SlideShare a Scribd company logo
1 of 32
Chris Bortlik
Principal Technical Architect
Microsoft Technology Center, Boston, MA
@cbortlik + aka.ms/BortlikBlog
Stay Productive, Collaborative,
and Secure with Microsoft 365
A complete, intelligent, secure solution to empower employees
Unlocks creativity
Create compelling content with intelligent apps
Work naturally with ink, voice, and touch
Visualize insights from data sets
Find what you need with personalized search
Connected experiences across devices
Built for teamwork
Collaborate in a chat-based workspace
Stay in sync with group email and calendars
Create content and intranets in a central location
Connect openly across the organization
Co-author with others using Office apps
Modern Desktop
Flexible device management
Integrated administration
Built-in compliance
Integrated for simplicity
Intelligent security
Identity & access management
Information protection
Threat protection
Security management
OUR COMMITMENT TO YOU
SECURITY
PRIVACY & CONTROL
COMPLIANCE
TRANSPARENCY
RELIABILITY
Universal toolkit Simplify IT
Unified management, security and compliance
makes deployment easier and reduces TCO
Seamless experience for users
Connected, integrated applications streamline
sharing and discovery, and simplifies adoption
Insights and analytics
Integration of people, content & activity
enables AI & analytics to inform & accelerate
decision making
Teamwork
More collaboration
People work on twice as many teams and spend
50% more time collaborating
Internal, external & remote
People need to connect and communicate
across organizations, locations & time zones
Diverse workforce
People have different expectations, preferences,
skillsets and abilities
Employee engagement
Globally, employee engagement is 15%,
but at the best performing companies, 70%
of employees are engaged and profits are
21% higher
2x
Teamwork in Microsoft 365
Pervasive availability. Targeted communications.
Email
Inner Loop
People you work with regularly
on core projects
Outer Loop
People you connect with openly
across the organization
Examples:
Team meetings & communication
Event planning
Sales Team planning
Examples:
Corporate communications
CEO Town Hall Meetings
Employee Interest Groups
SharePoint
Content collaboration
Stream
Video & live events
Teams for different departments
Marketing
Deliver marketing campaigns and
go-to-market activities across a
diverse group of internal and
external stakeholders.
Sales
Build and deliver proposals with input from
different stakeholders.
Manage sales planning, training and sales
readiness in the same place.
Finance
Aggregate and report on data while
conducting business reviews.
Human Resources
Manage recruitment, training and reviews
across departments.
IT
Drive IT transformation and change
management.
Plan, execute and manage all
phases of IT deployment, adoption
and rollout.
Engineering
Move quickly between ideation,
development and deployment.
Integrate with developer tools.
Project Management
Manage project stakeholders, tools,
budgets, project reviews and feedback. Get guidance on these and other scenarios in the
FastTrack Productivity Library
Microsoft 365: Universal Toolkit for Teamwork
Teams
Hub
for Teamwork
SharePoint
Intranets &
Content Management
Yammer
Connect Across
the Organization
Office Apps
Co-Author
Outlook
Email
& Calendar
Office 365 Groups
Single team membership
across apps and services
Microsoft Graph
Suite-wide intelligence
connecting people and content
Security and Compliance
Centralized policy management
Modern desktop customer journey
Gain insights
Windows Analytics
Office Readiness Toolkit
Set foundation
Windows 10
Office 365
+
Modern devices
Stay current
Phased deployments
Agile updates
Modernize IT
Windows Autopilot
Microsoft Intune
Microsoft Intelligent Security Graph
Microsoft Threat
Protection
Identities Endpoints User Data Cloud Apps Infrastructure
Users and Admins Devices and Sensors Email messages and
documents
SaaS Applications
and Data Stores
Servers, Virtual
Machines, Databases,
Networks
Intelligent Security Graph
6.5 TRILLION signals per day
Microsoft Intune
Office Threat
Intelligence
Windows Defender
Advanced Threat
Protection
Azure Active
Directory
Office Advanced
Threat Protection
Microsoft Cloud
App Security
Azure Security
Center
Azure Advanced
Threat Protection
Windows 10
Identities: Validating, verifying and
protecting both user and admin
accounts
User Data: evaluating email messages
and documents for malicious content
Endpoints: protecting user devices and
signals from sensors
Infrastructure: protecting servers,
virtual machines, databases and
networks across cloud and on-
premises locations
Cloud Apps: protecting SaaS applications
and their associated data stores
1
3
2
5
4
Microsoft Threat Protection
Exchange Online
Protection
SQL ServerWindows Server
Linux
LabelDiscover Classify
Sensitivity Retention
 Encryption
 Restrict Access
 Watermark
 Header/Footer
 Retention
 Deletion
 Records Management
 Archiving
 Sensitive data discovery
 Data at risk
 Policy violations
 Policy recommendations
 Proactive alerts
Data protection & data governance go hand-in-hand
Comprehensive policies to protect and govern your most important data – throughout its lifecycle
Unified approach to discover, classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations
Apply label
Unified approach
Monitor
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
What
Where
How
What
Where
How
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
AZURE SECURITY CENTER INFORMATION PROTECTION
Classify & label sensitive structured data in Azure SQL, SQL
Server and other Azure repositories
OFFICE APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-premises & hybrid
OFFICE 365 DATA LOSS PREVENTION
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business
SHAREPOINT & GROUPS
Protect files in libraries and lists
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
ADOBE PDFs
Natively view and protect PDFs on Adobe Acrobat Reader
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices,
prevent work data from traveling to non-work locations
OFFICE 365 MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity, machine
configuration, geo location
Discover | Classify | Protect | Monitor
SDK FOR PARTNER ECOSYSTEM & ISVs
Enable ISVs to consume labels, apply protection
Microsoft 365 Built-in Compliance
Integrated solutions leveraging intelligence to reduce risk
Assess
Manage your compliance from one place with
actionable insights and simplification
Protect
Automatically protect and govern sensitive data
across devices, apps and cloud services
Respond
Efficiently respond to regulatory requests
leveraging AI to find the right, most relevant data
Compliance Manager
Information
Protection
Auditing
Business
Continuity
Service Trust Portal
Encryption
Access Control
eDiscovery
Microsoft key certifications
Over 1100 controls in the Office 365
compliance framework enable us to stay up
to date with the ever-evolving industry
standards across geographies.
Trust Microsoft’s verified services. Microsoft
is regularly audited, submits self-assessments
to independent 3rd party auditors, and
holds key certifications.
United States
CJIS
CSA CCM
DISA
FDA CFR Title 21 Part 11
FEDRAMP
FERPA
FIPS 140-2
FISMA
HIPAA/HITECH
HITRUST
IRS 1075
ISO/IEC 27001, 27018
MARS-E
NIST 800-171
Section 508 VPATs
SOC 1, 2
Argentina
Argentina PDPA
CSA CCM
IRAP (CCSL)
ISO/IEC 27001, 27018
SOC 1, 2
Spain
CSA CCM
ENISA IAF
EU Model Clauses
EU-U.S. Privacy Shield
ISO/IEC 27001, 27018
SOC 1, 2
Spain ENS
LOPD
United Kingdom
CSA CCM
ENISA IAF
EU Model Clauses
ISO/IEC 27001, 27018
NIST 800-171
SOC 1, 2, 3
UK G-Cloud
Japan
CSA CCM
CS Mark (Gold)
FISC
ISO/IEC 27001, 27018
Japan My Number Act
SOC 1, 2
Singapore
CSA CCM
ISO/IEC 27001, 27018
MTCS
SOC 1, 2
New Zealand
CSA CCM
ISO/IEC 27001, 27018
NZCC Framework
SOC 1, 2
Australia
CSA CCM
IRAP (CCSL)
ISO/IEC 27001, 27018
SOC 1, 2
European Union
CSA CCM
ENISA IAF
EU Model Clauses
EU-U.S. Privacy Shield
ISO/IEC 27001, 27018
SOC 1, 2,
China
China GB 18030
China MLPS
China TRUCS
Shared Responsibility Model
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End
Point Devices
Provider management of risk
Physical | Networking
Cloud Customer Cloud Provider
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Application
level controls
Network controls
Host infrastructure
Physical security
Client & end-point
protection
Identity & access
management
Compliance Manager
Manage your compliance in one place
Ongoing risk assessment
An intelligent score reflects your compliance
posture against regulations or standards
Actionable insights
Recommended actions to improve your data
protection capabilities​
Simplified compliance
Streamlined workflow across teams and richly
detailed reports for auditing preparation​
Compliance Manager is a dashboard that provides a summary of your data protection and compliance stature and
recommendations to improve data protection and compliance. This is a recommendation,
it is up to you to evaluate its effectiveness in your regulatory environment prior to implementation.
Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance.
Service Trust Portal
https://aka.ms/stp
Easy access to security, privacy, and compliance
information
Increased transparency of Microsoft’s practices in
security, compliance, and privacy
Comprehensive information, including audit reports,
pen test and security assessment, white papers, and
compliance guides
Modern Workplace
Cloud Adoption Journey
Transform Culture
Define Strategy
Apply Technology
Envision
• Exec Buy In
• Success Criteria
• Priorities
• Phases/Roadmap
Onboard
• Tenant
• Identities
• Network
• Clients
• Security & Compliance
• Governance
• Hybrid Setup
• Email Migration
• Files Migration
• Support/Training
Realize Value
• Advanced
Workloads/Scenarios
• Reinventing Business
Processes
• Transforming Culture
Microsoft
Technology
Centers
Experience the
Microsoft Cloud
Modern Workplace Cloud Adoption Journey
Sample of MTC Offerings for Each Phase
Phase 1 - Envision Phase 2 - Onboard Phase 3 – Realize Value
Digital/Industry Transformation
Strategy Briefing
Modern Workplace Design
Session
Business Process Automation
Design Session & Hack
Modern Workplace Strategy
Briefing
Security Design Session &
Workshop
Employee Engagement Design
Session & Hack
Adoption Focused Strategy
Briefing
Migration/Governance Design
Session
Communications Design
Session & Hack
Modern Desktop &
Management Design Session
Book of Dreams Design
Session & Hack
Advanced Analytics Design
Session & Hack
1-Many Workshops 1-Many Workshops
Microsoft 365 Enterprise
Next Steps
Go to Microsoft365.com to learn more
Review the Cloud Adoption Journey blog series
Watch Microsoft Ignite session recordings
Stay up to date on the Microsoft 365 roadmap
Attend MTC workshops
Envision what’s possible with Value Discovery Workshop
Get onboarding and adoption assistance with FastTrack
© Copyright Microsoft Corporation. All rights reserved.
Thank you.

More Related Content

What's hot

What's hot (20)

Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
SharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & complianceSharePoint Saturday Cambridge: Security & compliance
SharePoint Saturday Cambridge: Security & compliance
 
Understanding Security and Compliance in Microsoft Teams - M365 Saturday Pune...
Understanding Security and Compliance in Microsoft Teams - M365 Saturday Pune...Understanding Security and Compliance in Microsoft Teams - M365 Saturday Pune...
Understanding Security and Compliance in Microsoft Teams - M365 Saturday Pune...
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365Solving the security & compliance puzzle for Office 365 and Microsoft 365
Solving the security & compliance puzzle for Office 365 and Microsoft 365
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protection
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 

Similar to Stay Productive, Collaborative, and Secure with Microsoft 365

Similar to Stay Productive, Collaborative, and Secure with Microsoft 365 (20)

Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Getting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh GanesanGetting started with Microsoft Office 365 by Vignesh Ganesan
Getting started with Microsoft Office 365 by Vignesh Ganesan
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365Prevención de la pérdida de datos (DLP) con O365
Prevención de la pérdida de datos (DLP) con O365
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
 
AIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfAIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdf
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Solvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft TeamsSolvion Trendwerkstatt - Microsoft Teams
Solvion Trendwerkstatt - Microsoft Teams
 
Introduction to Microsoft 365
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365
 

More from Chris Bortlik

More from Chris Bortlik (20)

SharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects PerspectiveSharePoint Syntex from an Architects Perspective
SharePoint Syntex from an Architects Perspective
 
Getting Ready for Project Cortex and SharePoint Syntex
Getting Ready for Project Cortex and SharePoint SyntexGetting Ready for Project Cortex and SharePoint Syntex
Getting Ready for Project Cortex and SharePoint Syntex
 
Getting Ready for Project Cortex and SharePoint Syntex
Getting Ready for Project Cortex and SharePoint SyntexGetting Ready for Project Cortex and SharePoint Syntex
Getting Ready for Project Cortex and SharePoint Syntex
 
Microsoft 365 Journey - Top 5 Emerging Customer and Partner Topics
Microsoft 365 Journey - Top 5 Emerging Customer and Partner TopicsMicrosoft 365 Journey - Top 5 Emerging Customer and Partner Topics
Microsoft 365 Journey - Top 5 Emerging Customer and Partner Topics
 
Getting Ready for Project Cortex
Getting Ready for Project CortexGetting Ready for Project Cortex
Getting Ready for Project Cortex
 
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
 
Sentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer PostsSentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer Posts
 
The Future of Teamwork is Here
The Future of Teamwork is HereThe Future of Teamwork is Here
The Future of Teamwork is Here
 
Sentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer PostsSentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer Posts
 
Securing, Governing, and Protecting Your Office 365 Investments
Securing, Governing, and Protecting Your Office 365 InvestmentsSecuring, Governing, and Protecting Your Office 365 Investments
Securing, Governing, and Protecting Your Office 365 Investments
 
Assembling an Engaging Communications Site
Assembling an Engaging Communications SiteAssembling an Engaging Communications Site
Assembling an Engaging Communications Site
 
Assembling an Engaging Communications Site
Assembling an Engaging Communications SiteAssembling an Engaging Communications Site
Assembling an Engaging Communications Site
 
Getting Started with Hybrid Scenarios with SharePoint and Office 365
Getting Started with Hybrid Scenarios with SharePoint and Office 365Getting Started with Hybrid Scenarios with SharePoint and Office 365
Getting Started with Hybrid Scenarios with SharePoint and Office 365
 
Building Applications for Your Business Using PowerApps and Flow
Building Applications for Your Business Using PowerApps and FlowBuilding Applications for Your Business Using PowerApps and Flow
Building Applications for Your Business Using PowerApps and Flow
 
Inform and Engage Employees with SharePoint Communications Sites and Yammer
Inform and Engage Employees with SharePoint Communications Sites and YammerInform and Engage Employees with SharePoint Communications Sites and Yammer
Inform and Engage Employees with SharePoint Communications Sites and Yammer
 
Understanding Office 365 Collaboration Toolkit
Understanding Office 365 Collaboration ToolkitUnderstanding Office 365 Collaboration Toolkit
Understanding Office 365 Collaboration Toolkit
 
Manage SharePoint and OneDrive in Office 365: A field guide for administrators
Manage SharePoint and OneDrive in Office 365: A field guide for administratorsManage SharePoint and OneDrive in Office 365: A field guide for administrators
Manage SharePoint and OneDrive in Office 365: A field guide for administrators
 
Securing, Governing, and Protecting Your Office 365 Investments
Securing, Governing, and Protecting Your Office 365 InvestmentsSecuring, Governing, and Protecting Your Office 365 Investments
Securing, Governing, and Protecting Your Office 365 Investments
 
Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
 
Understanding the Office 365 Collaboration Toolkit
Understanding the Office 365 Collaboration ToolkitUnderstanding the Office 365 Collaboration Toolkit
Understanding the Office 365 Collaboration Toolkit
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Stay Productive, Collaborative, and Secure with Microsoft 365

  • 1. Chris Bortlik Principal Technical Architect Microsoft Technology Center, Boston, MA @cbortlik + aka.ms/BortlikBlog Stay Productive, Collaborative, and Secure with Microsoft 365
  • 2. A complete, intelligent, secure solution to empower employees
  • 3. Unlocks creativity Create compelling content with intelligent apps Work naturally with ink, voice, and touch Visualize insights from data sets Find what you need with personalized search Connected experiences across devices
  • 4. Built for teamwork Collaborate in a chat-based workspace Stay in sync with group email and calendars Create content and intranets in a central location Connect openly across the organization Co-author with others using Office apps
  • 5. Modern Desktop Flexible device management Integrated administration Built-in compliance Integrated for simplicity
  • 6. Intelligent security Identity & access management Information protection Threat protection Security management
  • 7. OUR COMMITMENT TO YOU SECURITY PRIVACY & CONTROL COMPLIANCE TRANSPARENCY RELIABILITY
  • 8. Universal toolkit Simplify IT Unified management, security and compliance makes deployment easier and reduces TCO Seamless experience for users Connected, integrated applications streamline sharing and discovery, and simplifies adoption Insights and analytics Integration of people, content & activity enables AI & analytics to inform & accelerate decision making
  • 9. Teamwork More collaboration People work on twice as many teams and spend 50% more time collaborating Internal, external & remote People need to connect and communicate across organizations, locations & time zones Diverse workforce People have different expectations, preferences, skillsets and abilities Employee engagement Globally, employee engagement is 15%, but at the best performing companies, 70% of employees are engaged and profits are 21% higher 2x
  • 10. Teamwork in Microsoft 365 Pervasive availability. Targeted communications. Email Inner Loop People you work with regularly on core projects Outer Loop People you connect with openly across the organization Examples: Team meetings & communication Event planning Sales Team planning Examples: Corporate communications CEO Town Hall Meetings Employee Interest Groups SharePoint Content collaboration Stream Video & live events
  • 11. Teams for different departments Marketing Deliver marketing campaigns and go-to-market activities across a diverse group of internal and external stakeholders. Sales Build and deliver proposals with input from different stakeholders. Manage sales planning, training and sales readiness in the same place. Finance Aggregate and report on data while conducting business reviews. Human Resources Manage recruitment, training and reviews across departments. IT Drive IT transformation and change management. Plan, execute and manage all phases of IT deployment, adoption and rollout. Engineering Move quickly between ideation, development and deployment. Integrate with developer tools. Project Management Manage project stakeholders, tools, budgets, project reviews and feedback. Get guidance on these and other scenarios in the FastTrack Productivity Library
  • 12. Microsoft 365: Universal Toolkit for Teamwork Teams Hub for Teamwork SharePoint Intranets & Content Management Yammer Connect Across the Organization Office Apps Co-Author Outlook Email & Calendar Office 365 Groups Single team membership across apps and services Microsoft Graph Suite-wide intelligence connecting people and content Security and Compliance Centralized policy management
  • 13. Modern desktop customer journey Gain insights Windows Analytics Office Readiness Toolkit Set foundation Windows 10 Office 365 + Modern devices Stay current Phased deployments Agile updates Modernize IT Windows Autopilot Microsoft Intune
  • 15. Microsoft Threat Protection Identities Endpoints User Data Cloud Apps Infrastructure Users and Admins Devices and Sensors Email messages and documents SaaS Applications and Data Stores Servers, Virtual Machines, Databases, Networks Intelligent Security Graph 6.5 TRILLION signals per day
  • 16. Microsoft Intune Office Threat Intelligence Windows Defender Advanced Threat Protection Azure Active Directory Office Advanced Threat Protection Microsoft Cloud App Security Azure Security Center Azure Advanced Threat Protection Windows 10 Identities: Validating, verifying and protecting both user and admin accounts User Data: evaluating email messages and documents for malicious content Endpoints: protecting user devices and signals from sensors Infrastructure: protecting servers, virtual machines, databases and networks across cloud and on- premises locations Cloud Apps: protecting SaaS applications and their associated data stores 1 3 2 5 4 Microsoft Threat Protection Exchange Online Protection SQL ServerWindows Server Linux
  • 17.
  • 18.
  • 19.
  • 20. LabelDiscover Classify Sensitivity Retention  Encryption  Restrict Access  Watermark  Header/Footer  Retention  Deletion  Records Management  Archiving  Sensitive data discovery  Data at risk  Policy violations  Policy recommendations  Proactive alerts Data protection & data governance go hand-in-hand Comprehensive policies to protect and govern your most important data – throughout its lifecycle Unified approach to discover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations Apply label Unified approach Monitor
  • 21. Office 365 Information Protection Windows Information Protection Azure Information Protection What Where How
  • 23. MICROSOFT CLOUD APP SECURITY Visibility into 15k+ cloud apps, data access & usage, potential abuse AZURE SECURITY CENTER INFORMATION PROTECTION Classify & label sensitive structured data in Azure SQL, SQL Server and other Azure repositories OFFICE APPS Protect sensitive information while working in Excel, Word, PowerPoint, Outlook AZURE INFORMATION PROTECTION Classify, label & protect files – beyond Office 365, including on-premises & hybrid OFFICE 365 DATA LOSS PREVENTION Prevent data loss across Exchange Online, SharePoint Online, OneDrive for Business SHAREPOINT & GROUPS Protect files in libraries and lists OFFICE 365 ADVANCED DATA GOVERNANCE Apply retention and deletion policies to sensitive and important data in Office 365 ADOBE PDFs Natively view and protect PDFs on Adobe Acrobat Reader WINDOWS INFORMATION PROTECTION Separate personal vs. work data on Windows 10 devices, prevent work data from traveling to non-work locations OFFICE 365 MESSAGE ENCRYPTION Send encrypted emails in Office 365 to anyone inside or outside of the company CONDITIONAL ACCESS Control access to files based on policy, such as identity, machine configuration, geo location Discover | Classify | Protect | Monitor SDK FOR PARTNER ECOSYSTEM & ISVs Enable ISVs to consume labels, apply protection
  • 24. Microsoft 365 Built-in Compliance Integrated solutions leveraging intelligence to reduce risk Assess Manage your compliance from one place with actionable insights and simplification Protect Automatically protect and govern sensitive data across devices, apps and cloud services Respond Efficiently respond to regulatory requests leveraging AI to find the right, most relevant data Compliance Manager Information Protection Auditing Business Continuity Service Trust Portal Encryption Access Control eDiscovery
  • 25. Microsoft key certifications Over 1100 controls in the Office 365 compliance framework enable us to stay up to date with the ever-evolving industry standards across geographies. Trust Microsoft’s verified services. Microsoft is regularly audited, submits self-assessments to independent 3rd party auditors, and holds key certifications. United States CJIS CSA CCM DISA FDA CFR Title 21 Part 11 FEDRAMP FERPA FIPS 140-2 FISMA HIPAA/HITECH HITRUST IRS 1075 ISO/IEC 27001, 27018 MARS-E NIST 800-171 Section 508 VPATs SOC 1, 2 Argentina Argentina PDPA CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2 Spain CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2 Spain ENS LOPD United Kingdom CSA CCM ENISA IAF EU Model Clauses ISO/IEC 27001, 27018 NIST 800-171 SOC 1, 2, 3 UK G-Cloud Japan CSA CCM CS Mark (Gold) FISC ISO/IEC 27001, 27018 Japan My Number Act SOC 1, 2 Singapore CSA CCM ISO/IEC 27001, 27018 MTCS SOC 1, 2 New Zealand CSA CCM ISO/IEC 27001, 27018 NZCC Framework SOC 1, 2 Australia CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2 European Union CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2, China China GB 18030 China MLPS China TRUCS
  • 26. Shared Responsibility Model Customer management of risk Data classification and data accountability Shared management of risk Identity & access management | End Point Devices Provider management of risk Physical | Networking Cloud Customer Cloud Provider Responsibility On-Prem IaaS PaaS SaaS Data classification and accountability Application level controls Network controls Host infrastructure Physical security Client & end-point protection Identity & access management
  • 27. Compliance Manager Manage your compliance in one place Ongoing risk assessment An intelligent score reflects your compliance posture against regulations or standards Actionable insights Recommended actions to improve your data protection capabilities​ Simplified compliance Streamlined workflow across teams and richly detailed reports for auditing preparation​ Compliance Manager is a dashboard that provides a summary of your data protection and compliance stature and recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate its effectiveness in your regulatory environment prior to implementation. Recommendations from Compliance Manager should not be interpreted as a guarantee of compliance.
  • 28. Service Trust Portal https://aka.ms/stp Easy access to security, privacy, and compliance information Increased transparency of Microsoft’s practices in security, compliance, and privacy Comprehensive information, including audit reports, pen test and security assessment, white papers, and compliance guides
  • 29. Modern Workplace Cloud Adoption Journey Transform Culture Define Strategy Apply Technology Envision • Exec Buy In • Success Criteria • Priorities • Phases/Roadmap Onboard • Tenant • Identities • Network • Clients • Security & Compliance • Governance • Hybrid Setup • Email Migration • Files Migration • Support/Training Realize Value • Advanced Workloads/Scenarios • Reinventing Business Processes • Transforming Culture
  • 30. Microsoft Technology Centers Experience the Microsoft Cloud Modern Workplace Cloud Adoption Journey Sample of MTC Offerings for Each Phase Phase 1 - Envision Phase 2 - Onboard Phase 3 – Realize Value Digital/Industry Transformation Strategy Briefing Modern Workplace Design Session Business Process Automation Design Session & Hack Modern Workplace Strategy Briefing Security Design Session & Workshop Employee Engagement Design Session & Hack Adoption Focused Strategy Briefing Migration/Governance Design Session Communications Design Session & Hack Modern Desktop & Management Design Session Book of Dreams Design Session & Hack Advanced Analytics Design Session & Hack 1-Many Workshops 1-Many Workshops
  • 31. Microsoft 365 Enterprise Next Steps Go to Microsoft365.com to learn more Review the Cloud Adoption Journey blog series Watch Microsoft Ignite session recordings Stay up to date on the Microsoft 365 roadmap Attend MTC workshops Envision what’s possible with Value Discovery Workshop Get onboarding and adoption assistance with FastTrack
  • 32. © Copyright Microsoft Corporation. All rights reserved. Thank you.

Editor's Notes

  1. Microsoft Ignite 2016
  2. 17
  3. EMS Overview
  4. 20
  5. 23