Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect
|
|
- Job Nash
- 5 years ago
- Views:
Transcription
1 Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit Alan Maddison, Architect Amit Bhatia, Architect
2 Why did we create the Assessment kit?
3 Assessment objectives Assess customer s environment to maximize their benefits Pre-sales (managed service) conversation Engage your customer on Modern Windows and Office Partner monetization opportunity Sales opportunity as a standalone workshop Educate your customer on deploying and staying up to date Assess the customer s environment to help drive the need to move to Modern Windows and Office Incorporate as discovery phase of design and deployment opportunity Leverage as part of selling a managed service
4 Assessment content
5 Assessment content Microsoft 365 Powered Device Assessment: Overview & Delivery Timelines Guide Microsoft 365 Powered Device Assessment: Assessment Goals & Introduction Deck Microsoft 365 Powered Device Assessment: Introduction to Windows Analytics Deck Microsoft 365 Powered Device Assessment: Partner Delivery Guide Microsoft 365 Powered Device Assessment: Findings & Recommendations Deck
6 Overview & Delivery Timelines Guide
7 Summary and Timelines Summary and Timelines Summary of assessment Guidelines for delivery scheduling and timing
8 Assessment Goals & Introduction Deck
9 Goals of the assessment Steps in the assessment What does it mean to deploy Modern Windows and Office? Why should you deploy Modern Windows and Office? What does it mean to stay up to date? How do you stay up to date?
10 Goals of the assessment Assess your environment to maximize your benefits Make sure your environment is secure Understand the Windows operating systems deployed in your environment Understand what Office applications are installed on your desktops Learn what is required to achieve a more secure environment Make sure you are prepared for end of life Windows 7 extended support ends January 2020 Office 2010 extended support ends October 2020 Starting October 2020, only Office 365 ProPlus and Office desktop clients in mainstream support will be able to connect to Office 365 services Keeping your users productive Ensure less user disruption to increases productivity Make sure your users have access to the latest features and functionality Leverage the latest hardware
11 Assessment steps Introduce Modern Windows and Office Introduce Windows Analytics Deploy and configure Windows Analytics Windows Analytics data analysis Findings and recommendations
12 What does it mean to deploy Modern Windows and Office and stay up to date? Deploy Modern Windows and Office Stay up to date Deploy monthly quality updates Move to latest build of Windows 10 Move to latest build of Office 365 ProPlus Deploy feature updates every 6-12 months Windows Analytics for monitoring and reporting
13 Why should you deploy Modern Windows and Office & Stay up to date? The benefits Deploy Modern Windows and Office Security Windows 10 is the most secure version of Windows yet and includes advanced security features for added protection End of life Windows 7 extended support ends January 14th, 2020 Office 2010 extended support ends October 13th, Beginning in October 2020, only Office 365 ProPlus and Office desktop clients in mainstream support will be able to connect to Office 365 services. Stay up to date Security New security features added with every semi-annual release of Windows 10 & Office 365 ProPlus to stay ahead of attackers 18 months support for each feature release Simplify management Move from project to process Increase user productivity: reduced user disruption & new feature enhancements twice per year Support for hardware innovation
14 What does it mean to stay up to date? FEATURE UPDATE Always up to date for latest productivity and security capabilities and hardware support AGILE UPDATE CYCLE From project to process to simplify the deployment process and reduce disruption FEATURE UPDATE 2 FEATURE UPDATES PER YEAR
15 Staying up to date Key things to know about staying up to date Predictable releases, twice per year Semi-Annual Channel Windows Aligned with Office For simpler deployment planning Office 365 ProPlus Windows 10 Office 365 ProPlus Windows 10 Each serviced for 18 months From the date of release Office 365 ProPlus
16 C A P A B I L I T Y Staying secure with Windows 10 Attackers take advantage of periods between releases Stay ahead of the attackers with continual Windows 10 improvements Protection gap T I M E P R O D U C T R E L E A S E T H R E A T S O P H I S T I C A T I O N
17 18 month servicing and support Windows End of Support Extended Support Office 365 ProPlus 1708 End of Support End of Support No security updates No bug fixes No technical support for builds out of support
18 Office 365 ProPlus staying up to date Security Simplified management User productivity Security and non-security changes provided monthly Updates are cumulative Smaller, easily managed updates instead of large, complex upgrades Smaller download sizes for upgrades when you stay up to date Value delivered faster, with less impact on users 120+ new features since the last release of Office Professional Existing features are enhanced and more reliable
19 Compatibility in Windows 10 Desktop apps Web sites Modern apps Hardware Organizations are observing compatibility rates above 99% High compatibility achieved through: Minimal changes to Win32 APIs Insider feedback during development Telemetry Internet Explorer 11 included (unchanged) for backwards compatibility New Microsoft Edge browser for modern HTML5-based web sites Enterprise Mode features to ensure proper use High compatibility achieved through: Validation of Windows Store apps Insider feedback during development Telemetry Significant investments, enhancements in each release Windows 10 supports all devices capable of running Windows 7 and above Identical hardware minimum requirements as Windows 7 Strong driver compatibility, with updates delivered as needed through Windows Update
20 NUMBER OF DEVICES How to stay up to date -Windows 10 servicing channels Plan and Prepare Windows Insider Preview Channel Targeted Pilot Semi-Annual Channel Broadly Deploy Semi-Annual Channel Ensure new release works with business-critical apps, core infrastructure tools Provide feedback on any issues encountered Validate applications, infrastructure, and hardware to prepare for broad deployment Lab machines, IT devices, developers Early adopters, volunteers Information workers General population TIME Release Supported for 18 months
21 Windows 10 deployment ring example Plan and Prepare Targeted Pilot Validation Preview Canary Self- Select Sample Validate Deploy critical and Use business applications on non-production Target additional devices 4-6% prior of users to in general Target 2-3% availability of users in all all departments and include critical departments to continue validation Who machines to continue validation Who Workstation Who Engineers Volunteer users representative of Application Additional owners production users departments High-level Critical IT admins machines Broad What What What Validate proper operation of Validate Validate for driver/software proper operation issuesof commonly used applications Validate commonly proper operation used applications Report issues to IT Workstation Validate Report application issues compatibility to IT Workstation Engineering Team Provide Engineering feedback to Team Microsoft and vendor(s) Conceptual illustration only
22 NUMBER OF DEVICES How to stay up to date O365 ProPlus update channels Plan and Prepare Monthly Channel Targeted Pilot Semi-Annual Channel (Targeted) Broadly Deploy Semi-Annual Channel Provide the newest features of Office as soon as they re available Provide feedback on any issues encountered Validate line-of-business applications, macros, and add-ins to prepare for broad deployment IT Pros and Developers Representative sample of environment All remaining devices TIME Release Supported for 6 months Release Supported for 14 months
23 Office 365 ProPlus deployment rings Plan and Prepare Targeted Pilot Validation Monthly Validation Broad Target a representative sample to validate Assess new Deploy features and Use against organizational and validate environment against prior organizational to Semi-Annual environment Channel prior release to Semi-Annual Channel (Targeted) release Who Who Workstation Engineers Workstation Engineers Application owners Application owners High-level IT admins High-level IT admins 10% of production devices per Device What Profile Assess new features What Validate macros, add-ins, and LOB app Validate macros, add-ins, and LOB app compatibility compatibility Validate proper operation of Office Validate proper operation of Office Provide feedback to Microsoft Provide feedback to Microsoft *Conceptual illustration only
24 Introduction to Windows Analytics Deck What is Windows Analytics? Why use Windows Analytics? How do you use Windows Analytics? Sample assessment results
25 Introduce Windows Analytics Introduce Windows Analytics Provide an overview of Windows Analytics Use Windows Analytics to engage customers about Modern Windows and Office Walkthrough sample assessment findings
26 What is Windows Analytics?
27 Why use Windows Analytics? Pull together key information Telemetry-based app and device inventory Establish a process Prioritize tasks Identify issues Drive deployment Identify machines that are ready to deploy
28 Why use Windows Analytics? Pull together key information Telemetry-based patch and update inventory Establish a process Identify issues Remediate using provided information Drive deployment Identify machines that are ready to deploy Integrate with need to be patched or updated
29 Partner Delivery Guide
30 Partner Delivery Guide Partner Delivery Guide Detailed deployment and configuration steps for Windows Analytics Understand how to use Windows Analytics to engage customers about Modern Windows and Office Leverage data from Upgrade Readiness and Update Compliance to drive the conversation
31 Findings & Recommendations Deck
32 Assessment results Deploy Modern Windows and Office Identify device operating system Understand versions of OS deployed Windows 7, Windows 8 or Windows 10 Identify Office versions Understand what versions of Office are deployed ProPlus or Perpetual Device and application summary Device and application count Identify applications and drivers Telemetry-based app and driver inventory App usage and support info from Ready For Windows Identify hardware inventory Leverage hardware inventory to drive hardware refresh 32
33 Assessment results Stay up to date Identify device operating system By leveraging Update Compliance, it is possible to identify which devices are running which build of Windows 10. This information includes both feature releases and quality updates. Identify Office versions Leverage the data available as part of Upgrade readiness to ensure that ALL devices are running the latest feature release of Office 365 ProPlus. Applications and drivers Early testing of critical applications as part of deployment rings for feature releases Remediation before broad deployment Windows Defender AV status Update Compliance will provide important insights into helping identify if their AV signatures are current.
34 Findings Device Operating System Findings Key insights Action
35 Findings Applications and drivers Findings Key insights Action
36 Findings Update Compliance Overview Findings Action
37 Windows Analytics Resources Windows Analytics Overview: Analytics-Overview-Decks/m-p/173891#M1 Windows Analytics Configuration: Windows Analytics Extensibility: Analytics-Extensibility/m-p/176068#M2 Windows Analytics FAQ: 37
38 Microsoft 365 powered device Resources Partner website: aka.ms/m365powereddevice Partner playbook: aka.ms/m365powereddeviceplaybook Partner video trainings: aka.ms/powereddevicetrainingvideos 38
39 Microsoft 365 powered device Resources Link to Webinar On-demand Videos: 39
40 Coming up Session on 4/24 Windows Advanced Threat Protection (ATP) Overview and Updates Our customers are facing a difficult threat landscape; today s solutions are helping but they are nowhere near complete. Windows Defender ATP is a unified endpoint security platform that helps stop breaches. Threat & exploit protection, Endpoint Detection and Response (EDR), and Automation all under one roof, for better protection, detection, investigation and response. With the next Windows release, many new and enhanced capabilities become available. Come and explore those with us. Please Register!
41 Partner Q&A
M365 Powered Device Proof of Concept
M365 Powered Device Proof of Concept 365 A complete, intelligent, secure solution to empower employees Office 365 Windows 10 Enterprise Mobility + Security Modern IT Multiple Device Platforms User and
More informationAccelerate Windows 10 deployments through telemetry driven insights using Upgrade Analytics
Accelerate Windows 10 deployments through telemetry driven insights using Upgrade Analytics Kim Kaae, Windows TSP, Microsoft Denmark +400M D E V I C E S R U N N I N G W I N D O W S 1 0 +52M I N BUSINESS
More informationAdnan Cloud Solutions Architect. SAFFA living in Netherlands, work globally. Microsoft Trainer +25y (xrl MSLearning)
Adnan Hendricks Cloud Solutions Architect SAFFA living in Netherlands, work globally Microsoft Trainer +25y (xrl MSLearning) Microsoft MVP + 5 Years @Microspecialist Adnan@ microspecialistconsulting.com
More informationQuo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,
Quo vadis? System Center Configuration Manager Full managed desktop Mobile device management Light managed device policies, inventory, Hybrid management One pane of glass Integration of mobile device management
More informationCustomer Success with Windows as a Service. John Cable Windows Servicing and Delivery
Customer Success with Windows as a Service John Cable Windows Servicing and Delivery Windows as a service A single cumulative update each month with no new features Twice per year with new capabilities
More informationKeeping Current with Windows 10. Jon Anderson Senior Systems Consultant, Now Micro December 5 th, 2018
Keeping Current with Windows 10 Jon Anderson Senior Systems Consultant, Now Micro December 5 th, 2018 Device Lifecycle Company Hardware Reseller (Dell, HP, Lenovo, and more) OEM (Digital Signage, Kiosks,
More informationA tale of Modern Management Part 1
A tale of Modern Management Part 1 Speaker introduction @JankeSkanke @okieselb jan.ketil.skanke@cloudway.no oliver.kieselbach@glueckkanja.com Principal Cloud Architect - CloudWay Lead Cloud Architect Glück
More information9 Years in Consulting. Broad experience in Microsoft Infrastructure solutions. Specialised in Windows 10 & Surface familly
About 9 Years in Consulting Broad experience in Microsoft Infrastructure solutions Specialised in Windows 10 & Surface familly We know Windows XP Windows 7 wasn t easy It often took between 3-7 years!
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationRenault-Nissan EUC «as a service»
experiences.microsoft.fr Microsoft Windows, Office 365 and SCCM alignement Renault-Nissan EUC context The project stakes, scope and user benefits WAAS and deployment rings Roadmaps User journey to the
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More informationImprove productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager
Improve productivity with modernized PCs and Windows 10 Christopher Choong, DTM Field Marketing Manager Impressive innovation. Inside and out. 3 4 It s an important time to refresh Design Every product
More informationWindows Server The operating system
Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct
More informationM365 Powered Device Proof of Concept Overview
M365 Powered Device Proof of Concept Overview Describe how modern desktop will support your business Explore the latest devices Learn about privacy and diagnostic data Challenges Modern Desktop Devices
More informationDatacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education
Datacenter Management and The Private Cloud Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education System Center Helps Deliver IT as a Service Configure App Controller Orchestrator Deploy
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationCo se změnilo ve Windows 10 z pohledu IT administrátora
Co se změnilo ve Windows 10 z pohledu IT administrátora Kamil Roman MCSE: Mobility MCSE: Cloud Platform and Infrastructure MCSA MCITP MCT konzultace@kamilrt.net @KamilRT Agenda 1. Windows as a Service
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationTechnical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform
Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationAgenda. 1 Intelligent Communications. 2 Considerations. 3 Partner Approach, Tools & Resources. 4 Partner Guidance & Checklist
Microsoft Teams: Agenda 1 Intelligent Communications 2 Considerations 3 Partner Approach, Tools & Resources 4 Partner Guidance & Checklist Microsoft Teams Communicate through chat, meetings & calls Collaborate
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationMicrosoft Office 365 ProPlus Introduction. 11/29/2017 Wednesday
Microsoft Office 365 ProPlus Introduction 11/29/2017 Wednesday Discussion Items Updates from Microsoft Background on the traditional version of Office The new version of Office (Office 365 ProPlus) Office
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationSurprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS
Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is
More informationA Risk Management Platform
A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationWinRunner to Functional Testing - License Migration Path
March 2008 Dear customer: HP Software is announcing the End of Support for HP WinRunner versions 7.5, 7.6, 8.0, 8.2, 9.2 - all versions, all editions (this message does not impact the end of support notification
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationMicrosoft Commitment to Interoperability. Michael Fortin Corporate Vice President, Windows Devices Group
Microsoft Commitment to Interoperability Michael Fortin Corporate Vice President, Windows Devices Group Guiding Principle for Interoperability Our goal is to ensure that third-party developers have access
More informationServices for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam
Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and
More informationMade for the way you work: Big ideas and innovation from Windows 10 and Lenovo
Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo When it comes to technology, leadership matters. Together, Windows 10 and Lenovo are giving organizations dependable solutions
More informationWS011 - Deploying and Managing Windows 10
presenta WS011 - Deploying and Managing Windows 10 Luca Portoni Premier Field Engineer www.wpc2015.it info@wpc2015.it - +39 02 365738.11 - #wpc15it 1 Windows 10 deployment scenarios OSDeployment: Enterprise
More informationEducation Brochure. Education. Accelerate your path to business discovery. qlik.com
Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills
More informationMD-101: Modern Desktop Administrator Part 2
Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationThe Red RepoRT: MAKING DESKTOP VIRTUALIZATION A REALITY. The Benefits The Approaches. The Challenges The Services VOL
The Red RepoRT: DesKtop virtualization VOL 02 The Benefits The Approaches The Challenges The Services MAKING A REALITY. ThoUSANdS of devices. hundreds of USeRS. ZeRo Time. MANAGING YOUR ENDPOINTS ExhAUSTS
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Digital Transformation Is Changing the Way that Applications Are Managed and Delivered To meet the growing challenges of a competitive
More informationDeploying Windows 10
Deploying Windows 10 Deploying Windows 10 Michael Niehaus Course Agenda Introducing Windows as a Service Deploying Windows 10 Staying Current with Windows as a Service Managing Windows 10 with System Center
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationContinuously Discover and Eliminate Security Risk in Production Apps
White Paper Security Continuously Discover and Eliminate Security Risk in Production Apps Table of Contents page Continuously Discover and Eliminate Security Risk in Production Apps... 1 Continuous Application
More informationOrganizational Readiness for Digital Transformation
IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationSan Francisco Department of Public Health. IT and Epic Project Update
San Francisco Department of Public Health IT and Epic Project Update Health Commission, April 16, 2019 IT: Infrastructure Accomplishments Sweeping Improvements Across DPH Thousands of devices are Epic
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationWindows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant
Windows 10 October 25, 2018 Helping you grow your business with Bruce Ward, VP of Business Strategy scalable IT services & solutions Dan Sharp, Senior Consultant for today s challenges & tomorrow s vision.
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationGetting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption
Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that
More informationBETTER Mobile Threat Defense (BMTD)
BETTER Mobile Threat Defense (BMTD) Powered by BETTER Mobile Security, Inc. Enterprise Challenges Today s enterprise IT managers are looking for better and more efficient ways to empower workforces utilizing
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationStandardizing Network Access Control: TNC and Microsoft NAP to Interoperate
Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate May 2007 Trusted Computing Group 3855 SW 153 rd Dr. Beaverton, OR 97006 TEL: (503) 619-0563 FAX: (503) 664-6708 admin@trustedcomputinggroup.org
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationHow to prepare for a seamless Windows 10 migration. Windows 7 end of support is due on January 14, are you ready?
How to prepare for a seamless Windows 10 migration Windows 7 end of support is due on January 14, 2020 - are you ready? Windows 10 has gained in popularity and in December 2018 three years after its initial
More informationBusiness today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT
Business today runs on technology 71% of surveyed internet, technology and social experts predict: In 2016, 82% of server workloads will be running in virtual environments. Total IT services spend: 45%
More informationInnovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant
1 Innovate or die!? Modern IT Workplace Security Alex Verboon Cyber Security Consultant Alex.verboon@basevision.ch Daniel Buehlmann Principal Workplace Consultant daniel.buehlmann@basevision.ch About Alex
More informationSDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS
January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.
More informationManaging the Microsoft Windows* Transition in Your Enterprise. October 2013
Managing the Microsoft Windows* Transition in Your Enterprise October 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
More informationInternet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi
Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.
More informationNational Cyber Security Operations Center (N-CSOC) Stakeholders' Conference
National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More information2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey
2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey Executive Summary This report illuminates IT trends and other key findings uncovered
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationCognizant Cloud Security Solution
CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationAny platform. Achieve more. Team agility
Every app Every developer Any platform Achieve more Team agility Java in Hosted Builds Azure Active Directory European Datacenter Service Hooks REST APIs Teams Kanban Updates Current iteration query
More informationHow to Evaluate a Next Generation Mobile Platform
How to Evaluate a Next Generation Mobile Platform appcelerator.com Introduction Enterprises know that mobility presents an unprecedented opportunity to transform businesses and build towards competitive
More informationVisual Studio Team Services
bgourley@microsoft.com Visual Studio Team Services Topics What are the current products What are Visual Studio Subscriptions Subscriber Benefits DevOps and VSTS VSTS licensing Developer Tools Deployment
More informationRED HAT INSIGHTS. Security & Proactive Response with Insights
RED HAT INSIGHTS Security & Proactive Response with Insights William Nix Principal Technical Marketing Manager Management Business Unit, Red Hat Insights WHY WE BUILT A NEW PRODUCT SECURITY IS RISK MANAGEMENT
More informationProduct Versioning and Back Support Policy
Effective March 18, 2016 to Feb 1, 2017 Product Versioning and Back Support Policy Definitions Semantic Versioning Date Based Versioning Standard Support Extended Support End of Life Support Critical Security
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Citrix.com ebook Align Cloud Strategy to Business Goals 1 Contents Digital transformation is changing the way that applications are
More informationSecurity Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response
Security Operations Flexible and Scalable Solutions to Improve Your Security Capabilities Security threats continue to rise each year and are increasing in sophistication and malicious intent. Unfortunately,
More informationPlease give me your feedback
#HPEDiscover Please give me your feedback Session ID: B4385 Speaker: Aaron Spurlock Use the mobile app to complete a session survey 1. Access My schedule 2. Click on the session detail page 3. Scroll down
More informationbenefits for customers with subscriptions in CSP
Windows 10 upgrade benefits for customers with subscriptions in CSP Windows 10 upgrade benefits for customers Resources and guidance for organizations upgrading from Windows 7 and Windows 8/8.1 with subscriptions
More informationNetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.
NetWitness Overview 1 The Current Scenario APT Network Security Today Network-layer / perimeter-based Dependent on signatures, statistical methods, foreknowledge of adversary attacks High failure rate
More informationOracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You?
Oracle Applications in a Changing Business World Legacy Oracle Applications Won't Be Around Forever. Will You? Ross Smith Chief Architect July 7, 2017 2 Oracle Applications in a Changing Business World
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationTHE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE
THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationTESTING TRENDS FOR 2018
February Sponsored by Dimensional Research February Introduction In the early days of software when an application ran on one platform and one type of machine with few variables, testing was a relatively
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More information