SlideShare a Scribd company logo
1 of 34
Mobiilne ettevõte
mobiilsete andmetega
Tõnis Tikerpäe
27.10.2015
MICROSOFT CONFIDENTIAL
Windows with Apple and/or Android is the norm
Sources: Forrester, Mary Meeker Internet Trends 2014
1.3B
• 80% Windows PC + Android iPhone
• 20% Windows PC + iPhone
60M 45M 10M
5M
90%
Mobility is the new normal
of employees use personal
devices for work purposes.*
of employees that typically
work on employer premises,
also frequently work away
from their desks.***
of all software will be available
on a SaaS delivery by 2020.**
66% 25% 33%
*CEB The Future of Corporate ITL: 203-2017. 2013.
**Forrester Application Adoption Trends: The Rise Of SaaS
***CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.
MICROSOFT CONFIDENTIAL
250%
1.8billion
More sophisticated
$3 trillion
mobile architecture
Nearly 80%
2018:
By 2016,
global consumers
1.4 billion
Devices Apps Data
Advanced Threat Analytics (ATA)
Helps you identify threats using behavioral analysis and provides an actionable report on an attack timeline.
Windows Intune
Mobile device settings
management
Mobile application
management
Selective wipe
Microsoft Azure Active Directory Premium
security reports, and
audit reports, multi-
factor authentication
Self-service password
reset and group
management
Connection between
Active Directory and
Azure Active Directory
Introducing the Enterprise Mobility Suite
Microsoft Azure Rights Management service
Information protection Connection to on-
premises assets
Bring your own key
Protect
your data
Enable
your users Unify your environment
People-centric approach
Devices Apps Data
Protect
your data
Enable
your users
Desktop
Virtualization
Access &
information
protection
Hybrid
identity
Mobile device &
application
management
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
*Coming soon
*
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Consistent user experience
Simplified device enrollment and registration
Single console to manage devices
ITUser
Devices
enrolled
Apply policies
Company Portal
Recommended apps for user’s devices
ITUser
Enroll
• Provide a self-service Company
Portal for users to enroll devices
• Deliver custom terms and
conditions at enrollment
• Bulk enroll devices using Apple
Configurator or service account
• Restrict access to Exchange email
if a device is not enrolled
Retire
• Revoke access to corporate
resources
• Perform selective wipe
• Audit lost and stolen devices
Provision
• Deploy certificates, email, VPN,
and WiFi profiles
• Deploy device security policy
settings
• Install mandatory apps
• Deploy app restriction policies
• Deploy data protection policies
Manage and Protect
• Restrict access to corporate
resources if policies are violated
(e.g., jailbroken device)
• Protect corporate data by
restricting actions such as
copy/cut/paste/save outside of
managed app ecosystem
• Report on device and app
compliance
User IT
Configuration Manager console (hybrid)Intune web console (cloud only)
Maximize mobile productivity and protect corporate
resources with Office mobile apps
Extend these capabilities to existing line-of-business
apps using the Intune app wrapper
Enable secure viewing of content using the Managed
Browser, PDF Viewer, AV Player, and Image Viewer apps
Managed apps
Personal appsPersonal apps
Managed apps
ITUser
Personal apps
Managed apps
Maximize productivity while preventing leakage of company
data by restricting actions such as copy/cut/paste/save in
your managed app ecosystem
User
Intune
app wrapping tool
or SDK
Apply MAM policiesDeploy app
LOB application
ITUser
Personal apps
Managed apps Company Portal
Are you sure you want to wipe
corporate data and applications
from the user’s device?
OK Cancel
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
ITIT
Desktop
Virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Dynamic Access Control
Rights management
Secure access to work files
v
ITUser
Behavioral
Analytics
Detection for known
attacks and issues
Advanced Threat
Detection
An on-premises platform to identify advanced security attacks before they cause damage
 Witnesses all authentication and
authorization to the
organizational resources within
the corporate perimeter or on
mobile devices
Mobility support Integration to SIEM Seamless deployment
 Works seamlessly with SIEM
 Provides options to forward
security alerts to your SIEM or to
send emails to specific people
 Functions as an appliance hardware
or virtual
 Utilizes port mirroring to allow
seamless deployment alongside AD
 Does not affect existing
network topology
Key features
Topology
Tõnis Tikerpäe
Service Manager/Technical Architect
Primend

More Related Content

What's hot

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicIBM Security
 
Enabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesEnabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesOwen Allen
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - HomeworkLoïc Naga
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilitySymantec
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 

What's hot (20)

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Enabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesEnabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their Phones
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Atrix
AtrixAtrix
Atrix
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
BYOD
BYODBYOD
BYOD
 

Viewers also liked

Derrida interview_choreographies
Derrida  interview_choreographiesDerrida  interview_choreographies
Derrida interview_choreographiesDaniel Kairoz
 
Infantil b
Infantil bInfantil b
Infantil bfbcat
 
5-5 Standard Form.pdf
5-5 Standard Form.pdf5-5 Standard Form.pdf
5-5 Standard Form.pdfLomasAlg1
 
Los comunitarios vienen a españa a trabajar, no a jubilarse
Los comunitarios vienen a españa a trabajar, no a jubilarseLos comunitarios vienen a españa a trabajar, no a jubilarse
Los comunitarios vienen a españa a trabajar, no a jubilarseMaría López Nalda
 
Jugadas 08 05-12
Jugadas 08 05-12Jugadas 08 05-12
Jugadas 08 05-12xblist
 
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXE
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXECOMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXE
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXEUCIZONI AC
 
Analisis jugadas 11 05-12
Analisis jugadas 11 05-12Analisis jugadas 11 05-12
Analisis jugadas 11 05-12xblist
 
Jugadas 22 05-12
Jugadas 22 05-12Jugadas 22 05-12
Jugadas 22 05-12xblist
 
Alejo laudato eccce 2015
Alejo laudato eccce 2015Alejo laudato eccce 2015
Alejo laudato eccce 2015eccce821
 

Viewers also liked (11)

Derrida interview_choreographies
Derrida  interview_choreographiesDerrida  interview_choreographies
Derrida interview_choreographies
 
Infantil b
Infantil bInfantil b
Infantil b
 
5-5 Standard Form.pdf
5-5 Standard Form.pdf5-5 Standard Form.pdf
5-5 Standard Form.pdf
 
The Others
The OthersThe Others
The Others
 
Los comunitarios vienen a españa a trabajar, no a jubilarse
Los comunitarios vienen a españa a trabajar, no a jubilarseLos comunitarios vienen a españa a trabajar, no a jubilarse
Los comunitarios vienen a españa a trabajar, no a jubilarse
 
Jugadas 08 05-12
Jugadas 08 05-12Jugadas 08 05-12
Jugadas 08 05-12
 
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXE
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXECOMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXE
COMUNICADO UCIZONI 7 DE MAYO DESALOJO VIOLENTO DE COMUNIDAD MIXE
 
Analisis jugadas 11 05-12
Analisis jugadas 11 05-12Analisis jugadas 11 05-12
Analisis jugadas 11 05-12
 
Tugas fisika
Tugas fisikaTugas fisika
Tugas fisika
 
Jugadas 22 05-12
Jugadas 22 05-12Jugadas 22 05-12
Jugadas 22 05-12
 
Alejo laudato eccce 2015
Alejo laudato eccce 2015Alejo laudato eccce 2015
Alejo laudato eccce 2015
 

Similar to Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega

Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 20153GDR
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 

Similar to Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega (20)

Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 

More from Primend

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Primend
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Primend
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Primend
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulPrimend
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Primend
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Primend
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Primend
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedPrimend
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Primend
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Primend
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Primend
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Primend
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPrimend
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Primend
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedPrimend
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing PiecePrimend
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Primend
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend
 

More from Primend (20)

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemused
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudised
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing Piece
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduks
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
 

Recently uploaded

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega

  • 2.
  • 3.
  • 4. MICROSOFT CONFIDENTIAL Windows with Apple and/or Android is the norm Sources: Forrester, Mary Meeker Internet Trends 2014 1.3B • 80% Windows PC + Android iPhone • 20% Windows PC + iPhone 60M 45M 10M 5M 90%
  • 5. Mobility is the new normal of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently work away from their desks.*** of all software will be available on a SaaS delivery by 2020.** 66% 25% 33% *CEB The Future of Corporate ITL: 203-2017. 2013. **Forrester Application Adoption Trends: The Rise Of SaaS ***CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.
  • 6. MICROSOFT CONFIDENTIAL 250% 1.8billion More sophisticated $3 trillion mobile architecture Nearly 80% 2018: By 2016, global consumers 1.4 billion
  • 7.
  • 9. Advanced Threat Analytics (ATA) Helps you identify threats using behavioral analysis and provides an actionable report on an attack timeline. Windows Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium security reports, and audit reports, multi- factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory Introducing the Enterprise Mobility Suite Microsoft Azure Rights Management service Information protection Connection to on- premises assets Bring your own key
  • 10. Protect your data Enable your users Unify your environment People-centric approach Devices Apps Data
  • 11. Protect your data Enable your users Desktop Virtualization Access & information protection Hybrid identity Mobile device & application management
  • 12. Single sign-on Self-service experiences Common identity Conditional access SaaS applications Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Consistent user experience Simplified device enrollment and registration Single console to manage devices
  • 21. Enroll • Provide a self-service Company Portal for users to enroll devices • Deliver custom terms and conditions at enrollment • Bulk enroll devices using Apple Configurator or service account • Restrict access to Exchange email if a device is not enrolled Retire • Revoke access to corporate resources • Perform selective wipe • Audit lost and stolen devices Provision • Deploy certificates, email, VPN, and WiFi profiles • Deploy device security policy settings • Install mandatory apps • Deploy app restriction policies • Deploy data protection policies Manage and Protect • Restrict access to corporate resources if policies are violated (e.g., jailbroken device) • Protect corporate data by restricting actions such as copy/cut/paste/save outside of managed app ecosystem • Report on device and app compliance User IT
  • 22. Configuration Manager console (hybrid)Intune web console (cloud only)
  • 23. Maximize mobile productivity and protect corporate resources with Office mobile apps Extend these capabilities to existing line-of-business apps using the Intune app wrapper Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Managed apps Personal appsPersonal apps Managed apps ITUser
  • 24. Personal apps Managed apps Maximize productivity while preventing leakage of company data by restricting actions such as copy/cut/paste/save in your managed app ecosystem User
  • 25. Intune app wrapping tool or SDK Apply MAM policiesDeploy app LOB application ITUser
  • 26. Personal apps Managed apps Company Portal Are you sure you want to wipe corporate data and applications from the user’s device? OK Cancel Perform selective wipe via self-service company portal or admin console Remove managed apps and data Keep personal apps and data intact ITIT
  • 27. Desktop Virtualization Access & information protection Mobile device & application management Hybrid identity Dynamic Access Control Rights management Secure access to work files
  • 29.
  • 30. Behavioral Analytics Detection for known attacks and issues Advanced Threat Detection An on-premises platform to identify advanced security attacks before they cause damage
  • 31.  Witnesses all authentication and authorization to the organizational resources within the corporate perimeter or on mobile devices Mobility support Integration to SIEM Seamless deployment  Works seamlessly with SIEM  Provides options to forward security alerts to your SIEM or to send emails to specific people  Functions as an appliance hardware or virtual  Utilizes port mirroring to allow seamless deployment alongside AD  Does not affect existing network topology Key features
  • 33.

Editor's Notes

  1. 5
  2. Digitization of data, products, and processes is driving incredible economic growth while giving us new ways to work. But it also increases risk from cybersecurity challenges and vulnerabilities. Greater multichannel integration adds significantly to the customer experience but introduces many more interfaces Closer colla­b­oration with business partners, customers, advisers, and other third parties can enrich everything from product development to recruiting but can also result in more complex intertwined supply chains and flows of information Digitization also increases the value of an organization’s data assets. Within the banking sector, for instance, the use of big data and analytics may greatly increase a bank’s ability to target and serve high-value clients with specific cross-selling offers. The value of the data rises as customer information is aggregated and cross-referenced—allowing companies to track names, demographics, and purchase histories (with due regard for customer privacy)—but so does the attendant risk. A breach can expose the bank and its clients to severe financial and reputational harm.
  3. The first step to happy and productive user is a single set of credentials that can be used between an existing on-premises directory and Azure Active Directory (WAAD).  Windows Server Active Directory can be easily connected to Windows Azure with the identity sync engines that are available and the optional use of Active Directory Federation Services (ADFS). One of the available tools for synchronization, is dirsync, a downloadable component from Windows Azure. You can install it on a domain-joined Windows Server and you can quickly populate your existing users and groups into your Azure AD and keep it updated. Besides synchronization you have two option when it comes to Authentication. You can either use ADFS or an option offered through DirSync :password hash sync (http://blogs.msdn.com/b/active_directory_team_blog/archive/2013/06/13/10423168.aspx) you don’t have all the capabilities of actual federation but is easier to setup. (See next slide for details) As we mentioned already FIM rights are granted with Azure AD Premium and you can use FIM to sync other directories (Open LDAP, databases, etc) either to your on-premises AD and then up to Azure AD, or directly to Azure AD with the FIM Azure Connector. In the next few months a new sync engine from Azure AD will be introduced : “Azure AD Sync”. With this engine you won’t need any other tool in order to synchronize any kind of on-premises identity repository to Azure AD. From this point on, every application that is or will be connected to Azure AD can be accessed with a single set of credentials, the one that a user already uses now to login to his on premises active directory.
  4. There are two methods with which we can accomplish synchronization between Windows Server Active Directory and Azure Active Directory. The first method is the fastest one when it comes to deployment. Dirsync + Password Hash Sync. http://blogs.msdn.com/b/active_directory_team_blog/archive/2013/06/13/10423168.aspx In this case you can choose password hash sync as an option form Dirsync (and the future identity sync engines ) and than a hash (of the original hash) of the user password will be stored on Azure AD. From this point Authentication will take place against Azure AD. Let’s make clear that no plain text password is stored. Just a double-hashed one. The second method is to use identity sync engines to synchronize user and group attributes to the cloud, but when it comes to authentication ADFS can be used, so user authentication will take place against the on-premises Active Directory. This method can be the only solution for those organization with compliance issues when it comes to storing passwords in the cloud.
  5. 1200 SaaS apps are already in the application gallery and counting … For a the most updated content of the application gallery see here http://www.windowsazure.com/en-us/gallery/active-directory
  6. Now that we have gathered identities and applications into one identity store, the next step is to find an efficient way to handle them and their interconnections. And there is one. The Azure Management portal contains a section specifically for Azure Active Directory administration. You can create new users/groups and delete them, You can also sync users/groups from on premises AD, manage user access to the service, Additionally, you can view business related attributes for every user, use the “device” tab to see which devices, platforms, browsers, IPs they are using (premium feature) configure directory synchronization parameters, add domains and, most important, assign access to the applications that you have already added and connect in Azure Active Directory. [using groups to assign access to SaaS apps is a feature of Azure AD Premium]. [Click] Those apps can be of any kind. Custom LoB cloud-hosted apps or purchased from a vendor, these apps can be added from the portal (application gallery) and enabled for single sign-on. Single Sign-On can be a challenging task for some applications. Azure Active Directory can make the life of an administrator easier by providing a number of popular preintegrated SaaS applications. In the previous slide we mentioned that we have chosen the most popular cloud applications, regardless of the public cloud they are hosted on, and we have preconfigured all the parameters needed to federate with them. Your cloud apps are ready when you are. Administrators simply open the Azure Management Console, navigate to Windows Azure AD, click on Applications link, choose to add a new application and pick from the application gallery the SaaS app their enterprise is using and configure the level of interaction with it. This level of interaction can be different mainly because SaaS apps are using different standards or authentication and identity management methods.  With a few SaaS applications, Federation SSO can be configured while with others only password SSO is possible [password vaulting].  However, the greatest level of interaction can be achieved with the most popular SaaS apps like Box, Salesforce, Concur and of course Office 365. These are the application gallery “Featured” apps. With those apps, single sign on through federation or password sync is one thing but, [Click] you can also create (provision) users and groups to them directly from identities already in Azure Active Directory.  And the deletion (Deprovision) of users and groups  is possible too with the same simple steps. In addition, if an application has different access levels, predefined roles can be assigned to users. (Groups provisioning is a Premium feature) When a user is hired it often takes many steps to administrators to assign access to the right applications and even more steps are needed when a user is decommissioned, to revoke all his rights. This can been more difficult for cloud based applications and users accessing them from everywhere with many different sets of credentials. User and Group provisioning and de-provisioning to SaaS apps that Azure Active Directory is offering can secure business processes by making sure that a user can access only those applications that he needs to do his job and nothing more with a few simple steps. When a new identity is created, after the synchronization with the on-premises AD, the administrator can provide access, single sign on and provision the new user to a preintegrated SaaS app in a single procedure. And when a user or a whole group is decommissioned, the removal of his identity from Azure AD will cause inability to access enterprise cloud apps from everywhere. The rest of the SaaS apps that are not having this high level of integration, and can be found in the application gallery can be configured for single sign on once their internal user identities are manually created using the appropriate tools provided by the application owner As you have probably noticed, Azure Active Directory is offering capabilities that does not match exactly with those of the on-premises Active Directory. But we shouldn’t expect those two versions of active directory to be exactly the same since they have to face different challenges in different environments. Group-based access assignment and provisioning is a feature of Azure Active Directory Premium  
  7. Multi-Factor Authentication offers the additional security you demand using the phones your users already carry. Multiple phone-based authentication methods are available, allowing users to choose the one that works best for them. And, support for multiple methods ensures additional authentication is always available. Multi-Factor Authentication apps are available for Windows Phone, iOS phones and tablets, and Android devices. Users download the free app from the device store and activate it using a code provided during set up. When the user signs in, a notification is pushed to the app on their mobile device. The user taps to approve or deny the authentication request. Cell or Wi-Fi access is required. For offline authentication, the app works like a software token to generate a one-time passcode that is entered during sign in. The one-time-passcode method is comparable to software or soft tokens solutions offered by vendors like RSA and Gemalto. Automated phone calls are placed by the Multi-Factor Authentication service to any phone, landline or mobile. The user simply answers the call and presses # on the phone keypad to complete their sign in. Text messages are sent by the Multi-Factor Authentication service to any mobile phone. The text message contains a one-time passcode. The user is prompted to either reply to the text message with the passcode or enter the passcode into the sign in screen.