secure productive enterprise from microsoft and atidan

Post on 15-Jan-2017

174 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

!

http://www.slideshare.net/d501159/microsoft-secure-

productive-enterprise-video-68669090

Secure Productive Enterprise Plan Overview

Secure Productive Enterprise PlansE3

$32/per

user/month

E5$57/per

user/month

Authoring Word, Excel, PowerPoint, OneNote X X

Sites & Content management SharePoint, OneDrive X X

Mail And Social Outlook, Exchange, Yammer X X

Meetings & VoiceSkype for Business

PSTN Conferencing, Cloud PBX

X X

X

Apps & Device ManagementMicrosoft Intune, Azure Active Directory Premium P1

Windows Store for Business, Microsoft Desktop Optimization Package, VDA

X

X

X

X

Analytics Power BI, Delve Analytics, Personal and Org Analytics X

Security & Compliance

Office 365: Encryption, Data Loss Protection, Rights Management

Windows 10 Enterprise: Enterprise Data Protection, Windows Hello, Credential Guard, Device Guard, App Locker

EMS: Microsoft Advanced Threat Analytics, Azure Information Protection P1

Office 365: Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery

Windows 10 Enterprise: Windows Defender Advanced Threat Protection

EMS: Azure Active Directory Premium P2, Microsoft Cloud App Security, Azure Information Protection P2

XX

X

X

X

X

X

X

X

Enterprise Plan Add-ons

PSTN Calling** Skype for Business

Built into Windows, cloud-poweredNo additional deployment and infrastructure

Continuously up-to-date, lower costs

Behavior-based, post-breach detectionActionable, correlated alerts for known and unknown adversaries

Real-time and historical data

Rich timeline for investigationEasily understand scope of breach

Data pivoting across endpoints

Deep file and URL analysis

Unique threat intelligence knowledge base Unparalleled threat optics provide detailed actor profiles

first and third-party threat intelligence data

• Unified view of security across your Azure resources• Central management of security policies• Integrated security event logging and SIEM integration

• Security policies tailored to meet your needs• Recommendations help address vulnerabilities• Rapidly deploy controls from Microsoft and partners

• Continuous analysis of security events• Microsoft threat intelligence informs analysis• Prioritized alerts provide attack insights and

recommendations for remediation

Contact us for demonstration, briefing and special deployment offers

office365@atidan.com

top related