENTICATION Questions • Is it secure? • How fast can I have it? Goals • Fast deployment • Achieving “Single-Sign On Zen” • Ensure high-availability of authentication services • Implement cloud solutions with minimal additional on-premises dependencies • Provide a consistent login experience across devices and platforms • Deploy a solution that supports all of our cloud services
  • 11. Copyright © 2015 Centrify Corporation. All Rights Reserved. 11 Centrify Identity Service Reduce time, cost and risk of migrating to Office 365
  • 12. Copyright © 2015 Centrify Corporation. All Rights Reserved. 12 First Step to the Cloud: Identity & Authentication • Leverage existing directories • Reduce the required IT management of directories • Don’t ask our users to manage another account for every cloud application (No more passwords!) • Deploy a solution that supports all of our cloud services • Fast Deployment • Achieving Single-Sign On Zen • Ensure High-Availability • Provide a consistent login experience across devices and platforms Security Goals Deployment Goals Implement cloud solutions with minimal additional on-premises dependencies
  • 13. Copyright © 2015 Centrify Corporation. All Rights Reserved. 13 Centrify Identity Service Secure and simplify your Office 365 deployment app app app
  • 15. Copyright © 2015 Centrify Corporation. All Rights Reserved. 15 Secure by Design: Powered by Azure Current and planned • Zero-downtime architecture • Worldwide multi-region data centers • Localized into 15+ languages • 24x7 support with regional sales teams and more than 250 resellers • SSAE 16 SOC 2, TRUSTe, EU Safe Harbor +
  • 16. Copyright © 2015 Centrify Corporation. All Rights Reserved. 16 Secure by Design: Validated by Microsoft Microsoft has tested and certified Centrify Identity Service as a “Works with Office 365” solution Established protocols and premier support agreements between Centrify and Microsoft ensure quality joint customer support Best-in-class support for Office365 deployments
  • 17. Copyright © 2015 Centrify Corporation. All Rights Reserved. 17 Leverage Existing Directories — Reduce IT Overhead The most flexible options for storing identity Purely in the cloud No replication to cloud (On-prem with class-leading AD/LDAP integration) Combination (Subset of users in AD/LDAP + another subset in cloud)
  • 18. Copyright © 2015 Centrify Corporation. All Rights Reserved. 18 No New Passwords to Hack — Single Sign-On (SSO) Robust app support • Class-leading support O365 • Direct support for thousands of other apps Add your own apps • Easy to customize generic SAML app • Add your own username/password apps Rich mobile app support • Leading ISVs (Box, Dropbox) support SDK • Mobile Authentication Services SDK for your custom apps (developers.centrify.com) Centrify infinite apps • Browser plugin to discover username/password apps • Auto-detection with manual fallback
  • 19. Copyright © 2015 Centrify Corporation. All Rights Reserved. 19 Secure Office 365 access starts at the device • MDM: IT needs to ensure security of underlying mobile devices • MAM: IT needs to deploy appropriate apps to the device • ZSO: End users hate typing in passwords, especially on mobile • MFA: Trusted devices and wearables are simplest method for step-up authentication Centrify uniquely combines identity + mobility management Integrated Mobile Management Device Management (MDM) Container Management (MCM) Samsung KNOX Application Management (MAM) Authentication Services (MAS) App Zero Sign-On (ZSO) Centrify Mobile Authenticator Mobile User Self-Service
  • 20. Copyright © 2015 Centrify Corporation. All Rights Reserved. 20 Policy & MFA to Strengthen Security for Office 365 Per-App Authentication Policies • Allow/deny or step-up authentication • Based on • Time of day, work hours • Inside/outside corporate network • User role or attributes • Device attributes (type, management status) • Location • App client attributes • Custom logic Multifactor Authentication • Centrify Authenticator soft token with unique one-button authentication • One time passcode (OTP) over SMS text, email, or push notification • Interactive phone call to user’s mobile device plus required confirmation for authentication to proceed
  • 22. Copyright © 2015 Centrify Corporation. All Rights Reserved. 22 Automated Lifecycle Management for Office 365 Onboard Update Create Enable Mobile Monitor/ Report Offboard Granular Licensing With integrated counts and role-based consumption Single Sign-On Multifactor Authentication Integrated Windows Authentication
  • 23. Copyright © 2015 Centrify Corporation. All Rights Reserved. 23 Centrify Identity Platform… Centrify Cloud Connector App Gateway AD/LDAP Proxy Centrify Identity Platform Cloud Directory Authentication Engine MFA and Policy Engine Reporting Engine CENTRIFY CLOUD Mobile App User Portal Application Single Sign-On Enterprise Mobility Management User Provisioning Mac Management Centrify Identity Service Admin Portal
  • 24. Copyright © 2015 Centrify Corporation. All Rights Reserved. 24 Installs in minutes …Supports On-prem, Cloud, and Hybrid Deployment CENTRIFY CLOUD Centrify Cloud Connector App Gateway AD Proxy
  • 25. Copyright © 2015 Centrify Corporation. All Rights Reserved. 25 SSO for On-Prem SharePoint via App Gateway Secure on-premises access – without VPN • Securely deliver remote access to internal SharePoint and other applications • Reduce risk by eliminating need for VPN access to internal network • Allow remote or mobile access for users without hassle of VPN Built into Centrify Cloud Connector with automatic failover and load balancing
  • 26. Copyright © 2015 Centrify Corporation. All Rights Reserved. 26 Why Centrify Identity Service? Simplify and Secure your Office 365 Deployment Tied to AD Class-leading AD integration without replication Automated provisioning, including granular licensing for Office 365 Full mobile management Mobile device and app management MFA with granular per-app policies Turnkey IDaaS offering SSO for O365 and thousands of other apps User portal for self-service password reset, app access, mobile enrollment, and more Powered By Azure “Works with Office 365” Certified Localized into 15+ local languages SSAE 16 SOC 2, TRUSTe, EU Safe Harbor
  • 27. Thank You! Request a trial http://www.centrify.com/free-trial/