SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
1
Proven Practices for Office 365
Deployment, Security and Management
June 3, 2015
2
Proven Practices for Office 365
Deployment, Security and Management
3
PERFICIENT PROFILE
Founded in 1997
Public, NASDAQ: PRFT
2014 revenue ~$456 million
Major market locations:
Allentown, Atlanta, Ann Arbor, Boston, Charlotte, Chicago,
Cincinnati, Columbus, Dallas, Denver, Detroit, Fairfax, Houston,
Indianapolis, Lafayette, Milwaukee, Minneapolis, New York City,
Northern California, Oxford (UK), Southern California, St. Louis,
Toronto
Global delivery centers in China and India
>2,600 colleagues
Dedicated solution practices
~90% repeat business rate
Alliance partnerships with major technology vendors
Multiple vendor/industry technology and growth awards
4
Perficient has consistently been recognized by
Microsoft as one of the software giant’s most
valuable partners– and especially in regards to
the cloud.
With nationally-known experts on the Office 365,
Azure and Yammer platforms– as well as a deep
and rich history in SharePoint, Lync (now Skype
for Business), and Exchange– we are well
positioned to partner with you as you transform
your business.
www.perficient.com/microsoft
Perficient & Microsoft
A rich relationship that has made us a
Premier Cloud Partner, Nationwide
5
Why Office 365?
Aging On-Premises Infrastructure
• Exchange 2003 / 2007 environments
• Storage constraints
• Eliminate the burden of upgrades
Lack of Security / Compliance Functionality
• Data Loss Prevention (DLP)
• Rights Management Services (RMS)
• Multi-Factor Authentication (MFA)
• Encryption
Need for Mobile Enablement
• Support for laptops, tablets, phones
6
35% of Exchange install base is on Office 365
Nearly 80% of the Fortune 500 have Office 365
Over 80% of Office 365 Enterprise customers have two or
more workloads
7
Best Practices
Get Started… Now
• Acquire licensing (trial, EA)
• Identify an appropriate pilot group
• Consider workloads such as OneDrive
for Business or Office 365 ProPlus
Accept Changes
• Network
• Security
• Provisioning
Seek Support & Experience
• Look for certified vendors
• Leverage Microsoft documentation
and training
• Work with a deployment partner
8
Common Mistakes
To Avoid
Organizational
• Excluding groups such as IT Security
• Lack of buy-in from the necessary parties
• Insufficient resource planning / prioritization
Project Execution
• Executing a pilot without a good cross-section of users
• Lack of understanding of product functionality
• New feature overload
User Impact
• Lack of communication
9
First Step to the Cloud:
Identity & Authentication
IDENTITY
Questions
• What is our source of user identities?
• How do we manage the lifecycle of these identities?
Goals
• Leverage existing directories we have in place
• Reduce the required IT management of directories
• Don’t ask our users to manage another account for every cloud
application
• Implement cloud solutions without adding additional on-premises
dependencies
10
First Step to the Cloud:
Identity & Authentication
AUTHENTICATION
Questions
• Is it secure?
• How fast can I have it?
Goals
• Fast deployment
• Achieving “Single-Sign On Zen”
• Ensure high-availability of authentication services
• Implement cloud solutions with minimal additional on-premises
dependencies
• Provide a consistent login experience across devices and platforms
• Deploy a solution that supports all of our cloud services
Copyright © 2015 Centrify Corporation. All Rights Reserved. 11
Centrify Identity Service
Reduce time, cost and risk of migrating to Office 365
Copyright © 2015 Centrify Corporation. All Rights Reserved. 12
First Step to the Cloud: Identity & Authentication
• Leverage existing directories
• Reduce the required IT management
of directories
• Don’t ask our users to manage
another account for every cloud
application (No more passwords!)
• Deploy a solution that supports all of
our cloud services
• Fast Deployment
• Achieving Single-Sign On Zen
• Ensure High-Availability
• Provide a consistent login experience
across devices and platforms
Security Goals Deployment Goals
Implement cloud solutions with minimal additional on-premises dependencies
Copyright © 2015 Centrify Corporation. All Rights Reserved. 13
Centrify Identity Service
Secure and simplify your Office 365 deployment
app app app
Secure Deployment
Copyright © 2015 Centrify Corporation. All Rights Reserved. 15
Secure by Design: Powered by Azure
Current and planned
• Zero-downtime
architecture
• Worldwide multi-region
data centers
• Localized into
15+ languages
• 24x7 support with
regional sales teams
and more than
250 resellers
• SSAE 16 SOC 2,
TRUSTe,
EU Safe Harbor
+
Copyright © 2015 Centrify Corporation. All Rights Reserved. 16
Secure by Design: Validated by Microsoft
Microsoft has tested and certified
Centrify Identity Service as a
“Works with Office 365” solution
Established protocols and premier
support agreements between
Centrify and Microsoft ensure
quality joint customer support
Best-in-class support for Office365 deployments
Copyright © 2015 Centrify Corporation. All Rights Reserved. 17
Leverage Existing Directories — Reduce IT Overhead
The most flexible options for storing identity
Purely in the cloud
No replication to cloud
(On-prem with class-leading
AD/LDAP integration)
Combination
(Subset of users in AD/LDAP +
another subset in cloud)
Copyright © 2015 Centrify Corporation. All Rights Reserved. 18
No New Passwords to Hack — Single Sign-On (SSO)
Robust app support
• Class-leading support O365
• Direct support for thousands of other apps
Add your own apps
• Easy to customize generic SAML app
• Add your own username/password apps
Rich mobile app support
• Leading ISVs (Box, Dropbox) support SDK
• Mobile Authentication Services SDK
for your custom apps (developers.centrify.com)
Centrify infinite apps
• Browser plugin to discover username/password apps
• Auto-detection with manual fallback
Copyright © 2015 Centrify Corporation. All Rights Reserved. 19
Secure Office 365 access starts at the device
• MDM: IT needs to ensure security of
underlying mobile devices
• MAM: IT needs to deploy appropriate apps
to the device
• ZSO: End users hate typing in passwords,
especially on mobile
• MFA: Trusted devices and wearables are
simplest method for step-up authentication
Centrify uniquely combines
identity + mobility management
Integrated Mobile Management
Device
Management
(MDM)
Container
Management
(MCM)
Samsung
KNOX
Application
Management
(MAM)
Authentication
Services (MAS)
App Zero
Sign-On
(ZSO)
Centrify
Mobile
Authenticator
Mobile User
Self-Service
Copyright © 2015 Centrify Corporation. All Rights Reserved. 20
Policy & MFA to Strengthen Security for Office 365
Per-App Authentication Policies
• Allow/deny or step-up authentication
• Based on
• Time of day, work hours
• Inside/outside corporate network
• User role or attributes
• Device attributes (type, management status)
• Location
• App client attributes
• Custom logic
Multifactor Authentication
• Centrify Authenticator soft token with unique one-button authentication
• One time passcode (OTP) over SMS text, email, or push notification
• Interactive phone call to user’s mobile device plus required confirmation
for authentication to proceed
Fast and Easy
Deployment
Copyright © 2015 Centrify Corporation. All Rights Reserved. 22
Automated Lifecycle Management for Office 365
Onboard
Update
Create
Enable Mobile
Monitor/
Report
Offboard
Granular Licensing
With integrated counts and
role-based consumption
Single Sign-On
Multifactor Authentication
Integrated Windows Authentication
Copyright © 2015 Centrify Corporation. All Rights Reserved. 23
Centrify Identity Platform…
Centrify Cloud
Connector
App Gateway AD/LDAP Proxy
Centrify Identity
Platform
Cloud
Directory
Authentication
Engine
MFA and Policy
Engine
Reporting
Engine
CENTRIFY CLOUD
Mobile App
User Portal
Application Single Sign-On
Enterprise Mobility Management
User Provisioning
Mac Management
Centrify Identity
Service
Admin
Portal
Copyright © 2015 Centrify Corporation. All Rights Reserved. 24
Installs in
minutes
…Supports On-prem, Cloud, and Hybrid Deployment
CENTRIFY CLOUD
Centrify Cloud
Connector
App Gateway AD Proxy
Copyright © 2015 Centrify Corporation. All Rights Reserved. 25
SSO for On-Prem SharePoint via App Gateway
Secure on-premises access – without VPN
• Securely deliver remote access to internal SharePoint
and other applications
• Reduce risk by eliminating need for VPN access
to internal network
• Allow remote or mobile access for users
without hassle of VPN
Built into Centrify Cloud Connector with
automatic failover and load balancing
Copyright © 2015 Centrify Corporation. All Rights Reserved. 26
Why Centrify Identity Service?
Simplify and Secure your Office 365 Deployment
Tied to AD
Class-leading AD integration
without replication
Automated provisioning,
including granular licensing
for Office 365
Full mobile management
Mobile device and app
management
MFA with granular per-app
policies
Turnkey IDaaS offering
SSO for O365 and thousands
of other apps
User portal for self-service
password reset, app access,
mobile enrollment, and more
Powered By Azure
“Works with Office 365”
Certified
Localized into 15+ local
languages
SSAE 16 SOC 2, TRUSTe,
EU Safe Harbor
Thank You!
Request a trial
http://www.centrify.com/free-trial/

Weitere ähnliche Inhalte

Was ist angesagt?

What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx Vignesh Ganesan I Microsoft MVP
 
SharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online comparedSharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online comparedNagaraj Yerram
 
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)WinWire Technologies Inc
 
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...Rene Modery
 
SharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportalSharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportal2SeeU
 
The Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical HubThe Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical HubDan Barker
 
SPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint FactorySPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint FactoryNCCOMMS
 
OneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersOneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersLearning SharePoint
 
Office 365 deployment fast track
Office 365 deployment fast trackOffice 365 deployment fast track
Office 365 deployment fast trackMotty Ben Atia
 
Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016Drew Madelung
 
Extending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration AExtending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration Aridwansassman
 
Tech Ed 2010 Attended Sessions
Tech Ed 2010 Attended SessionsTech Ed 2010 Attended Sessions
Tech Ed 2010 Attended Sessionsridwansassman
 
Intro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterIntro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterNikkia Carter
 
Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016Chirag Patel
 
Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...Suhail Jamaldeen
 
Sharepoint Overview
Sharepoint OverviewSharepoint Overview
Sharepoint OverviewVinh Nguyen
 
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBIOffice 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBIJoel Oleson
 
SharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 editionSharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 editionRene Modery
 

Was ist angesagt? (20)

What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx
 
SharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online comparedSharePoint 2013 on-premise vs Office 365 Online compared
SharePoint 2013 on-premise vs Office 365 Online compared
 
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
What and how do I choose SharePoint 2013 On-premise vs. Cloud (Office 365)
 
Overview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public PreviewOverview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public Preview
 
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
ESPC14 - T23 - SharePoint Online vs On-Premises vs Hosted - Making the Right ...
 
SharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportalSharePoint 2016 - nextgenportal
SharePoint 2016 - nextgenportal
 
The Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical HubThe Rise of SharePoint as a Business Critical Hub
The Rise of SharePoint as a Business Critical Hub
 
SPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint FactorySPCA2013 - Building a SharePoint Factory
SPCA2013 - Building a SharePoint Factory
 
OneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersOneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-users
 
Office 365 deployment fast track
Office 365 deployment fast trackOffice 365 deployment fast track
Office 365 deployment fast track
 
Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016Concurrency SharePoint Summit 2016
Concurrency SharePoint Summit 2016
 
Extending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration AExtending SharePoint 2010 To Line of Business Integration A
Extending SharePoint 2010 To Line of Business Integration A
 
Tech Ed 2010 Attended Sessions
Tech Ed 2010 Attended SessionsTech Ed 2010 Attended Sessions
Tech Ed 2010 Attended Sessions
 
SharePoint Overview
SharePoint OverviewSharePoint Overview
SharePoint Overview
 
Intro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterIntro to the Office 365 Admin Center
Intro to the Office 365 Admin Center
 
Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016Power Users Guide to Office 365 - Collab365 Summit 2016
Power Users Guide to Office 365 - Collab365 Summit 2016
 
Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...Training – Introduction to SharePoint Online for Collaboration and Document M...
Training – Introduction to SharePoint Online for Collaboration and Document M...
 
Sharepoint Overview
Sharepoint OverviewSharepoint Overview
Sharepoint Overview
 
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBIOffice 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
Office 365 Power Tools: What to use When? Forms, Flows, PowerApps, PowerBI
 
SharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 editionSharePoint Online vs On-premises vs Hybrid – 2016 edition
SharePoint Online vs On-premises vs Hybrid – 2016 edition
 

Ähnlich wie Proven Practices for Securing Office 365 Deployments

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD Peter Selch Dahl
 
Horizon 6 what's new
Horizon 6   what's newHorizon 6   what's new
Horizon 6 what's new培林 何
 
Why should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App DevelopmentWhy should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App DevelopmentWSO2
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionRES
 
Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudProlifics
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeRunpipe
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
The Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITThe Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITXebiaLabs
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsSanjay Willie
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 

Ähnlich wie Proven Practices for Securing Office 365 Deployments (20)

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Horizon 6 what's new
Horizon 6   what's newHorizon 6   what's new
Horizon 6 what's new
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
 
Why should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App DevelopmentWhy should the WSO2 App Factory be your choice for Enterprise App Development
Why should the WSO2 App Factory be your choice for Enterprise App Development
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
 
Discover BPM Optimization in the Cloud
Discover BPM Optimization in the CloudDiscover BPM Optimization in the Cloud
Discover BPM Optimization in the Cloud
 
What is Comindware
What is ComindwareWhat is Comindware
What is Comindware
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
The Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise ITThe Future of Software Delivery in Enterprise IT
The Future of Software Delivery in Enterprise IT
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
 
Saa sure
Saa sureSaa sure
Saa sure
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 

Mehr von Perficient, Inc.

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsPerficient, Inc.
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Perficient, Inc.
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesPerficient, Inc.
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Perficient, Inc.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVIDPerficient, Inc.
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryPerficient, Inc.
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaPerficient, Inc.
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPerficient, Inc.
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Perficient, Inc.
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinPerficient, Inc.
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudPerficient, Inc.
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and ComingPerficient, Inc.
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementPerficient, Inc.
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management OverviewPerficient, Inc.
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomePerficient, Inc.
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersPerficient, Inc.
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsPerficient, Inc.
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPerficient, Inc.
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 

Mehr von Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Kürzlich hochgeladen

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Kürzlich hochgeladen (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Proven Practices for Securing Office 365 Deployments

  • 1. 1 Proven Practices for Office 365 Deployment, Security and Management June 3, 2015
  • 2. 2 Proven Practices for Office 365 Deployment, Security and Management
  • 3. 3 PERFICIENT PROFILE Founded in 1997 Public, NASDAQ: PRFT 2014 revenue ~$456 million Major market locations: Allentown, Atlanta, Ann Arbor, Boston, Charlotte, Chicago, Cincinnati, Columbus, Dallas, Denver, Detroit, Fairfax, Houston, Indianapolis, Lafayette, Milwaukee, Minneapolis, New York City, Northern California, Oxford (UK), Southern California, St. Louis, Toronto Global delivery centers in China and India >2,600 colleagues Dedicated solution practices ~90% repeat business rate Alliance partnerships with major technology vendors Multiple vendor/industry technology and growth awards
  • 4. 4 Perficient has consistently been recognized by Microsoft as one of the software giant’s most valuable partners– and especially in regards to the cloud. With nationally-known experts on the Office 365, Azure and Yammer platforms– as well as a deep and rich history in SharePoint, Lync (now Skype for Business), and Exchange– we are well positioned to partner with you as you transform your business. www.perficient.com/microsoft Perficient & Microsoft A rich relationship that has made us a Premier Cloud Partner, Nationwide
  • 5. 5 Why Office 365? Aging On-Premises Infrastructure • Exchange 2003 / 2007 environments • Storage constraints • Eliminate the burden of upgrades Lack of Security / Compliance Functionality • Data Loss Prevention (DLP) • Rights Management Services (RMS) • Multi-Factor Authentication (MFA) • Encryption Need for Mobile Enablement • Support for laptops, tablets, phones
  • 6. 6 35% of Exchange install base is on Office 365 Nearly 80% of the Fortune 500 have Office 365 Over 80% of Office 365 Enterprise customers have two or more workloads
  • 7. 7 Best Practices Get Started… Now • Acquire licensing (trial, EA) • Identify an appropriate pilot group • Consider workloads such as OneDrive for Business or Office 365 ProPlus Accept Changes • Network • Security • Provisioning Seek Support & Experience • Look for certified vendors • Leverage Microsoft documentation and training • Work with a deployment partner
  • 8. 8 Common Mistakes To Avoid Organizational • Excluding groups such as IT Security • Lack of buy-in from the necessary parties • Insufficient resource planning / prioritization Project Execution • Executing a pilot without a good cross-section of users • Lack of understanding of product functionality • New feature overload User Impact • Lack of communication
  • 9. 9 First Step to the Cloud: Identity & Authentication IDENTITY Questions • What is our source of user identities? • How do we manage the lifecycle of these identities? Goals • Leverage existing directories we have in place • Reduce the required IT management of directories • Don’t ask our users to manage another account for every cloud application • Implement cloud solutions without adding additional on-premises dependencies
  • 10. 10 First Step to the Cloud: Identity & Authentication AUTHENTICATION Questions • Is it secure? • How fast can I have it? Goals • Fast deployment • Achieving “Single-Sign On Zen” • Ensure high-availability of authentication services • Implement cloud solutions with minimal additional on-premises dependencies • Provide a consistent login experience across devices and platforms • Deploy a solution that supports all of our cloud services
  • 11. Copyright © 2015 Centrify Corporation. All Rights Reserved. 11 Centrify Identity Service Reduce time, cost and risk of migrating to Office 365
  • 12. Copyright © 2015 Centrify Corporation. All Rights Reserved. 12 First Step to the Cloud: Identity & Authentication • Leverage existing directories • Reduce the required IT management of directories • Don’t ask our users to manage another account for every cloud application (No more passwords!) • Deploy a solution that supports all of our cloud services • Fast Deployment • Achieving Single-Sign On Zen • Ensure High-Availability • Provide a consistent login experience across devices and platforms Security Goals Deployment Goals Implement cloud solutions with minimal additional on-premises dependencies
  • 13. Copyright © 2015 Centrify Corporation. All Rights Reserved. 13 Centrify Identity Service Secure and simplify your Office 365 deployment app app app
  • 15. Copyright © 2015 Centrify Corporation. All Rights Reserved. 15 Secure by Design: Powered by Azure Current and planned • Zero-downtime architecture • Worldwide multi-region data centers • Localized into 15+ languages • 24x7 support with regional sales teams and more than 250 resellers • SSAE 16 SOC 2, TRUSTe, EU Safe Harbor +
  • 16. Copyright © 2015 Centrify Corporation. All Rights Reserved. 16 Secure by Design: Validated by Microsoft Microsoft has tested and certified Centrify Identity Service as a “Works with Office 365” solution Established protocols and premier support agreements between Centrify and Microsoft ensure quality joint customer support Best-in-class support for Office365 deployments
  • 17. Copyright © 2015 Centrify Corporation. All Rights Reserved. 17 Leverage Existing Directories — Reduce IT Overhead The most flexible options for storing identity Purely in the cloud No replication to cloud (On-prem with class-leading AD/LDAP integration) Combination (Subset of users in AD/LDAP + another subset in cloud)
  • 18. Copyright © 2015 Centrify Corporation. All Rights Reserved. 18 No New Passwords to Hack — Single Sign-On (SSO) Robust app support • Class-leading support O365 • Direct support for thousands of other apps Add your own apps • Easy to customize generic SAML app • Add your own username/password apps Rich mobile app support • Leading ISVs (Box, Dropbox) support SDK • Mobile Authentication Services SDK for your custom apps (developers.centrify.com) Centrify infinite apps • Browser plugin to discover username/password apps • Auto-detection with manual fallback
  • 19. Copyright © 2015 Centrify Corporation. All Rights Reserved. 19 Secure Office 365 access starts at the device • MDM: IT needs to ensure security of underlying mobile devices • MAM: IT needs to deploy appropriate apps to the device • ZSO: End users hate typing in passwords, especially on mobile • MFA: Trusted devices and wearables are simplest method for step-up authentication Centrify uniquely combines identity + mobility management Integrated Mobile Management Device Management (MDM) Container Management (MCM) Samsung KNOX Application Management (MAM) Authentication Services (MAS) App Zero Sign-On (ZSO) Centrify Mobile Authenticator Mobile User Self-Service
  • 20. Copyright © 2015 Centrify Corporation. All Rights Reserved. 20 Policy & MFA to Strengthen Security for Office 365 Per-App Authentication Policies • Allow/deny or step-up authentication • Based on • Time of day, work hours • Inside/outside corporate network • User role or attributes • Device attributes (type, management status) • Location • App client attributes • Custom logic Multifactor Authentication • Centrify Authenticator soft token with unique one-button authentication • One time passcode (OTP) over SMS text, email, or push notification • Interactive phone call to user’s mobile device plus required confirmation for authentication to proceed
  • 22. Copyright © 2015 Centrify Corporation. All Rights Reserved. 22 Automated Lifecycle Management for Office 365 Onboard Update Create Enable Mobile Monitor/ Report Offboard Granular Licensing With integrated counts and role-based consumption Single Sign-On Multifactor Authentication Integrated Windows Authentication
  • 23. Copyright © 2015 Centrify Corporation. All Rights Reserved. 23 Centrify Identity Platform… Centrify Cloud Connector App Gateway AD/LDAP Proxy Centrify Identity Platform Cloud Directory Authentication Engine MFA and Policy Engine Reporting Engine CENTRIFY CLOUD Mobile App User Portal Application Single Sign-On Enterprise Mobility Management User Provisioning Mac Management Centrify Identity Service Admin Portal
  • 24. Copyright © 2015 Centrify Corporation. All Rights Reserved. 24 Installs in minutes …Supports On-prem, Cloud, and Hybrid Deployment CENTRIFY CLOUD Centrify Cloud Connector App Gateway AD Proxy
  • 25. Copyright © 2015 Centrify Corporation. All Rights Reserved. 25 SSO for On-Prem SharePoint via App Gateway Secure on-premises access – without VPN • Securely deliver remote access to internal SharePoint and other applications • Reduce risk by eliminating need for VPN access to internal network • Allow remote or mobile access for users without hassle of VPN Built into Centrify Cloud Connector with automatic failover and load balancing
  • 26. Copyright © 2015 Centrify Corporation. All Rights Reserved. 26 Why Centrify Identity Service? Simplify and Secure your Office 365 Deployment Tied to AD Class-leading AD integration without replication Automated provisioning, including granular licensing for Office 365 Full mobile management Mobile device and app management MFA with granular per-app policies Turnkey IDaaS offering SSO for O365 and thousands of other apps User portal for self-service password reset, app access, mobile enrollment, and more Powered By Azure “Works with Office 365” Certified Localized into 15+ local languages SSAE 16 SOC 2, TRUSTe, EU Safe Harbor
  • 27. Thank You! Request a trial http://www.centrify.com/free-trial/