Safeguard your business against external threats and leaks, and easily manage devices with Microsoft 365. Protect business data, and control who has access to sensitive information. Learn more in this in-depth deck.
2. Protect against cyber threats Protect business data against leaks Secure devices and control access
Microsoft 365 Security Benefits
Safeguard your business against external threats and leaks, easily manage devices
3. Key Security Pains
How do I
safeguard
confidential
business data
How do I give
employees the right
access while keeping
hackers at bay?
How do I protect
my employees
from phishing?
How do I enable a
mobile, WFH
workforce?
4. Protect against phishing, ransomware,
malware, and other advanced threats
Defend against threats
Check links at time of click to combat advanced
phishing
Detect malware with sandbox analysis of email
attachments
Enable anti-phishing policies that use machine
learning
Enable advanced multi-factor authentication and
Conditional Access
Enforce features that help protect Windows 10
devices
5. Control who has access to sensitive
information
Protect business data
Encrypt sensitive emails
Block sharing of sensitive information like credit card
numbers
Restrict copying and saving of confidential business
information
Enable unlimited cloud archiving
6. What it is:
Azure Information Protection helps an
organization to classify protect its
documents and emails, either by
restricting the ability to forward and print,
or by applying labels.
The restrictions and protections stay with
the files and emails regardless of the
location. Even if the file is emailed
outside the company, or saved to an
employee’s personal computer, you
remain in control of your data.
Azure Information
Protection (AIP)
7. Easily secure and manage your devices
Manage the security of the devices that
access your business information
Control which devices and users can
access business information
Apply security policies to protect data on
iOS and Android devices
Keep company data within approved apps
on mobile devices
Remove business data from lost or stolen
devices with selective wipe
Support for Windows Virtual Desktop
8. M365 Business Premium
What’s new and amazing
Conditional Access
Access controls to when, who,
where accesses Office apps
Multi Factor Authentication
Protects against unauthorized
access
Shared computer Activation
Support for multi-user/firstline
scenarios
Self-service password
writeback
Simplifies password
administration
Windows Virtual Desktop
Easy to manage virtualization
that saves licensing costs
Full Azure Active Directory P1
(coming soon)
Help enable secure remote
access to work apps
10. Why choose this solution?
Integrated with Office, Teams and Windows
Built-in: No need to deploy additional products
Streamlined: Protects apps without hogging resources
or requiring clunky add-ons
Deep in the operating system: Resistant to tampering
by malware and hackers
Global scale
Threat intelligence: The world’s largest set of threat-
related optics
AI-powered: Advanced data science turns signals into
actionable intelligence with the Security Graph
Team of experts: Global cybersecurity force working to
combats attacks
Enterprise-grade: Powered by the same technology built
for the world’s largest businesses
11.
12. Learn More:
Learn about security concepts and Microsoft 365:
https://www.microsoft.com/yournewcso
Product Documentation, Licensing comparison and FAQs:
https://aka.ms/M365BP
Learn about Thread Legal software for Law Firms
built with Microsoft 365:
https://thread.legal
M365B protects your business from external threats by giving you access to the same enterprise-grade services and protections used by many of the world’s largest companies.
Threat protection tools help keep your business free of hazards such as spam, malware, viruses, phishing attempts, malicious links, etc. while helping to protect from sophisticated threats cunningly disguised as email attachments or links, zero-day ransomware, and other advanced threat techniques.
Even your employees who understand that they shouldn’t click on hyperlinks sent from people they don’t know, could be easily fooled by today’s sophisticated phishing schemes. Microsoft 365 Business helps to remove the guesswork by doing the check for you and protecting your users from clicking through to malicious or unsafe sites or the system takes users to a warning page before allowing them access to the link.
The threat protection features in Microsoft 365 Business scan each & every attachment coming in via email. It opens these in a virtual environment (sandbox) and does a comprehensive, real time analysis of the behavior of the file to determine its intent (whether normal or malicious), thereby leading to better intelligent protection against unsafe attachments that are the basis for phishing schemes and ransomware infections.
To combat the latest phishing methods, where attackers impersonate a person (or brand) the recipient; machine learning is used to analyze past email patterns and relationships to find anomalies that indicate spoofing has occurred.
You can configure advanced multifactor authentication policies that disable access from untrusted locations or bypass multifactor authentication from trusted places such as your office network
Enforce Microsoft Defender malware protection across all your company’s Windows 10 devices to help prevent users from interacting with ransomware and malicious web locations, and protect files in key system folders from changes made by ransomware
Most businesses deal with a variety of sensitive information like customer credit card numbers, SSN, DOB or even intellectual property that is core to the running of the business. Keeping this information safe can be a daunting task for any business, but especially for SMBs.
M365B helps you protect your business data or sensitive customer or employee information from accidental leaks by utilizing Data Loss Prevention capabilities. These DLP policies can help to identify, monitor, and protect sensitive information through deep content analysis, even if your staff forget to apply these controls. It includes preconfigured templates that can help businesses detect specific types of sensitive information being communicated, such as Credit Card Numbers, SSN, DOB or even locale-specific personally identifiable information (PII). It also provides policy tips, which can help educate and prevent end users from accidental sharing of sensitive info by displaying a policy tip in Outlook.
With M365B, your employees can easily encrypt email and documents, or impose controls such as do not print or do not forward. This helps you can communicate securely with customers or other people outside your company, ensuring that only the intended recipient can read the message
With the information protection features in M365B, you can maintain control of who can access your documents, even after a document has been shared or saved outside your company’s network.
M365B also helps to ensure that your data and documents are retained and archived, if needed to meet legal or regulatory requirements.
What you really get here is peace of mind. The threat of information loss is what keeps you up at night, but with your files securely backed up in the cloud, and accessible only by you or your employees – even in the event of a lost or damaged device – you don’t need to awake worrying about the security of your data .
Here’s what the interface looks like for protecting. Big blue “Protect” button in the Office ribbon. Pretty straightforward.
Options that show up here:
Confidential - Only recipients can read (on the email thread you send or that you specify manually, if protecting a document in a standing location)
Confidential - All employees – All people in your in company will be able to open. Same protection as “confidential” but no need to specifically name them.
Do Not Forward - most commonly used.
Examples: managing an employee out of your company. Want to prevent mistakes. Reinforce the sensitive nature of what's being discussed. No oops.
Is aware of clients that don't support do not forward (e.g. Pine) – user has to authenticate and view using web experience in these cases; so protection can be enforced. If using Outlook, integrated experience.
Encrypt – This is Office 365 Message encryption we discussed in last slide
Highly confidential – Same as confidential but with additional protections
Highly confidential – All employees – Same as Confidential all –employees
--these may be changing; they are updated based on feedback on user experience—
Note: For protect button and banner to show up you have to do download AIP client. Can push it down with Intune.
Microsoft 365 Business helps you manage the security on all the devices that access your data – phone, tablets, PCs, macs. …whether they are Windows, iOS, macOS, or Android, M365B helps you manage them.
Conditional access capabilities give you flexible and fine-grained control over which devices and users can access your Office 365 data. You have options to block users from logging in from home computers, un-approved apps, or outside of work hours.
You get peace of mind if allowing staff to use their own personal devices. You can require a strong PIN or fingerprint to access company data. You can enforce device encryption; and block jailbroken or rooted devices.
The solution lets you keep business documents, emails, and other data within approved Office mobile apps on personal devices, and prevent employees from saving these to unauthorized apps and location
Because company data is kept within approved apps and locations, you remotely wipe company data from a personal device when an employee leaves your company.
And you can enforce device encryption on Windows PCs with BitLocker to help protect against data theft or exposure if a computer is lost or stolen.
Because these capabilities are built on enterprise products used by some of the largest companies in the world, you may wonder if enabling all of these productivity features will be complex. That’s why we have simplified setup and administration in Microsoft 365.
Initial setup takes place in a step by step guided experience where you can easily setup the security policies with simple toggle buttons. Here you can do things like set up policies for securing data on iOS and Android mobile devices, and securing your Windows 10 devices.
In the Microsoft 365 admin center you have simplified UI for managing device and data policies on an ongoing basis.
Because Microsoft 365 Business is built on enterprise products like Intune and Azure Active Directory, you into the full dashboards for those products and do advanced activities as well.
Because M365 Business has been designed with SMB customers in mind, it includes these investments in simplification, while still preserving the power of the underlying products and the ability to manage them in a granular way if the need arises.
As we’ve mentioned, you could buy these capabilities in pieces from various providers. Here's the pitch for why you should choose a solution from Microsoft.
At high level, the reasons are integration with Office 365 and Windows; and scale of Microsoft's investment in security
Integrated with Office 365 and Windows:
Built-in: No need to deploy additional products; just activate it within Office 365
Easy to manage: One place to go to administer this; and rest of your O365 services. So you can set up new users, no separate passwords for people to remember, etc. One administration center to manage your productivity and security tools; one bill to pay; one support organization to deal with when you need assistance
Not bloated or clunky: Designed specifically for Office apps, so it protects apps without hogging system resources or requiring special add-ins
Deep in the operating system: Advanced defenses are built deep in the Windows making them resistant to tampering by malware and hackers
Global scale:
Threat intelligence: Every day, Microsoft’s Intelligent Security Graph analyzes over 6.5 trillion signals—the world’s largest set of threat-related optics
AI-powered: Microsoft uses cloud computing resources to power advanced data science and machine learning to turn these signals into actionable intelligence
Team of experts: A global team of security experts use deep understanding of malware, cyberattacks, and attacker motivation to combat a wide range of attacks
Enterprise-grade: The solution is powered by the same technology built for the world’s largest businesses, and hosted from the same cloud that houses data from over 85% of Fortune 500 companies
But we also want you to know that all of this powered by enterprise-grade security. M365B is not a watered down version. It is the same set of security platform that our enterprise customers use
And really M365B is an Intelligent system and is constantly
The center piece of our investment in intelligence is the Microsoft Intelligent Security Graph. This is how we describe the way that we synthesize a vast amount of data from a huge variety of sources. 400 billion emails get analyzed by our Outlook.com and Office 365 email services every month.
1.2 billion devices are updated monthly. The 1.2B includes ~750M Windows 10 monthly active devices which we receive telemetry, the balance is Win8/7/Vista/XP which communicate with Windows Update on a monthly basis. 400 Billion emails analyzed monthly.
We operate 200-plus global cloud, consumer, and commercial services. Everything from outlook.com to Xbox Live to Office 365 to Azure, and so on. And with all of those services, we have a tremendous amount of surface area that we defend. Enterprise Security from Microsoft is employed by 90% of the Fortune 500.
And so, we see more attacks than most other companies on any given day. We get a lot of information from defending against those attacks.
1 Billion plus Azure user accounts give us tremendous insight into how people authenticate to Azure. And that, combined with the 450 billion monthly authentications that we do with Azure Active Directory and Microsoft Account, really give us some tremendous insight into what is normal behavior when it comes to sign-ins and authentications, and what is abnormal behavior, and how often is it that someone has the right password, but they're not the person they say they are. We learn a lot about defending that really important control point, the identity, by looking across that set of data.
Bing scans about 18 billion web pages every month, giving us really great insight into what people are doing with web scripting technologies when it comes to attacks and phishing campaigns. And we have a great way to look at that and understand how we should help customers defend based on that information.
On top of all of that we layer shared threat data that we get from our partners, from the researchers here at Microsoft who are part of our 3,500-plus people that are full time on security, and law enforcement agencies that we partner with worldwide through our digital crimes unit, as well as botnet data that we collect through the digital crimes unit. All of that intelligence makes up the Intelligent Security Graph.
And why is it a graph? It's a graph because what's really important is connecting these pieces of intelligence, so that these signals are not just individual points of information. The graph brings them together as something that we can draw patterns across. We can learn from one point of data to influence how we interpret another point of data.
So, the Intelligent Security Graph is something that we are very, very heavily invested in at Microsoft. It's something that we feel is unique to us in this industry
Short blurb overview: Outlook helps you stay connected and organized at work, at home and on the go, backed by enterprise -grade security to protect your confidential information. It brings the best of Office 365 in one place - with easy access to your emails, files, calendar events and contacts so you can quickly get things done. A personalized, intelligent inbox and calendar helps anticipate your needs so you can stay on top of what matters most.
Longer explanation:
Best of Office 365 in one place
Outlook brings email, calendar, contacts, tasks, and more together in one place so you can work efficiently. With Office integration, you can share attachments right from SharePoint and OneDrive. Customize Outlook by integrating with the business apps you already use.
Access email, calendar events, contacts and tasks from one app
Quickly view and share Office documents, photos and files stored locally or on the cloud like OneDrive,
View rich contact information including organization details and LinkedIn profiles
Customize with business apps and services through APIs, add-ins and actionable messages
Secure and Manage with Ease
Secure and manage your organization’s confidential information with ease. Outlook empowers your employees to stay connected and organized wherever they go, while providing advanced protection against online threats and keeping them in compliance with your organization’s policies.
Enables your employees to work from anywhere on any device, while being in compliance with your organizations policies
Advanced protection against viruses, spam, phishing attacks and other online threats
Ability to encrypt messages
Protection of sensitive information and ability to prevent forwarding or copying of confidential emails
IT controls to easily secure, set up and manage across globally distributed organizations
Advanced access controls, remote wipe and ability to compartmentalize work and personal data.
Stay organized and plan ahead
Make plans and coordinate schedules by sharing calendars and seeing when your coworkers are available. Book conference rooms and track RSVPs for meetings right from your calendar. You can count on Outlook to keep your organization moving globally.
Easily find the best time to meet through by checking their availability , right from the calendar
Share calendars to quickly coordinate schedules. You can also delegate calendars
Book conference rooms and schedule online meetings in a breeze
Track RSVPs for meetings in just one tap or click
Intelligence that works for you
Outlook anticipates your needs. Search helps you find what you need, fast. Travel and reservations are automatically added to your calendar. And intelligent reminders help you get to appointments on time.
Upcoming travel is automatically added to your calendar so you’re always a s step ahead
Intelligent search on mobile brings conversations from your top contacts, upcoming reservations and file attachments front and center – all before you even kick off a keyword search query.
Outlook helps you focus on what matters- newsletters, promotions and other emails are grouped separately so you focus on what’s important