Kā pielāgot uzņēmuma IT mūsdienu prasībām: jauni izaicinājumi un iespējas

Size: px
Start display at page:

Download "Kā pielāgot uzņēmuma IT mūsdienu prasībām: jauni izaicinājumi un iespējas"

Transcription

1

2 Kā pielāgot uzņēmuma IT mūsdienu prasībām: jauni izaicinājumi un iespējas

3 Mārtiņš Jirgensons Mākoņpakalpojumu biznesa attīstības vadītājs

4 Pasaule ir mainījusies.

5

6

7

8 Ja «uzbrucējs» nosūtīs e-pasta vēstuli jūsu uzņēmuma 100 darbiniekiem 23 darbinieki to atvērs 11 darbinieki atvērs arī pielikumu un seši to izdarīs pirmās stundas laikā.

9

10 Mūsdienīgs IT Tradicionālais IT Cloud

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37 Darba faili uz personīgajām iekārtām? Darbinieks aiziet no uzņēmuma? Nozagta vai pazaudēta iekārta? Vai Windows ir atjaunināts? Vai Office ir atjaunināts? Vai iekārtas ir drošībā?

38 Microsoft 365 Aizsargājiet ierīcēs glabātos uzņēmuma datus, pārvaldiet lietotājus un ierīces. Office 365 Windows 10 Enterprise Mobility + Security

39 Microsoft 365

40 Microsoft 365 Microsoft 365 E5 Microsoft 365 E3 Microsoft 365 F1 Microsoft 365 Business Microsoft 365 Education

41 Microsoft 365 Business Office 365 Business Premium eur Microsoft 365 Business eur Saziņa un informācijas koplietošana Outlook, Sharepoint, IM/Meetings X X OneDrive X X Office programmas Word, Excel, PowerPoint, OneNote, Access X X Listings 1, Connections 1 X X Biznesa lietojumprogrammas Bookings, Outlook Customer Manager X X Invoicing 1, MileIQ 1, Business Center 1 X X Aizsardzība pret drošības apdraudējumiem Upgrade rights to Windows 10 Pro, Windows Defender Selective data wipe, Security Group targeting of policies, MAM for Office Apps X X Ierīču un programmu pārvaldīšana Auto- pilot, Automatic Office Install MDM for Win 10 devices, MDM Auto-enroll X X 1 lietojumprogramma pašlaik ir pieejama tikai klientiem ASV, Lielbritānijā un Kanādā.

42

43

44

45

46

47

48

49

50

51

52 Ar Microsoft 365 aprīkota iekārta Ērti uzstādīt un pārvaldīt Jaunākās versijas programmatūrai Savlaicīga problēmu novēršana Iebūvēta aizsardzība

53 Ar Microsoft 365 Business aprīkota iekārta, kā pakalpojums MICROSOFT Surface Pro Intel Core 7th-generation i5 12.3, 8GB, 256GB Intel HD Graphics 85,- eur / mēnesī LENOVO ThinkPad E580 i5-8250u 15.6 FHD IPS AG 8GB, 256GB Intel HD Graphics 55,- eur / mēnesī Cenā ir iekļauts: Windows 10 Pro + Office 365 Business Premium + Enterprise Mobility + Security

54

55

56

57

58 GDPR Product Mapping: Office Discover Right to Erasure Right to Data Portability Manage Documentation Privacy by Design Protect Data Security Data Transfer Report Documentation Breach Response and Notification Security & Compliance Center A one-stop portal for protecting your data in Office 365. Grant permissions to people who perform compliance tasks. Data Loss Prevention Unified policies covering client end-points, empowering IT pros Advanced Data Governance* Classify, preserve and/or purge data based on automatic analysis and policy recommendations Content search run very large searches across mailboxes, public folders, Office 365 Groups, Microsoft Teams, SharePoint Online sites, One Drive for Business locations, and Skype for Business conversations Data Governance archive and preserve content in Exchange Online mailboxes, SharePoint Online sites, and OneDrive for Business locations, and import data into your Office 365 organization. Threat Management helps you control and manage mobile device access to your organization's data, help protect your organization from data loss, and help protect inbound and outbound messages from malicious software and spam Audit Logs record and search desired user and admin activity across your organization ediscovery use cases to manage access, place a hold on content locations relevant to the case, associate multiple Content Searches with the case, and export search results Mail Flow Rules look for specific conditions in messages that pass through your organization and take action on them. Advanced Threat Protection provides security functions that protect user environments that contain consumer data including Safe Attachments & Safe Links Service Assurance deep insights for conducting risk assessments with details on Microsoft Compliance reports and transparent status of audited controls. Advanced ediscovery* significantly reduce cost and effort to identify relevant documents & data relationships by using machine learning to train the system to intelligently explore large datasets Azure Information Protection prevent sensitive information from being printed, forwarded, saved, edited, or copied by unauthorized people Threat Intelligence* analyze and understand their local threat environment, including malware detected, targeted users, and links to global security stats Customer Lockbox* control how a Microsoft support engineer accesses your data during a help session Cloud Application Security gain enhanced visibility and granular security controls and policies including the ability to block access to unmanaged cloud applications Journaling in Exchange Online respond to legal, regulatory, and compliance requirements by recording inbound and outbound communications. Advanced Security Management* gain enhanced visibility and granular security controls and policies including the ability to suspend user accounts, revoking access to personal data Information management policies With SharePoint Online, control how long to retain content, to audit what people do with content, and to add barcodes or labels to documents Secure Score insights into your security position and what features are available to reduce risk while balancing productivity and security Azure Identity Protection advanced risk based identity protection with alerts, analysis, & remediation.

59 GDPR Product Mapping: Windows Discover Right to Erasure Right to Data Portability Content Search Using PowerShell, administrators can search for and identify personal data in some file types in local- or connected-storage. Manage Documentation Privacy by Design Data Governance using Windows permissions administrators can manage and govern access to personal data. Protect Data Security Data Transfer Strong authentication Windows Hello replaces passwords with strong two-factor authentication, tied to a device and uses a biometric or PIN. Identity Protection Credential Guard prevents credential theft attacks such as Passthe-Hash or Pass-The-Ticket attacks by isolate secrets so that only privileged system software can access them Run trusted software Device Guard leverages advanced hardware features to only apps authorized by your enterprise Protect data at rest Bitlocker helps ensure that data that is stored on a computer is not revealed if the computer is tampered with when the installed operating system is offline Information Protection Windows Information Protection helps to protect against accidental data leakage without interfering with the employee experience Breach Response Windows Defender Advanced Threat Protection (ATP) helps enterprise customers to detect, investigate, and respond to advanced and targeted attacks. Threat Resistance Windows Defender Antivirus and SmartScreen help to protect against malicious files, phishing or malware websites. Report Documentation Breach Response and Notification Auditing and Logging provide rich and detailed raw data that can be forwarded into other solutions for deeper analysis or compliance reporting. Breach Detection, Investigation & Response Windows Defender Advanced Threat Protection (ATP) helps enterprise customers to detect, investigate, and respond to advanced and targeted attacks. Information Protection Windows Information Protection helps to protect against accidental data leakage without interfering with the employee experience Remote Wipe Remote Wipe protects data with remote wipe, lock, or passcode reset

60 3-e f-ab1a-53c03d0fefca&msppid=

61 Mārtiņš Jirgensons Mākoņpakalpojumu biznesa attīstības vadītājs

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2, IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats

More information

Microsoft Office 365 Business Plans

Microsoft Office 365 Business Plans Microsoft Business Plans Run your business more easily with. Get everything you need to get work done anytime, anywhere. Business Essentials Business Business Premium $7.50 versions of Office with email

More information

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law. Businesses and users are

More information

Business Essentials Business Business Premium

Business Essentials Business Business Premium Business Essentials Business Business Premium Best for businesses that need business email and other business services. Office applications not included. Office applications Best for businesses that need

More information

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General

More information

MODERN DESKTOP SECURITY

MODERN DESKTOP SECURITY MODERN DESKTOP SECURITY I M GOING TO BE HONEST. WE RE IN THE FIGHT OF OUR DIGITAL LIVES, AND WE ARE NOT WINNING! M I C H A E L M C C A U L, C H A I R M A N, U S H O M E L A N D S E C U R I T Y C O M M

More information

Enterprise Ransomware Mitigations

Enterprise Ransomware Mitigations 打造數碼安全校園 Enterprise Ransomware Mitigations Windows 10, Edge Browser, Office ATP Enterprise Mobility Suite (EMS) ATP OneDrive for Business Azure Backup 3rd party Cloud Backup THE WINDOWS CLIENT DEFENSE

More information

WINDOWS 10 ENTERPRISE New Security Features

WINDOWS 10 ENTERPRISE New Security Features WINDOWS 10 ENTERPRISE New Security Features J. Abernethy mindshift Technologies Josh Quinn mindshift Technologies #ILTALSS #LSS26 TODAY S AGENDA Windows 10 Security Fundamentals Managing Windows 10 Security

More information

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity 2x 50% 5x Microsoft 365 A complete, intelligent, secure solution to empower employees Unlocks creativity Built for teamwork Integrated for simplicity Intelligent security Inner Loop Files Sites Content

More information

Office 365 for businesses. Stay connected on the go

Office 365 for businesses. Stay connected on the go Office 365 for businesses Stay connected on the go Welcome to Office 365 Office 365 is a cloud-based service hosted by Microsoft that brings together familiar Microsoft Office desktop applications with

More information

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway This presentation is intended to provide an overview of GDPR and is not a definitive statement

More information

MD-101: Modern Desktop Administrator Part 2

MD-101: Modern Desktop Administrator Part 2 Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has

More information

[ Sean TrimarcSecurity.com ]

[ Sean TrimarcSecurity.com ] Securing the Microsoft Cloud (Office 365 & Azure AD) Sean Metcalf Founder, Trimarc Presenter bio Sean Metcalf Founder & CTO, Trimarc One of ~100 people globally who holds the Microsoft Certified Master

More information

Maintain Data Control and Work Productivity

Maintain Data Control and Work Productivity DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Office 365: Modern Workplace

Office 365: Modern Workplace Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters

More information

HIPAA Compliance. with O365 Manager Plus.

HIPAA Compliance. with O365 Manager Plus. HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

The Economics of Office YTD Net Promoter Score. Microsoft Office365 10/20/2017. Paul Hoffman, CPA, CITP, CGMA CEO/President of SouthTech

The Economics of Office YTD Net Promoter Score. Microsoft Office365 10/20/2017. Paul Hoffman, CPA, CITP, CGMA CEO/President of SouthTech The Economics of Office 365 Paul Hoffman, CPA, CITP, CGMA CEO/President of SouthTech 98 % Retention Rate Under 10 Seconds Time to Tech 54% of Issues Resoloved in Less than 1 Hour Resolution 90.6 YTD Net

More information

Securing Office 365 with SecureCloud

Securing Office 365 with SecureCloud Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest

More information

CloudSOC and Security.cloud for Microsoft Office 365

CloudSOC and  Security.cloud for Microsoft Office 365 Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed

More information

Enabling Office 365 Services (347)

Enabling Office 365 Services (347) Enabling Office 365 Services (347) Manage clients and end-user devices Manage user-driven client deployments Restrict self-provisioning of Office 365 ProPlus, Windows Store Apps and Mobile Apps, activation/revoke

More information

SMS - GUI003. GDPR Information. Release Certificate SMS - GUI003. Version: 1.0 Date: 27/03/2018 Page 1 of 25

SMS - GUI003. GDPR Information. Release Certificate SMS - GUI003. Version: 1.0 Date: 27/03/2018 Page 1 of 25 SMS - GUI003 GDPR Information Release Certificate Status of this Document: Approved Document Version: 1.0 Release Date: 27/03/2018 Version: 1.0 Date: 27/03/2018 Page 1 of 25 Document Control Title: SMS

More information

Securing the New Perimeter:

Securing the New Perimeter: Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size

More information

GLBA Compliance. with O365 Manager Plus.

GLBA Compliance. with O365 Manager Plus. GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System Collect Learn Today Cards What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters

More information

FISMA Compliance. with O365 Manager Plus.

FISMA Compliance. with O365 Manager Plus. FISMA Compliance with O365 Manager Plus www.o365managerplus.com About FISMA The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement

More information

6 Ways Office 365 Keeps Your and Business Secure

6 Ways Office 365 Keeps Your  and Business Secure 6 Ways Office 365 Keeps Your Email and Business Secure Acora House, Albert Drive, Burgess Hill, West Sussex, RH15 9TN T: +44 (0) 844 264 2222 W: acora.com E: sales@acora.com Introduction Microsoft have

More information

Use EMS to protect your mobile data and mobile app

Use EMS to protect your mobile data and mobile app Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal. pds@ctglobalservices.com PETER DAALMANS Enterprise Mobility MVP @ CTGlobal Blog: https://peterdaalmans.com

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Windows 10 Security & Audit

Windows 10 Security & Audit Windows 10 Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC, CSX-P jtannahi@rogers.com Windows 10 Editions Home Pro Enterprise Education Mobile IoT Editions 1 Windows 10 Builds Windows 10 (initial

More information

Windows 10 for enterprise. Pramiti Bhatnagar

Windows 10 for enterprise. Pramiti Bhatnagar Windows 10 for enterprise Pramiti Bhatnagar The intelligent platform designed for today Windows 10 Intelligent security Simplified updates Flexible management Enhanced productivity Intelligent security

More information

Liquid Telecom Microsoft Partnership

Liquid Telecom Microsoft Partnership Liquid Telecom Microsoft Partnership Liquid Telecom is now an official Microsoft Cloud Services Provider. As an official CSP partner, Liquid Telecom will for the first time serve businesses of all sizes

More information

NaviSite Managed Office 365 Productivity Suite Powered by Microsoft

NaviSite Managed Office 365 Productivity Suite Powered by Microsoft Productivity Suite Powered by Microsoft Why Navisite s Elite 5-Star Managed Services Stands Apart Highest SLA s in the Industry Navisite is the only cloud service provider to bundle business continuity

More information

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect

More information

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business

More information

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital

More information

Update on new Microsoft Cloud Technology

Update on new Microsoft Cloud Technology Update on new Microsoft Cloud Technology Azure Rights Management Services Thomas Collier Technical Pre-Sales D E V I C E S O F F I C E 3 6 5 C L O U D S E R V I C E S, S A A S A P P S & O N - P R E M I

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

U susret GDPR regulativi Dočekajmo spremni Maj 2018

U susret GDPR regulativi Dočekajmo spremni Maj 2018 U susret GDPR regulativi Dočekajmo spremni Maj 2018 Dragan Tasić Technology Solutions Professional This presentation is intended to provide an overview of GDPR and is not a definitive statement of the

More information

Top. Reasons Legal Teams Select kiteworks by Accellion

Top. Reasons Legal Teams Select kiteworks by Accellion Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing

More information

Update on new Microsoft Cloud Technology

Update on new Microsoft Cloud Technology Update on new Microsoft Cloud Technology Advanced Threat Protection Thomas Collier Technical Pre-Sales OFFICE 365 PHISH PROTECTION STACK Protect during Mail Flow Protect Post Delivery Detect & Respond

More information

GSX 365 Usage Reports & Security Audit

GSX 365 Usage Reports & Security Audit GSX 365 Usage Reports & Security Audit With you, everywhere, for more than 20 years Founded in 1996, Headquartered in Switzerland London Geneva Offices in USA, UK, France, Switzerland, Singapore and Bangalore

More information

WHAT IS OFFICE 365? Software-as-a-Service (SaaS) Watch Online > (2 minutes) Cloud Storage

WHAT IS OFFICE 365? Software-as-a-Service (SaaS) Watch Online >   (2 minutes) Cloud Storage WHAT IS OFFICE 365? Watch Online > https://www.youtube.com/watch?v=4wibqcmsb_e (2 minutes) Software-as-a-Service (SaaS) Cloud Storage o Data is stored in secure offsite location providing massive cost-effective

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016 Price list for Microsoft Office 365 from Swisscom Valid from 1 may, 2016 2 Overview General part 3 Plans Business (1 300 users) 4 > Office 365 Business > Office 365 Business Essentials > Office 365 Business

More information

Exploring Data Governance. and Compliance. for. Office 365. Tony

Exploring Data Governance. and Compliance. for. Office 365. Tony Exploring Data Governance and Compliance for Office 365 Tony Redmond @12Knocksinna Tony Redmond Lead author for Office 365 for IT Pros ebook https://gum.co/o365it/ https://office365itpros.com MVP since

More information

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Controls. Powered by Auditor Mapping. HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard

More information

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa Evolution of Cyber Security Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa Nasser.Kettani@microsoft.com @nkettani MODERN SECURITY THREATS THERE ARE TWO KINDS OF BIG COMPANIES:

More information

Hardening the Modern Windows Client Let s NOT break it this time

Hardening the Modern Windows Client Let s NOT break it this time Hardening the Modern Windows Client Let s NOT break it this time Raymond P.L. Comvalius Raymond Comvalius IT Infra Architect/Trainer MVP Windows IT Pro Zelfstandig sinds 1998 Agenda History of Hardening

More information

DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI Page 1 Page 2 office 365 security and trust standard requirements office 365 security and pdf office 365 security

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

Five critical features

Five critical features Five critical features you need for effective Office 365 administration www.manageengine.com/active-directory-360 Table of contents 1. 2. 3. Introduction Office 365 management: Five things you can't do

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Targeted Attacks. Identitycentric. Compliance. Cloud BYOD

Targeted Attacks. Identitycentric. Compliance. Cloud BYOD BYOD Cloud Compliance Targeted Attacks Identitycentric The privacy and security environment is becoming more complicated, more risky and more regulated every day, and is having a substantial impact on

More information

Data Protection in Practice

Data Protection in Practice ANNUAL CPD BOARD CONFERENCE Data Protection in Practice 6 & 13 DECEMBER 2016 There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller, FBI Director There

More information

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong Session objectives & takeaways Session objectives: Overview of information protection solutions How to

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Unpacking Office 365 A high level overview of the apps and services bundled in the standard Office 365 subscription: What is it Use cases FAQ

Unpacking Office 365 A high level overview of the apps and services bundled in the standard Office 365 subscription: What is it Use cases FAQ Unpacking Office 365 A high level overview of the apps and services bundled in the standard Office 365 subscription: What is it Use cases Unpacking Office 365 Making the move to Office 365? Whether your

More information

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant Windows 10 October 25, 2018 Helping you grow your business with Bruce Ward, VP of Business Strategy scalable IT services & solutions Dan Sharp, Senior Consultant for today s challenges & tomorrow s vision.

More information

Office 365 for businesses. Stay connected on the go

Office 365 for businesses. Stay connected on the go Office 365 for businesses Stay connected on the go Welcome to Office 365 Office 365 is a cloud-based service hosted by Microsoft that brings together familiar Microsoft Office desktop applications with

More information

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become

More information

MCSA Office 365. A Success Guide to Prepare- Microsoft Enabling Office 365 Services. edusum.com

MCSA Office 365. A Success Guide to Prepare- Microsoft Enabling Office 365 Services. edusum.com 70-347 MCSA Office 365 A Success Guide to Prepare- Microsoft Enabling Office 365 Services edusum.com Table of Contents Introduction to 70-347 Exam on Enabling Office 365 Services... 2 Microsoft 70-347

More information

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011 Exchange Online Technical Overview CCAP Exchange Online Overview 10/27/2011-10/28/2011 Exchange Online: Trusted, Familiar and Robust Co-Existence 2 Microsoft Confidential The Benefits of Exchange Online

More information

1

1 Best platform for modern business Affordable and innovative devices Highly mobile and built for agility Broadest range and selection Presented by Dmitri Milov Simple to setup and manage Setup out of the

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Windows 10 Pro device opportunity

Windows 10 Pro device opportunity Windows 10 Pro device opportunity I m too limited in what I can do and what I can achieve on Chromebook. Corey Weathers, CEO Homegrown Trailers Work more securely Modern PCs can protect against botnets

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

with Advanced Protection

with Advanced  Protection with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations

More information

Instructions for using the Microsoft Office 365 software download service for employees and students in the UrFU

Instructions for using the Microsoft Office 365 software download service for employees and students in the UrFU Instructions for using the Microsoft Office 365 software download service for employees and students in the UrFU Microsoft Office 365 is a cloud-based subscription service that brings together the best

More information

IT Needs More Control

IT Needs More Control IT Needs More Control Over Network Access Privileges Copyright 1999-2016 BeyondTrust Inc. All rights reserved. High-profile data breaches like those that hit the U.S. Office of Personnel Management, the

More information

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB @markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Active Directory Domain Services On-premises App Server Validate credentials

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Step 1 - Set Up Essentials for Office 365

Step 1 - Set Up Essentials for Office 365 For each Barracuda Cloud Control account, you can have either a linked Barracuda Email Security Gateway appliance or a Barracuda Email Security Service subscription. You cannot use a single Barracuda Cloud

More information

PCI Compliance. with O365 Manager Plus.

PCI Compliance. with O365 Manager Plus. PCI Compliance with O365 Manager Plus www.o365managerplus.com About PCI-DSS Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed

More information

News and Updates June 1, 2017

News and Updates June 1, 2017 Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk

More information

ISO/IEC Controls

ISO/IEC Controls ISO/IEC 27001 Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About ISO/IEC 27001 ISO/IEC 27001 is an international standard that provides requirements for establishing, implementing,

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

AirWatch for Android Devices for Skype for Business

AirWatch for Android Devices for Skype for Business Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller

More information

To Audit Your IAM Program

To Audit Your IAM Program Top Five Reasons To Audit Your IAM Program Best-in-class organizations are auditing their IAM programs - are you? focal-point.com Introduction Stolen credentials are the bread and butter of today s hacker.

More information

9 Years in Consulting. Broad experience in Microsoft Infrastructure solutions. Specialised in Windows 10 & Surface familly

9 Years in Consulting. Broad experience in Microsoft Infrastructure solutions. Specialised in Windows 10 & Surface familly About 9 Years in Consulting Broad experience in Microsoft Infrastructure solutions Specialised in Windows 10 & Surface familly We know Windows XP Windows 7 wasn t easy It often took between 3-7 years!

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate

GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600 customers

More information

Secure access to your enterprise. Enforce risk-based conditional access in real time

Secure access to your enterprise. Enforce risk-based conditional access in real time Secure access to your enterprise Enforce risk-based conditional access in real time FOREWORD The intelligent cloud has created an opportunity to do security better Traditional security perimeters no longer

More information

Microsoft: What s new and cool FY16

Microsoft: What s new and cool FY16 Microsoft: What s new and cool FY16 Matt Hickey Principal ATS January 2016 What s new and cool? Mobile First Cloud First Mobility Social Cloud Big data Everything we do in the world going forward is about

More information

Accelerate your General Data Protection Regulation (GDPR) compliance journey with Microsoft 365

Accelerate your General Data Protection Regulation (GDPR) compliance journey with Microsoft 365 1 Accelerate your General Data Protection Regulation (GDPR) compliance journey with Microsoft 365 Embrace the GDPR with the most complete, secure and intelligent solution for digital work. 2 Table of contents

More information

SharePoint Server 2016 Feature Comparison* Accessibility Standards Support Yes Yes. Asset Library Enhancements/Video Support Yes Yes.

SharePoint Server 2016 Feature Comparison* Accessibility Standards Support Yes Yes. Asset Library Enhancements/Video Support Yes Yes. Content Features SharePoint Server 2016 Feature Comparison* Accessibility Standards Support Yes Yes Asset Library Enhancements/Video Support Yes Yes Auditing Yes Yes Auditing & Reporting (e.g. doc edits,

More information