Value and contributions of the E5 offer
This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of previous plans (M365 F1/E1/E3)
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Value Microsoft 365 E5 English
1. Microsoft 365 E5
Value and contributions of the E5 offer
This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of
previous plans (M365 F1/E1/E3)
2. Information Protection
Oversight of cloud and
application usages
Identity and access
management
Protection from advanced
threats
Insider risk management Data governance
Cloud Telephony Dynamic dashboards
Microsoft 365 E5 in one image
Discovery, Classification and
Automated Data Protection
Import your encryption key
Advanced messages encryption
Discovery, investigation, continuous
analysis and detection of anomalies on
cloud applications
Visibility of your data in the cloud
Connection risk assessment
Management of privileged accounts
Identity Governance
Advanced protection of messaging,
documents, SaaS application,
workstation and Active Directory
Automatically identify and protect your
sensitive data wherever it is
Supervise, understand, manage and
protect yourself from the uses and
threats of cloud applications
An interconnected defensive arsenal
against sophisticated and targeted
threats
Protectiion and Governance of Data
Access by Users and Administrators
Educate users and protect yourself from
risky behaviors, whether voluntary or not
Data Access Approval Workflow
Supervision of communications
Ethical wall
Automated data lifecycle management
Searching for information (litigation or
internal searches)
Keep, delete and find sensitive data
- automatically -
Next-generation telephony
Conference bridge
Advanced business functions
Choosing the operator connection
Corporate telephony system integrated
into collaborative suite
Make the most of your data
Share dashboards
Artificial intelligence support
Browse your data and bring out key
metrics in real time
3. Information Protection
Automatic classification of
documents based on their
sensitivity
Personal Public Confidential
Encryption Watermark
Tracking Revocation
Automatic classification of
your local file servers (and
SharePoint)
Use your own key and
infrastructure for document
encryption
Scan and detect sensitive data
based on policies
Classify and lay data based on
their sensitivity
Apply protection, and actions
such as encryption and
restriction of access
Reports, alerts and
remediation
Protection follows the document
wherever it is, even outside of
Office 365
A scanner identifies, classifies and
protects your local file servers
and SharePoint
In highly regulated contexts, you
can use your own encryption
infrastructure with your keys for
data hosted on Office 365
Advanced e-mail
encryption
Send encrypted messages with
your colors and logos, with the
ability to put an expiration date
or revoke the message
Automatically identify and protect your sensitive data wherever it is
4. Oversight of cloud and application usages
Discovering Cloud
Applications actually used
Advanced Incident
Investigation Tools
Cloud visibility of your data
Shadow IT detection
(unapproved applications)
Application risk assessment
Understand usages, traffic,
categories
Investigation of users, files,
activities, locations.
Quantify exposure and risk
Block or manage apps
Monitor and protect
information through apps
Identify how classified and
unclassified data is shared on
cloud applications and assess
risks
Continuous analysis and
detection of anomalies
Warnings on abnormal uses
and behaviors
Alerts on new apps and
trends
Office 365
Salesforce Azure
Box
Aws
DropboxFacebook
TwitterYoutube
Supervise, understand, manage and protect yourself from the uses and threats of cloud applications
5. Identity and access management
Connection risk assessment
Management of Privileged
Identities
Identity Governance
Conditional access strategies
for connections and risk-
based sessions
Identifying vulnerabilities and
accounts at risk
Investigation into risky events
Workflow to raise privileges
for admin accounts
Reducing attack surface in
case of compromised
account
Protection against internal
risk of malicious
administrators
Automation of access query
workflows, access
assignments, revisions and
expiration.
Effectively manage access to
groups, applications and sites
Access review
User access can be reviewed
regularly to ensure that only
appropriate people continue
to benefit from access
Managing new hires and
changing jobs
Protection and Governance of Data Access by Users and Administrators
Session
Risk
3
User - role
Known and compliant device
Physical/virtual location
Client and authentication method Strategies
Ask for a 2nd authentication
factor
Allow/deny access
**
**
**
Limited access
Force the password
reset
Context Organization policy Conditioned action Access to data
6. Protection from advanced threats
Protecting messaging and
documents
Protecting the workstation Active Directory Protection
Automated protection and
response against malicious
links and attachments
Protection against identity
theft
Attack Simulator
Investigation of attacks
Overview of global and
industry threats
Automated Detection and
Response (EDR)
Ransomware protection and
0-day flaws
Protection from vulnerability
exploitation
Reducing the attack surface
and investigating
Identifying advanced attacks
and internal risks before
damage occurs
Behavior analysis
In-depth log analysis
Detection of compromised
accounts
Protecting cloud
applications
Threat detection in cloud
applications
Identifying at-risk
applications
Internal risk protection (data
exfiltration)
Detection of compromised
accounts and sessions
An interconnected defensive arsenal against sophisticated and targeted threats
PhishingMail
Opening
Attachment
ClickonURL
Exploit&
Installation
Command&
Control
Useraccount
Compromise
SideMovement Adminaccount
Compromise
Domain
Compromise
Access to sensitive data
by the attacker
Dataexfiltration
End-to-end
attack scenario
Protection Messaging and documents Workstation Active Directory Cloud Apps
7. Insider risk management
Preventing
information
leakage in
Microsoft Teams
Approval workflow
for data access
Approval workflow
for administrator
privilege
elevations
Educate and block
users about to share
sensitive information in
chats and group
conversations
In real time, internally
and externally
Meet compliance
obligations by
demonstrating an
explicit data access
authorization process
Controlling access to
content for service
operations
Reduce attack surface
with admin accounts
with zero standing
access
Protect yourself from
malicious
administrators
Workflow for validation
of privilege elevations
Supervision of
communications
Apply your corporate
rules, ethical
standards, in user
communications
Manage risk on
sensitive topics by
supervising
communications
Follow current
regulatory
compliances
Educate users and protect yourself from risky behaviors, whether voluntary or not
Ethical wall
between certain
populations
Segment certain user
populations by
prohibiting them from
communicating with
each other for
business or
compliance reasons
Isolate a team or site, if
necessary
8. Data governance
Automated data lifecycle
management
Import your encryption key
for data at rest
Search for information
(litigation or internal
research)
Automated detection of
sensitive data and application
of a label based on content
Set retention or deletion
policies to meet compliance
or quality requirements
Use your own encryption key
for data at rest in Office 365
Enjoy the right to be
forgotten through key
revocation
Meet the compliance
requirements that require
you to use your keys
Drastically reduce the
number of documents to
review
Rearrange the results,
through themes, deletion of
duplicates and reconstruction
of conversation threads
Annotate documents
User and administrator
activity logs
365-day retention of all user
and admin activities
Find out quickly who did
what on the data or service
configuration
Keep, delete and find sensitive data - automatically -
Governance Label
Retention strategy
Deletion strategy
Review before deletion
Record management
Import third-party data
Supervision
Violation of Strategy
Search for
content
Insights
Analysis
Reports
Data at risk
9. Cloud Telephony
Next-generation telephony Conference bridge
Advanced business
functions
Full telephony system in the
cloud to replace your local
PBX system
There's no need to maintain
local infrastructure
Conference bridge in
meetings to be reached by
phone
Responding to group calls
Line sharing
Call parking
Choosing the operator
connection
Direct routing in Microsoft
Teams
Microsoft Call Package
Communication credits
Corporate telephone system integrated into collaborative suite
10. Dynamic dashboards
Do more with your data Sharing culture Artificial intelligence
Get your data talking
Publication of dynamic
reports, dashboards
Reduce the costs, complexity
and challenges of multiples
solutions
Publication of dynamic
reports in a collaborative
workspace
Self-service spirit
Many connectors and visual
options
Include reports in other apps
Make sense of unstructured
data (images, text, etc.)
Ask your questions in natural
language
Discover the hidden
information that influences
your key metrics
Accessible from anywhere
From a browser
From the rich app
From a smartphone
From an Office app
From the intranet
From Microsoft Teams
Browse your data and bring out key metrics in real time