Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect

Size: px
Start display at page:

Download "Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect"

Transcription

1 Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit Alan Maddison, Architect Amit Bhatia, Architect

2 Why did we create the Assessment kit?

3 Assessment objectives Assess customer s environment to maximize their benefits Pre-sales (managed service) conversation Engage your customer on Modern Windows and Office Partner monetization opportunity Sales opportunity as a standalone workshop Educate your customer on deploying and staying up to date Assess the customer s environment to help drive the need to move to Modern Windows and Office Incorporate as discovery phase of design and deployment opportunity Leverage as part of selling a managed service

4 Assessment content

5 Assessment content Microsoft 365 Powered Device Assessment: Overview & Delivery Timelines Guide Microsoft 365 Powered Device Assessment: Assessment Goals & Introduction Deck Microsoft 365 Powered Device Assessment: Introduction to Windows Analytics Deck Microsoft 365 Powered Device Assessment: Partner Delivery Guide Microsoft 365 Powered Device Assessment: Findings & Recommendations Deck

6 Overview & Delivery Timelines Guide

7 Summary and Timelines Summary and Timelines Summary of assessment Guidelines for delivery scheduling and timing

8 Assessment Goals & Introduction Deck

9 Goals of the assessment Steps in the assessment What does it mean to deploy Modern Windows and Office? Why should you deploy Modern Windows and Office? What does it mean to stay up to date? How do you stay up to date?

10 Goals of the assessment Assess your environment to maximize your benefits Make sure your environment is secure Understand the Windows operating systems deployed in your environment Understand what Office applications are installed on your desktops Learn what is required to achieve a more secure environment Make sure you are prepared for end of life Windows 7 extended support ends January 2020 Office 2010 extended support ends October 2020 Starting October 2020, only Office 365 ProPlus and Office desktop clients in mainstream support will be able to connect to Office 365 services Keeping your users productive Ensure less user disruption to increases productivity Make sure your users have access to the latest features and functionality Leverage the latest hardware

11 Assessment steps Introduce Modern Windows and Office Introduce Windows Analytics Deploy and configure Windows Analytics Windows Analytics data analysis Findings and recommendations

12 What does it mean to deploy Modern Windows and Office and stay up to date? Deploy Modern Windows and Office Stay up to date Deploy monthly quality updates Move to latest build of Windows 10 Move to latest build of Office 365 ProPlus Deploy feature updates every 6-12 months Windows Analytics for monitoring and reporting

13 Why should you deploy Modern Windows and Office & Stay up to date? The benefits Deploy Modern Windows and Office Security Windows 10 is the most secure version of Windows yet and includes advanced security features for added protection End of life Windows 7 extended support ends January 14th, 2020 Office 2010 extended support ends October 13th, Beginning in October 2020, only Office 365 ProPlus and Office desktop clients in mainstream support will be able to connect to Office 365 services. Stay up to date Security New security features added with every semi-annual release of Windows 10 & Office 365 ProPlus to stay ahead of attackers 18 months support for each feature release Simplify management Move from project to process Increase user productivity: reduced user disruption & new feature enhancements twice per year Support for hardware innovation

14 What does it mean to stay up to date? FEATURE UPDATE Always up to date for latest productivity and security capabilities and hardware support AGILE UPDATE CYCLE From project to process to simplify the deployment process and reduce disruption FEATURE UPDATE 2 FEATURE UPDATES PER YEAR

15 Staying up to date Key things to know about staying up to date Predictable releases, twice per year Semi-Annual Channel Windows Aligned with Office For simpler deployment planning Office 365 ProPlus Windows 10 Office 365 ProPlus Windows 10 Each serviced for 18 months From the date of release Office 365 ProPlus

16 C A P A B I L I T Y Staying secure with Windows 10 Attackers take advantage of periods between releases Stay ahead of the attackers with continual Windows 10 improvements Protection gap T I M E P R O D U C T R E L E A S E T H R E A T S O P H I S T I C A T I O N

17 18 month servicing and support Windows End of Support Extended Support Office 365 ProPlus 1708 End of Support End of Support No security updates No bug fixes No technical support for builds out of support

18 Office 365 ProPlus staying up to date Security Simplified management User productivity Security and non-security changes provided monthly Updates are cumulative Smaller, easily managed updates instead of large, complex upgrades Smaller download sizes for upgrades when you stay up to date Value delivered faster, with less impact on users 120+ new features since the last release of Office Professional Existing features are enhanced and more reliable

19 Compatibility in Windows 10 Desktop apps Web sites Modern apps Hardware Organizations are observing compatibility rates above 99% High compatibility achieved through: Minimal changes to Win32 APIs Insider feedback during development Telemetry Internet Explorer 11 included (unchanged) for backwards compatibility New Microsoft Edge browser for modern HTML5-based web sites Enterprise Mode features to ensure proper use High compatibility achieved through: Validation of Windows Store apps Insider feedback during development Telemetry Significant investments, enhancements in each release Windows 10 supports all devices capable of running Windows 7 and above Identical hardware minimum requirements as Windows 7 Strong driver compatibility, with updates delivered as needed through Windows Update

20 NUMBER OF DEVICES How to stay up to date -Windows 10 servicing channels Plan and Prepare Windows Insider Preview Channel Targeted Pilot Semi-Annual Channel Broadly Deploy Semi-Annual Channel Ensure new release works with business-critical apps, core infrastructure tools Provide feedback on any issues encountered Validate applications, infrastructure, and hardware to prepare for broad deployment Lab machines, IT devices, developers Early adopters, volunteers Information workers General population TIME Release Supported for 18 months

21 Windows 10 deployment ring example Plan and Prepare Targeted Pilot Validation Preview Canary Self- Select Sample Validate Deploy critical and Use business applications on non-production Target additional devices 4-6% prior of users to in general Target 2-3% availability of users in all all departments and include critical departments to continue validation Who machines to continue validation Who Workstation Who Engineers Volunteer users representative of Application Additional owners production users departments High-level Critical IT admins machines Broad What What What Validate proper operation of Validate Validate for driver/software proper operation issuesof commonly used applications Validate commonly proper operation used applications Report issues to IT Workstation Validate Report application issues compatibility to IT Workstation Engineering Team Provide Engineering feedback to Team Microsoft and vendor(s) Conceptual illustration only

22 NUMBER OF DEVICES How to stay up to date O365 ProPlus update channels Plan and Prepare Monthly Channel Targeted Pilot Semi-Annual Channel (Targeted) Broadly Deploy Semi-Annual Channel Provide the newest features of Office as soon as they re available Provide feedback on any issues encountered Validate line-of-business applications, macros, and add-ins to prepare for broad deployment IT Pros and Developers Representative sample of environment All remaining devices TIME Release Supported for 6 months Release Supported for 14 months

23 Office 365 ProPlus deployment rings Plan and Prepare Targeted Pilot Validation Monthly Validation Broad Target a representative sample to validate Assess new Deploy features and Use against organizational and validate environment against prior organizational to Semi-Annual environment Channel prior release to Semi-Annual Channel (Targeted) release Who Who Workstation Engineers Workstation Engineers Application owners Application owners High-level IT admins High-level IT admins 10% of production devices per Device What Profile Assess new features What Validate macros, add-ins, and LOB app Validate macros, add-ins, and LOB app compatibility compatibility Validate proper operation of Office Validate proper operation of Office Provide feedback to Microsoft Provide feedback to Microsoft *Conceptual illustration only

24 Introduction to Windows Analytics Deck What is Windows Analytics? Why use Windows Analytics? How do you use Windows Analytics? Sample assessment results

25 Introduce Windows Analytics Introduce Windows Analytics Provide an overview of Windows Analytics Use Windows Analytics to engage customers about Modern Windows and Office Walkthrough sample assessment findings

26 What is Windows Analytics?

27 Why use Windows Analytics? Pull together key information Telemetry-based app and device inventory Establish a process Prioritize tasks Identify issues Drive deployment Identify machines that are ready to deploy

28 Why use Windows Analytics? Pull together key information Telemetry-based patch and update inventory Establish a process Identify issues Remediate using provided information Drive deployment Identify machines that are ready to deploy Integrate with need to be patched or updated

29 Partner Delivery Guide

30 Partner Delivery Guide Partner Delivery Guide Detailed deployment and configuration steps for Windows Analytics Understand how to use Windows Analytics to engage customers about Modern Windows and Office Leverage data from Upgrade Readiness and Update Compliance to drive the conversation

31 Findings & Recommendations Deck

32 Assessment results Deploy Modern Windows and Office Identify device operating system Understand versions of OS deployed Windows 7, Windows 8 or Windows 10 Identify Office versions Understand what versions of Office are deployed ProPlus or Perpetual Device and application summary Device and application count Identify applications and drivers Telemetry-based app and driver inventory App usage and support info from Ready For Windows Identify hardware inventory Leverage hardware inventory to drive hardware refresh 32

33 Assessment results Stay up to date Identify device operating system By leveraging Update Compliance, it is possible to identify which devices are running which build of Windows 10. This information includes both feature releases and quality updates. Identify Office versions Leverage the data available as part of Upgrade readiness to ensure that ALL devices are running the latest feature release of Office 365 ProPlus. Applications and drivers Early testing of critical applications as part of deployment rings for feature releases Remediation before broad deployment Windows Defender AV status Update Compliance will provide important insights into helping identify if their AV signatures are current.

34 Findings Device Operating System Findings Key insights Action

35 Findings Applications and drivers Findings Key insights Action

36 Findings Update Compliance Overview Findings Action

37 Windows Analytics Resources Windows Analytics Overview: Analytics-Overview-Decks/m-p/173891#M1 Windows Analytics Configuration: Windows Analytics Extensibility: Analytics-Extensibility/m-p/176068#M2 Windows Analytics FAQ: 37

38 Microsoft 365 powered device Resources Partner website: aka.ms/m365powereddevice Partner playbook: aka.ms/m365powereddeviceplaybook Partner video trainings: aka.ms/powereddevicetrainingvideos 38

39 Microsoft 365 powered device Resources Link to Webinar On-demand Videos: 39

40 Coming up Session on 4/24 Windows Advanced Threat Protection (ATP) Overview and Updates Our customers are facing a difficult threat landscape; today s solutions are helping but they are nowhere near complete. Windows Defender ATP is a unified endpoint security platform that helps stop breaches. Threat & exploit protection, Endpoint Detection and Response (EDR), and Automation all under one roof, for better protection, detection, investigation and response. With the next Windows release, many new and enhanced capabilities become available. Come and explore those with us. Please Register!

41 Partner Q&A

M365 Powered Device Proof of Concept

M365 Powered Device Proof of Concept M365 Powered Device Proof of Concept 365 A complete, intelligent, secure solution to empower employees Office 365 Windows 10 Enterprise Mobility + Security Modern IT Multiple Device Platforms User and

More information

Accelerate Windows 10 deployments through telemetry driven insights using Upgrade Analytics

Accelerate Windows 10 deployments through telemetry driven insights using Upgrade Analytics Accelerate Windows 10 deployments through telemetry driven insights using Upgrade Analytics Kim Kaae, Windows TSP, Microsoft Denmark +400M D E V I C E S R U N N I N G W I N D O W S 1 0 +52M I N BUSINESS

More information

Adnan Cloud Solutions Architect. SAFFA living in Netherlands, work globally. Microsoft Trainer +25y (xrl MSLearning)

Adnan Cloud Solutions Architect. SAFFA living in Netherlands, work globally. Microsoft Trainer +25y (xrl MSLearning) Adnan Hendricks Cloud Solutions Architect SAFFA living in Netherlands, work globally Microsoft Trainer +25y (xrl MSLearning) Microsoft MVP + 5 Years @Microspecialist Adnan@ microspecialistconsulting.com

More information

Quo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,

Quo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory, Quo vadis? System Center Configuration Manager Full managed desktop Mobile device management Light managed device policies, inventory, Hybrid management One pane of glass Integration of mobile device management

More information

Customer Success with Windows as a Service. John Cable Windows Servicing and Delivery

Customer Success with Windows as a Service. John Cable Windows Servicing and Delivery Customer Success with Windows as a Service John Cable Windows Servicing and Delivery Windows as a service A single cumulative update each month with no new features Twice per year with new capabilities

More information

Keeping Current with Windows 10. Jon Anderson Senior Systems Consultant, Now Micro December 5 th, 2018

Keeping Current with Windows 10. Jon Anderson Senior Systems Consultant, Now Micro December 5 th, 2018 Keeping Current with Windows 10 Jon Anderson Senior Systems Consultant, Now Micro December 5 th, 2018 Device Lifecycle Company Hardware Reseller (Dell, HP, Lenovo, and more) OEM (Digital Signage, Kiosks,

More information

A tale of Modern Management Part 1

A tale of Modern Management Part 1 A tale of Modern Management Part 1 Speaker introduction @JankeSkanke @okieselb jan.ketil.skanke@cloudway.no oliver.kieselbach@glueckkanja.com Principal Cloud Architect - CloudWay Lead Cloud Architect Glück

More information

9 Years in Consulting. Broad experience in Microsoft Infrastructure solutions. Specialised in Windows 10 & Surface familly

9 Years in Consulting. Broad experience in Microsoft Infrastructure solutions. Specialised in Windows 10 & Surface familly About 9 Years in Consulting Broad experience in Microsoft Infrastructure solutions Specialised in Windows 10 & Surface familly We know Windows XP Windows 7 wasn t easy It often took between 3-7 years!

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Renault-Nissan EUC «as a service»

Renault-Nissan EUC «as a service» experiences.microsoft.fr Microsoft Windows, Office 365 and SCCM alignement Renault-Nissan EUC context The project stakes, scope and user benefits WAAS and deployment rings Roadmaps User journey to the

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

Improve productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager

Improve productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager Improve productivity with modernized PCs and Windows 10 Christopher Choong, DTM Field Marketing Manager Impressive innovation. Inside and out. 3 4 It s an important time to refresh Design Every product

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

M365 Powered Device Proof of Concept Overview

M365 Powered Device Proof of Concept Overview M365 Powered Device Proof of Concept Overview Describe how modern desktop will support your business Explore the latest devices Learn about privacy and diagnostic data Challenges Modern Desktop Devices

More information

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education Datacenter Management and The Private Cloud Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education System Center Helps Deliver IT as a Service Configure App Controller Orchestrator Deploy

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Co se změnilo ve Windows 10 z pohledu IT administrátora

Co se změnilo ve Windows 10 z pohledu IT administrátora Co se změnilo ve Windows 10 z pohledu IT administrátora Kamil Roman MCSE: Mobility MCSE: Cloud Platform and Infrastructure MCSA MCITP MCT konzultace@kamilrt.net @KamilRT Agenda 1. Windows as a Service

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Agenda. 1 Intelligent Communications. 2 Considerations. 3 Partner Approach, Tools & Resources. 4 Partner Guidance & Checklist

Agenda. 1 Intelligent Communications. 2 Considerations. 3 Partner Approach, Tools & Resources. 4 Partner Guidance & Checklist Microsoft Teams: Agenda 1 Intelligent Communications 2 Considerations 3 Partner Approach, Tools & Resources 4 Partner Guidance & Checklist Microsoft Teams Communicate through chat, meetings & calls Collaborate

More information

Data Virtualization Implementation Methodology and Best Practices

Data Virtualization Implementation Methodology and Best Practices White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

Microsoft Office 365 ProPlus Introduction. 11/29/2017 Wednesday

Microsoft Office 365 ProPlus Introduction. 11/29/2017 Wednesday Microsoft Office 365 ProPlus Introduction 11/29/2017 Wednesday Discussion Items Updates from Microsoft Background on the traditional version of Office The new version of Office (Office 365 ProPlus) Office

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

WinRunner to Functional Testing - License Migration Path

WinRunner to Functional Testing - License Migration Path March 2008 Dear customer: HP Software is announcing the End of Support for HP WinRunner versions 7.5, 7.6, 8.0, 8.2, 9.2 - all versions, all editions (this message does not impact the end of support notification

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

Microsoft Commitment to Interoperability. Michael Fortin Corporate Vice President, Windows Devices Group

Microsoft Commitment to Interoperability. Michael Fortin Corporate Vice President, Windows Devices Group Microsoft Commitment to Interoperability Michael Fortin Corporate Vice President, Windows Devices Group Guiding Principle for Interoperability Our goal is to ensure that third-party developers have access

More information

Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam

Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and

More information

Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo

Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo When it comes to technology, leadership matters. Together, Windows 10 and Lenovo are giving organizations dependable solutions

More information

WS011 - Deploying and Managing Windows 10

WS011 - Deploying and Managing Windows 10 presenta WS011 - Deploying and Managing Windows 10 Luca Portoni Premier Field Engineer www.wpc2015.it info@wpc2015.it - +39 02 365738.11 - #wpc15it 1 Windows 10 deployment scenarios OSDeployment: Enterprise

More information

Education Brochure. Education. Accelerate your path to business discovery. qlik.com

Education Brochure. Education. Accelerate your path to business discovery. qlik.com Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills

More information

MD-101: Modern Desktop Administrator Part 2

MD-101: Modern Desktop Administrator Part 2 Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

The Red RepoRT: MAKING DESKTOP VIRTUALIZATION A REALITY. The Benefits The Approaches. The Challenges The Services VOL

The Red RepoRT: MAKING DESKTOP VIRTUALIZATION A REALITY. The Benefits The Approaches. The Challenges The Services VOL The Red RepoRT: DesKtop virtualization VOL 02 The Benefits The Approaches The Challenges The Services MAKING A REALITY. ThoUSANdS of devices. hundreds of USeRS. ZeRo Time. MANAGING YOUR ENDPOINTS ExhAUSTS

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Digital Transformation Is Changing the Way that Applications Are Managed and Delivered To meet the growing challenges of a competitive

More information

Deploying Windows 10

Deploying Windows 10 Deploying Windows 10 Deploying Windows 10 Michael Niehaus Course Agenda Introducing Windows as a Service Deploying Windows 10 Staying Current with Windows as a Service Managing Windows 10 with System Center

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Managed Endpoint Defense

Managed Endpoint Defense DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Continuously Discover and Eliminate Security Risk in Production Apps

Continuously Discover and Eliminate Security Risk in Production Apps White Paper Security Continuously Discover and Eliminate Security Risk in Production Apps Table of Contents page Continuously Discover and Eliminate Security Risk in Production Apps... 1 Continuous Application

More information

Organizational Readiness for Digital Transformation

Organizational Readiness for Digital Transformation IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

San Francisco Department of Public Health. IT and Epic Project Update

San Francisco Department of Public Health. IT and Epic Project Update San Francisco Department of Public Health IT and Epic Project Update Health Commission, April 16, 2019 IT: Infrastructure Accomplishments Sweeping Improvements Across DPH Thousands of devices are Epic

More information

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone

More information

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant Windows 10 October 25, 2018 Helping you grow your business with Bruce Ward, VP of Business Strategy scalable IT services & solutions Dan Sharp, Senior Consultant for today s challenges & tomorrow s vision.

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that

More information

BETTER Mobile Threat Defense (BMTD)

BETTER Mobile Threat Defense (BMTD) BETTER Mobile Threat Defense (BMTD) Powered by BETTER Mobile Security, Inc. Enterprise Challenges Today s enterprise IT managers are looking for better and more efficient ways to empower workforces utilizing

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate May 2007 Trusted Computing Group 3855 SW 153 rd Dr. Beaverton, OR 97006 TEL: (503) 619-0563 FAX: (503) 664-6708 admin@trustedcomputinggroup.org

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

How to prepare for a seamless Windows 10 migration. Windows 7 end of support is due on January 14, are you ready?

How to prepare for a seamless Windows 10 migration. Windows 7 end of support is due on January 14, are you ready? How to prepare for a seamless Windows 10 migration Windows 7 end of support is due on January 14, 2020 - are you ready? Windows 10 has gained in popularity and in December 2018 three years after its initial

More information

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT Business today runs on technology 71% of surveyed internet, technology and social experts predict: In 2016, 82% of server workloads will be running in virtual environments. Total IT services spend: 45%

More information

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant 1 Innovate or die!? Modern IT Workplace Security Alex Verboon Cyber Security Consultant Alex.verboon@basevision.ch Daniel Buehlmann Principal Workplace Consultant daniel.buehlmann@basevision.ch About Alex

More information

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.

More information

Managing the Microsoft Windows* Transition in Your Enterprise. October 2013

Managing the Microsoft Windows* Transition in Your Enterprise. October 2013 Managing the Microsoft Windows* Transition in Your Enterprise October 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

More information

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey Executive Summary This report illuminates IT trends and other key findings uncovered

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

RSA NetWitness Suite Respond in Minutes, Not Months

RSA NetWitness Suite Respond in Minutes, Not Months RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Cognizant Cloud Security Solution

Cognizant Cloud Security Solution CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Any platform. Achieve more. Team agility

Any platform. Achieve more. Team agility Every app Every developer Any platform Achieve more Team agility Java in Hosted Builds Azure Active Directory European Datacenter Service Hooks REST APIs Teams Kanban Updates Current iteration query

More information

How to Evaluate a Next Generation Mobile Platform

How to Evaluate a Next Generation Mobile Platform How to Evaluate a Next Generation Mobile Platform appcelerator.com Introduction Enterprises know that mobility presents an unprecedented opportunity to transform businesses and build towards competitive

More information

Visual Studio Team Services

Visual Studio Team Services bgourley@microsoft.com Visual Studio Team Services Topics What are the current products What are Visual Studio Subscriptions Subscriber Benefits DevOps and VSTS VSTS licensing Developer Tools Deployment

More information

RED HAT INSIGHTS. Security & Proactive Response with Insights

RED HAT INSIGHTS. Security & Proactive Response with Insights RED HAT INSIGHTS Security & Proactive Response with Insights William Nix Principal Technical Marketing Manager Management Business Unit, Red Hat Insights WHY WE BUILT A NEW PRODUCT SECURITY IS RISK MANAGEMENT

More information

Product Versioning and Back Support Policy

Product Versioning and Back Support Policy Effective March 18, 2016 to Feb 1, 2017 Product Versioning and Back Support Policy Definitions Semantic Versioning Date Based Versioning Standard Support Extended Support End of Life Support Critical Security

More information

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1 The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Citrix.com ebook Align Cloud Strategy to Business Goals 1 Contents Digital transformation is changing the way that applications are

More information

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response Security Operations Flexible and Scalable Solutions to Improve Your Security Capabilities Security threats continue to rise each year and are increasing in sophistication and malicious intent. Unfortunately,

More information

Please give me your feedback

Please give me your feedback #HPEDiscover Please give me your feedback Session ID: B4385 Speaker: Aaron Spurlock Use the mobile app to complete a session survey 1. Access My schedule 2. Click on the session detail page 3. Scroll down

More information

benefits for customers with subscriptions in CSP

benefits for customers with subscriptions in CSP Windows 10 upgrade benefits for customers with subscriptions in CSP Windows 10 upgrade benefits for customers Resources and guidance for organizations upgrading from Windows 7 and Windows 8/8.1 with subscriptions

More information

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved. NetWitness Overview 1 The Current Scenario APT Network Security Today Network-layer / perimeter-based Dependent on signatures, statistical methods, foreknowledge of adversary attacks High failure rate

More information

Oracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You?

Oracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You? Oracle Applications in a Changing Business World Legacy Oracle Applications Won't Be Around Forever. Will You? Ross Smith Chief Architect July 7, 2017 2 Oracle Applications in a Changing Business World

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

TESTING TRENDS FOR 2018

TESTING TRENDS FOR 2018 February Sponsored by Dimensional Research February Introduction In the early days of software when an application ran on one platform and one type of machine with few variables, testing was a relatively

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information