SlideShare a Scribd company logo
1 of 58
Download to read offline
Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
Data center
security
Data loss
prevention
Compliance
tools
Anomaly
detection
Security
management
Information
rights
management
Email
security
Threat
detection
Hybrid cloud
security
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Security operations that work for you
Real-world intelligence at work
Intelligent Edge
Intelligent Cloud
Local ML models, behavior-based detection
algorithms, generics, heuristics
Metadata-based ML models
Sample analysis-based ML
models
Detonation-based ML
models
Big data
analytics
March 6 – Behavior-based detection
algorithms blocked more than 400,000
instances of the Dofoil trojan.
February 3 – Client machine learning
algorithms automatically stopped the
malware attack Emotet in real time.
October 2017 – Cloud-based detonation ML
models identified Bad Rabbit, protecting users
14 minutes after the first encounter.
2017 2018
August 2018 – Cloud machine learning
algorithms blocked a highly targeted campaign
to deliver Ursnif malware to under 200 targets
“From the expansion of ATP, to the new Security Graph API,
to Azure Sphere, it’s clear Microsoft is serious about
addressing the emerging threats that come part and parcel
with IoT...I do think Microsoft will be one of the last
standing when it comes to end-to-end security offering.”
Pat Moorhead
Moor Insights & Strategy
“Microsoft’s security offerings provide it with a
level of differentiation from its primary rivals.
Given the level of emphasis placed on security by
those rivals, we expect security to become a new
and more heated area of contention for leadership.”
Scott Crawford
451 Research
“Microsoft should probably scare most people as the biggest existential
threat…Time and time again, legacy security vendors failed to meet the
needs of their customers. Alert fatigue, poor context, poor usability, and lack
of integration capabilities continue to frustrate security teams. But now, the
tech titans are entering the market with customer-focused design,
offering integrated clouds, marketplaces, and interfaces.”
Joseph Blankenship
Forrester
“By 2022, one-third of organizations
hosting their applications on IaaS
vendors' services will use these
vendors' native IAM services.”
Gregg Kreizman
Research VP at Gartner Research
“The breadth of
Microsoft offerings
is attractive to IT
organizations that
require real-time
visibility and
control… the
capabilities of
Microsoft Cloud App
Security can enable IT
organizations to
achieve a level of
normalcy.”
Mark Bowker
ESG Group
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
Identity & access
management
Identity is at the center of security
Conditional access Identity protectionSecure authentication
Getting to a world without passwords
Microsoft Authenticator FIDO2 Security KeysWindows Hello
Azure AD
Conditional Access
User and location Device
Application Real time risk
Conditional
access
An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
Secure
identities to
reach zero trust
Strengthen your credentials by turning on MFA
Reduce your attack surface area by blocking
legacy authentication
Automate threat remediation with solutions such
as risk-based conditional access
Increase visibility into why IDs are blocked, monitor
security alerts and take action
Enable self-service capabilities for more predictable
and complete end-user security
Threat
protection
Correlate across
attack vectors
Detect & remediate
breaches
Protect the
digital estate
Help stop damaging attacks with integrated and automated security
Microsoft Threat Protection
Identities Endpoints User Data Cloud Apps Infrastructure
Intelligent Security Graph | 6.5 TRILLION signals per day
Help stop damaging
attacks with
integrated and
automated security
Quickly detect anomalous behavior through
integrated intelligence
Apply sophisticated machine learning, heuristics,
and intelligence to identify credential compromise
Reduce threat resolution times with automation
Identify and mitigate the latest email threats
Information
protection
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
Unified approach to discover,
classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations and
applications
Data growing at exponential rate
LabelDiscover Classify
Unified approach
Devices Apps Cloud services On-premises ISVs, 3rd-party
→ Sensitive data discovery
→ Data at risk
→ Policy violations
Monitor
→ Label Analytics
→ Proactive alerts
→ Supervision
Protection Governance
→ Encryption
→ Restrict access
→ Watermark
→ Header/Footer
→ Archiving
→ Retention & deletion
→ Records management
→ Event based
Apply policy
Option to manage and control your
own encryption keys to help meet
compliance needs
Additional customer controls for
added protection and control
Data is encrypted by default at-rest
and in-transit
Meets rigorous industry standards
Logging and auditing
Privileged workflow
Just in time and just enough access
The principle of zero standing access
Deliver native app experiences that
work and feel natural on any platform
Simplify access to resources
employees need across their devices
with single sign-on and conditional
access
Enable Office apps that users
love on mobile devices, without
compromising security
Locate and
classify
information
anywhere it
lives
Define sensitive data & establish your label taxonomy
Customize your protection policies – based on
internal objectives and compliance requirements
Start classifying and labeling content
Assess and adjust, based on ongoing monitoring
of sensitive data, impact on users
Security
management
Visibility Control Guidance
Devices InfrastructureApps & dataIdentity
Across
Strengthen your
security posture
with insights and
guidance
Understand your current security position
across your organization
Create policies and enable controls to better
define your security position
Use the built-in recommendations to find the
right balance of security
“If you make security hard,
people may work around it.
With Microsoft 365, we get
native capabilities, visibility into
our operational environment,
and simplicity for all employees.”
Simon Hodgkinson
Group Chief Information
Security Officer, BP
“With Advanced Threat Protection,
we’re more aware of potential
threats …. That helps us address
advanced malware threats that are
becoming more prevalent and
decreases the operational expense
of resolving security issues.”
Tony Taylor
Senior Director of Infrastructure and Security,
Land O’Lakes
Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Partner
with peers
Work with
industry alliances
Work with
government
M365
F1
$10
M365
E31
$32
M365
E51
$57
Productivity &
Collaboration
Office client apps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫
Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar
(Outlook, Exchange), social & internet (SharePoint, Yammer)
⚫2 ⚫ ⚫
Device & App
Management
Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows
Analytics Device Health
⚫ ⚫ ⚫
Security
Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure
Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3,
Windows Information Protection & BitLocker, Azure Information Protection Plan 1
⚫ ⚫ ⚫
Office 365 Data Loss Prevention ⚫ ⚫
Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan
2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP)
⚫
Compliance
Information Protection & Compliance (O365 Advanced Compliance, Azure Information
Protection Plan 2)
⚫
Voice Audio Conferencing, Phone System ⚫
Analytics
MyAnalytics ⚫ ⚫ ⚫
Delve ⚫ ⚫
Power BI Pro ⚫
PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation
SeeSpeakerNotesforfootnotes
Microsoft 365 Enterprise Plan Overview
Identity & Threat
Protection
$12
Information Protection
& Compliance
$10
M365 E5
Step-up
$25
Security O365 ATP Plan 2
1
⚫ ⚫
Microsoft Cloud App Security
2
⚫ ⚫
Azure Active Directory Plan 2 ⚫ ⚫
Azure ATP ⚫ ⚫
Windows Defender ATP ⚫ ⚫
Compliance
O365 Advanced Compliance ⚫ ⚫
Azure Information Protection Plan 2 ⚫ ⚫
Voice Phone System
3
⚫
Audio Conferencing
3
⚫
Analytics Power BI Pro
3
⚫
PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation
E5 Advanced Security & Compliance Offerings
1
Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value
2
Consolidates O365 CAS and MCAS value
© 2019 Razor Technology, LLC www.razor-tech.com
@DavidJRosenthal
Slideshare
www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Cell: 215.801.4430
Office: 866.RZR.DATA
LETS KEEP IN TOUCH

More Related Content

What's hot

Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptxChrisaldyChandra
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Introduction to Azure Sentinel
Introduction to Azure SentinelIntroduction to Azure Sentinel
Introduction to Azure Sentinelarnaudlh
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxAmrMousa51
 

What's hot (20)

Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Introduction to Azure Sentinel
Introduction to Azure SentinelIntroduction to Azure Sentinel
Introduction to Azure Sentinel
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 

Similar to Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - KeynoteAndrew Bettany
 
Sikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenSikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenMicrosoft
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosJenniferMete1
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...David J Rosenthal
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure adArjan Cornelissen
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 

Similar to Microsoft Security - New Capabilities In Microsoft 365 E5 Plans (20)

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 
Sikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenSikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verden
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 

More from David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsDavid J Rosenthal
 

More from David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

  • 1.
  • 2. Cyberspace is the new battlefield Security skills are in short supply Virtually anything can be attacked
  • 3.
  • 4.
  • 6. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 7. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 9.
  • 10. Real-world intelligence at work Intelligent Edge Intelligent Cloud Local ML models, behavior-based detection algorithms, generics, heuristics Metadata-based ML models Sample analysis-based ML models Detonation-based ML models Big data analytics March 6 – Behavior-based detection algorithms blocked more than 400,000 instances of the Dofoil trojan. February 3 – Client machine learning algorithms automatically stopped the malware attack Emotet in real time. October 2017 – Cloud-based detonation ML models identified Bad Rabbit, protecting users 14 minutes after the first encounter. 2017 2018 August 2018 – Cloud machine learning algorithms blocked a highly targeted campaign to deliver Ursnif malware to under 200 targets
  • 11. “From the expansion of ATP, to the new Security Graph API, to Azure Sphere, it’s clear Microsoft is serious about addressing the emerging threats that come part and parcel with IoT...I do think Microsoft will be one of the last standing when it comes to end-to-end security offering.” Pat Moorhead Moor Insights & Strategy “Microsoft’s security offerings provide it with a level of differentiation from its primary rivals. Given the level of emphasis placed on security by those rivals, we expect security to become a new and more heated area of contention for leadership.” Scott Crawford 451 Research “Microsoft should probably scare most people as the biggest existential threat…Time and time again, legacy security vendors failed to meet the needs of their customers. Alert fatigue, poor context, poor usability, and lack of integration capabilities continue to frustrate security teams. But now, the tech titans are entering the market with customer-focused design, offering integrated clouds, marketplaces, and interfaces.” Joseph Blankenship Forrester “By 2022, one-third of organizations hosting their applications on IaaS vendors' services will use these vendors' native IAM services.” Gregg Kreizman Research VP at Gartner Research “The breadth of Microsoft offerings is attractive to IT organizations that require real-time visibility and control… the capabilities of Microsoft Cloud App Security can enable IT organizations to achieve a level of normalcy.” Mark Bowker ESG Group
  • 12. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 13. Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  • 15. Identity is at the center of security
  • 16.
  • 17. Conditional access Identity protectionSecure authentication
  • 18. Getting to a world without passwords Microsoft Authenticator FIDO2 Security KeysWindows Hello
  • 19.
  • 20. Azure AD Conditional Access User and location Device Application Real time risk Conditional access
  • 21. An integral component of Microsoft Threat Protection Azure AD Identity Protection Azure ATP Microsoft Cloud App Security
  • 22. Secure identities to reach zero trust Strengthen your credentials by turning on MFA Reduce your attack surface area by blocking legacy authentication Automate threat remediation with solutions such as risk-based conditional access Increase visibility into why IDs are blocked, monitor security alerts and take action Enable self-service capabilities for more predictable and complete end-user security
  • 23.
  • 25.
  • 26. Correlate across attack vectors Detect & remediate breaches Protect the digital estate Help stop damaging attacks with integrated and automated security
  • 27. Microsoft Threat Protection Identities Endpoints User Data Cloud Apps Infrastructure Intelligent Security Graph | 6.5 TRILLION signals per day
  • 28.
  • 29.
  • 30.
  • 31. Help stop damaging attacks with integrated and automated security Quickly detect anomalous behavior through integrated intelligence Apply sophisticated machine learning, heuristics, and intelligence to identify credential compromise Reduce threat resolution times with automation Identify and mitigate the latest email threats
  • 32.
  • 34.
  • 35. Discover & classify sensitive information Apply protection based on policy Monitor & remediate Apps On-premisesCloud servicesDevices Across Accelerate Compliance
  • 36. Unified approach to discover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations and applications Data growing at exponential rate LabelDiscover Classify Unified approach Devices Apps Cloud services On-premises ISVs, 3rd-party → Sensitive data discovery → Data at risk → Policy violations Monitor → Label Analytics → Proactive alerts → Supervision Protection Governance → Encryption → Restrict access → Watermark → Header/Footer → Archiving → Retention & deletion → Records management → Event based Apply policy
  • 37. Option to manage and control your own encryption keys to help meet compliance needs Additional customer controls for added protection and control Data is encrypted by default at-rest and in-transit Meets rigorous industry standards
  • 38. Logging and auditing Privileged workflow Just in time and just enough access The principle of zero standing access
  • 39. Deliver native app experiences that work and feel natural on any platform Simplify access to resources employees need across their devices with single sign-on and conditional access Enable Office apps that users love on mobile devices, without compromising security
  • 40. Locate and classify information anywhere it lives Define sensitive data & establish your label taxonomy Customize your protection policies – based on internal objectives and compliance requirements Start classifying and labeling content Assess and adjust, based on ongoing monitoring of sensitive data, impact on users
  • 41.
  • 43.
  • 44. Visibility Control Guidance Devices InfrastructureApps & dataIdentity Across
  • 45.
  • 46.
  • 47.
  • 48. Strengthen your security posture with insights and guidance Understand your current security position across your organization Create policies and enable controls to better define your security position Use the built-in recommendations to find the right balance of security
  • 49.
  • 50. “If you make security hard, people may work around it. With Microsoft 365, we get native capabilities, visibility into our operational environment, and simplicity for all employees.” Simon Hodgkinson Group Chief Information Security Officer, BP
  • 51. “With Advanced Threat Protection, we’re more aware of potential threats …. That helps us address advanced malware threats that are becoming more prevalent and decreases the operational expense of resolving security issues.” Tony Taylor Senior Director of Infrastructure and Security, Land O’Lakes
  • 52. Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives Strengthen your security posture with insights and guidance Secure identities to reach zero trust Threat protection Information protection Identity & access management Security management
  • 53. Security operations that work for you Partnerships for a heterogeneous worldEnterprise-class technology
  • 54. Partner with peers Work with industry alliances Work with government
  • 55. M365 F1 $10 M365 E31 $32 M365 E51 $57 Productivity & Collaboration Office client apps (Word, Excel, PowerPoint, OneNote, Access) ⚫ ⚫ Microsoft Teams, Skye for Business Online, Office Mobile apps, email & calendar (Outlook, Exchange), social & internet (SharePoint, Yammer) ⚫2 ⚫ ⚫ Device & App Management Microsoft Intune, Windows AutoPilot, Fine Tuned User Experience, and Windows Analytics Device Health ⚫ ⚫ ⚫ Security Microsoft Advanced Threat Analytics, Windows Defender Antivirus, Device Guard6, Azure Active Directory Premium Plan 1, Windows Hello, Credential Guard and Direct Access3, Windows Information Protection & BitLocker, Azure Information Protection Plan 1 ⚫ ⚫ ⚫ Office 365 Data Loss Prevention ⚫ ⚫ Identity & Threat Protection (Microsoft Cloud App Security, Azure Active Directory Plan 2, O365 ATP Plan 2, Azure ATP, Windows Defender ATP) ⚫ Compliance Information Protection & Compliance (O365 Advanced Compliance, Azure Information Protection Plan 2) ⚫ Voice Audio Conferencing, Phone System ⚫ Analytics MyAnalytics ⚫ ⚫ ⚫ Delve ⚫ ⚫ Power BI Pro ⚫ PricingisNoLevel–Finalpricingmayvaryduetoroundingandgeolocation SeeSpeakerNotesforfootnotes Microsoft 365 Enterprise Plan Overview
  • 56. Identity & Threat Protection $12 Information Protection & Compliance $10 M365 E5 Step-up $25 Security O365 ATP Plan 2 1 ⚫ ⚫ Microsoft Cloud App Security 2 ⚫ ⚫ Azure Active Directory Plan 2 ⚫ ⚫ Azure ATP ⚫ ⚫ Windows Defender ATP ⚫ ⚫ Compliance O365 Advanced Compliance ⚫ ⚫ Azure Information Protection Plan 2 ⚫ ⚫ Voice Phone System 3 ⚫ Audio Conferencing 3 ⚫ Analytics Power BI Pro 3 ⚫ PricingisNoLevel/WebDirect–Finalpricingmayvaryduetoroundingandgeolocation E5 Advanced Security & Compliance Offerings 1 Consolidates O365 Threat Intelligence and O365 ATP Plan 1 value 2 Consolidates O365 CAS and MCAS value
  • 57.
  • 58. © 2019 Razor Technology, LLC www.razor-tech.com @DavidJRosenthal Slideshare www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Cell: 215.801.4430 Office: 866.RZR.DATA LETS KEEP IN TOUCH