edit master text styles - also.com · secure productive enterprise suite. windows 10 enterprise....

of 17 /17
Rudolf Frierss, Partner Channel Development Manager

Author: others

Post on 28-May-2020

15 views

Category:

Documents


0 download

Embed Size (px)

TRANSCRIPT

  • Edit Master text stylesEdit Master text stylesRudolf Frierss, Partner Channel Development Manager

  • Wir stehen am Rande einer technischen Revolution, die unsere Art zu leben, zu arbeiten und miteinander umzugehen grundlegend verändern wird…“

    Mitarbeiter arbeiten in 2x so vielenTeams wie noch vor fünf Jahren*

    41% der Mitarbeiter geben an , dassmobile Business Applikationen die Art wie sie arbeiten verändern*

    Der Informationsüberfluss kostetMitarbeiter 25% ihrer Arbeitszeit*

    160M Kundendaten sind bereitsgeleaked*

    229 Tage ist die durchschnittliche Dauerbis ein Security Breach erkannt wird*

    Klaus Schwab, Gründer und Präsident des Weltwirtschaftsforums

    * Multiple industry sources.

    VorführenderPräsentationsnotizenNumber of teams employees work on has nearly doubled over the last five years. - Microsoft: US Information Worker Survey, 2009 & 2014

    41% employees say mobile business apps are already changing the way they work - CCS Insight's Employee Mobile Technology Survey, February 2015 (surveyed 1,200 employees in the US and five countries in Western Europe)

    Information overload wastes 25% of workers’ time costing the U.S. economy alone $997 billion each year (as of 2010) – published research by Basex, a member of The Information Overload Research Group; The Information Overload Research Group’s Media Release Feb 3, 2011; Harvard Business Review ‘Conquering Digital Distraction’ June 2015

    Over 160 million customer records have been compromised – Identity Theft Resource Center (ITRC) Breach Report 2015��229 days to detect security infiltration – FireEye, Inc. 2014 Mandiant® M-Trends® report

  • „Cyberattacke auf FACC – Bis zu 50 Millionen Euro Schaden“ 26.01.2016

    „WKÖ: Relevanz von Wirtschafts- und Industriespionage nimmt zu“ 20.01.2016

    „Was Chinas Hacker-Versprechen wert ist“31.10.2015

    „8.400 Firmen in Österreich von Industriespionage betroffen“ 21.01.2016

    „Verfassungsschutz warnt vor ausländischer Spionage“26.01.2016

    „BND-Affäre: Snowdenwarnt vor Industriespionage durch Geheimdienste“

    08.05.2015Zurich-Studie: „Betriebsunterbrechung ist größte Gefahr von Cyber-Attacken und Klimawandel“

    30.11.2016

    „Fehlendes Wissen und Angst vor Kosten wichtigste Gründe, warum Situation nicht verbessert wird“19.01.2017

    http://wirtschaftsblatt.at/home/nachrichten/oesterreich/oberoesterreich/4908079/Cyberattacke-auf-FACC-Bis-zu-50-Millionen-Euro-Schadenhttp://www.ots.at/presseaussendung/OTS_20160120_OTS0202/wkoe-relevanz-von-wirtschafts-und-industriespionage-nimmt-zuhttp://www.sueddeutsche.de/wirtschaft/industriespionage-was-chinas-hacker-versprechen-wert-ist-1.2715745http://futurezone.at/b2b/8-400-firmen-in-oesterreich-von-industriespionage-betroffen/176.386.620http://www.noz.de/deutschland-welt/niedersachsen/artikel/662694/verfassungsschutz-warnt-vor-auslandischer-spionagehttp://www.spiegel.de/politik/deutschland/edward-snowden-warnt-vor-geheimdienst-industriespionage-a-1032858.htmlhttps://www.zurich.at/ueber-uns/presse/presseaussendungen/30112016http://derstandard.at/2000051117771/Viren-Spam-und-Computerausfaelle-betreffen-IT-Sicherheit-bei-KMU

  • Edit Master text stylesEdit Master text stylesIntelligenzZusammenarbeitVertrauen Mobilität

    Produktiv und sicher arbeiten mit derSecure Productive Enterprise Suite

    Enterprise Mobility + SecurityWindows 10 Enterprise

    VorführenderPräsentationsnotizenWe are introducing Secure Productive Enterprise as the hero offer to help our customers empower employees on their Digital Transformation journey. Secure Productive Enterprise delivers the latest and most advanced innovations in enterprise security, management, collaboration and business analytics, delivered through best-in-class cloud services. Secure Productive Enterprise is targeted to address these top customer priorities:

    Trust - It is built in our products and not an after-thought. We give customers ownership of their data. We are transparent and publish our policies Public trust center. We support major compliancy requirements Collaboration- Embracing new ways of working to help people achieve more. Giving people new ways of finding information, expertise and colleagues around the world. Moving seamlessly from email to impromptu 1:1 to team meetings to broadcasting your message to thousands.

    Mobility- Talks about where people do their work, with portable and consistent experience across iOS, Windows, Android as well as the ability to secure those mobile devices with management capabilities so the work, data, person and organization are secure.

    Intelligence – Centers on fast and better decision making. Providing insights to make decisions. Feels natural for people and helps them be more effective.

  • Edit Master text stylesEdit Master text stylesRudolf Frierss, Partner Channel Development Manager

  • Edit Master text stylesEdit Master text styles

    Office 365 Business vs. Enterprise

  • Edit Master text stylesEdit Master text styles

    UNSER PORTFOLIO ZUMINFORMATIONSSCHUTZÜ B E R A N W E N D U N G E N , D E V I C E S , U N DI N T E G R I E R T E S E R V I C E S H I N W E G

    AAD MULTI-FACTOR AUTHORIZATION

    DATA LOSS PREVENTION

    ANTI SPAM, ANTI VIRUS

    ADVANCED THREAT PROTECTION

    MDM/MAM WITH INTUNE

    ENCRYPTION—RMS, OME

    EDISCOVERY AND ANALYTICS

    ARCHIVING AND RETENTION

    AUDITING

    REGULATORY COMPLIANCE STANDARDS

    E3

    E5

    E3

    E3

    E3

    E3

    VorführenderPräsentationsnotizenMAM= Mobile Application ManagementOME = Office 365 Message Encryption

  • Edit Master text stylesEdit Master text styles

    Office 365 Enterprise Funktionen

    PSTN Conferencing: Weltweites Einwahl für Ihre Online-Meetings

    Cloud PBX: Die Telefonanlage in der Cloud

    PSTN Calling: Kosteneffiziente Cloud-basierteTelefonie (add-on)

    Power BI Pro: Live Business-Analysen und Datenvisualisierung

    MyAnalytics: Individuelle- und Teameffizienz

    Advanced Threat Protection: Zero-Day Bedrohungs- und Malware Schutz

    Advanced Security Management: Erweiterte Visibilität und Kontrolle

    Customer Lockbox: Erweiterte Zugriffs-kontrollmöglichkeiten auf Kundendaten

    Advanced eDiscovery:Relevante Daten schneller suchenund finden

    SICHERHEITSchutz wie für

    Großunternehmen

    VOICEUmfassende Kommunikation

    über die Cloud

    ANALYSENBusiness Insights für jeden

    Exchange : Business-class Email & Kalender

    OneDrive: Cloud Speicher und File Sharing

    SharePoint: Team-Seiten & interne Portale

    Skype for Business: Online Meetings, IM, Video Chat

    Microsoft Teams:Chat-basierte Zusammenarbeit

    Yammer: Private Social Network

    Office Pro Plus:Office auf bis zu 5 PCs & Macs

    Mobile Office Apps:Office Apps für Tablets & Smartphones

    OFFICECloud Produktivität &

    Mobilität

    ZUSAMMENARBEITVolle Kommunikation und

    Zusammenarbeit

    Office 365 E3Office 365 E5

  • Edit Master text stylesEdit Master text stylesRudolf Frierss, Partner Channel Development Manager

  • Edit Master text stylesEdit Master text styles

    Enterprise Mobility + SecurityEnterprise-grade security for Cloud and

    SaaS apps

    MicrosoftIntune

    Azure Information Protection

    Protect your users, devices, and apps

    Detect threats early with visibility and threat

    analytics

    Protect your data, everywhere

    Manage identity with hybrid integration to protect application access from

    identity attacks

    MicrosoftAdvanced Threat Analytics

    Microsoft Cloud App Security

    Azure Active Directory Premium

  • Edit Master text stylesEdit Master text styles

    Enterprise Mobility & Security Funktionen

    MicrosoftIntune

    Mobile Device- und App Management um Firmenapplikationen und Datenauf jedem Device zu schützen.

    Managed Mobile Productivity

    Microsoft Advanced Threat Analytics

    Identifizieren Sie verdächtigeAktivitäten & Attacken auf Ihre On-Premise Umgebung.

    Microsoft Cloud App Security

    Garantieren Sie Visibilität, Kontrolleund Schutz Ihrer Cloud Applikationen.

    Identity Driven SecurityIdentity and access management

    Azure Active Directory Premium P1

    Single Sign-on für Cloud und On-Premise Applikationen. GrundlegendeConditional Access Funktionen.

    Azure Active Directory Premium P2

    Erweiterer risiko-basierterIdentitätsschutz mit Warnungen, Analysen, & Wiederherstellung.

    Azure Information Protection Premium P1

    Verschlüsselung für alleDokumentenarten, egal wo siegespeichert werden. Cloud-basiertesDokumentennachverfolgung.

    Existierende Azure RMS Funktionen

    Information Protection

    Azure Information Protection Premium P2

    Intelligente Klassifizierung, & Verschlüsselung von Dokumenten, die innerhalb- und außerhalb des Unternehmens geteilt werden.

    Secure Islands Zukauf

    EMS

    E3EM

    S E5

  • Edit Master text stylesEdit Master text stylesRudolf Frierss, Partner Channel Development Manager

  • Edit Master text stylesEdit Master text styles

    Erreichen sie Großes. Das beste Windows aller Zeiten wird noch besser

    Always up to date

    More productive Powerful, modern devicesMore personalSafer and more secure

    Windows Information Protection

    Windows Hello

    Credential Guard

    Device Guard

    AppLocker

    Windows Defender Advanced Threat Protection

    Azure Active Directory Join

    Mobile Device Management

    Application Virtualization

    (App-V)

    Windows Ink

    Windows Store for Business

    Cortana Management

    Managed User Experience

    User Experience Virtualization (UX-V)

    Windows 10 for Industry Devices

    Innovative designs

    New experiences

    Best in class performance

    The most trusted platform The most versatile devices

  • Edit Master text stylesEdit Master text stylesRudolf Frierss, Partner Channel Development Manager

  • Edit Master text stylesEdit Master text styles

    Secure Productive Enterprise – E3 vs. E5Secure Productive Enterprise Plans

    E3$32/per

    user/month

    E5$57/per

    user/month

    Authoring Word, Excel, PowerPoint, OneNote X X

    Sites & Content management SharePoint, OneDrive X X

    Mail And Social Outlook, Exchange, Yammer X X

    Meetings & VoiceSkype for BusinessPSTN Conferencing, Cloud PBX

    X XX

    Apps & Device ManagementMicrosoft Intune, Azure Active Directory Premium P1

    Windows Store for Business, Microsoft Desktop Optimization Package, VDA

    XX

    XX

    Analytics Power BI, Delve Analytics, Personal and Org Analytics X

    Security & Compliance

    Office 365: Encryption, Data Loss Protection, Rights Management

    Windows 10 Enterprise: Enterprise Data Protection, Windows Hello, Credential Guard, Device Guard, App Locker

    EMS: Microsoft Advanced Threat Analytics, Azure Information Protection P1

    Office 365: Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced Compliance, Threat Intelligence

    Windows 10 Enterprise: Windows Defender Advanced Threat Protection

    EMS: Azure Active Directory Premium P2, Microsoft Cloud App Security, Azure Information Protection P2

    XXXXXXX

    X

    X

    Enterprise Plan Add-ons

    PSTN Calling** Skype for Business

  • Verkaufen in Wellen: Adoption-Usage-Upsell-Cross-sellPa

    rtner

    : Kun

    dene

    nage

    men

    tzum

    Erfo

    lgDem

    Kunden helfenM

    ehrwertzunutzenC

    usto

    mer

    O

    nboa

    rdin

    gTim

    e to Value

    Provide a quick time to value experience

    Accelerated deployment

    Better alignment of working capital against

    business priorities

    Guaranteed uptime

    Secu

    re

    Cons

    umpt

    ion Increased

    Productivity

    Drive customer readiness and usage

    Identify business productivity improvements

    Get work done anywhere

    Increased team collaboration

    Driv

    e Up

    sell

    & C

    ross

    -Sel

    l Business Solution Enabler

    Secure Trusted Advisor status

    Provide full strategic IT vision

    Secure long term service agreement

    Increased business agility

    Protect and control your data

    Increased sales

    Adoption

    Usage

    OptimizationThe partner acts as a Trusted Advisor providing continual support and servicesleveraging the core building blocks of the Microsoft services.

    The customer is able to increase their productivity, secure their

    data and connect with their customers all while better

    aligning their working capital to their business priorities.

    “Most SMB cloud customers begin with an anchor service, then add on satellite services over time.” — McKinsey

    “The post-purchase experience can be a key differentiat+or in cloud.” — McKinsey

    “Identifying the most likely “next product to buy” based on a variety of customer information can be very powerful in

    increasing overall ARPU per customer.” — McKinsey

  • Edit Master text stylesEdit Master text styles

    Das sichere und produktive KMU 2018 Foliennummer 2Foliennummer 3Foliennummer 4Office 365 in SPE E3Office 365 Business vs. Enterprise Foliennummer 7Office 365 Enterprise FunktionenEM+S in SPE E3Enterprise Mobility + SecurityEnterprise Mobility & Security FunktionenW10 in SPE E3Windows 10 Enterprise�Erreichen sie Großes. Das beste Windows aller Zeiten wird noch besserVergleich SPE E3 und E5Secure Productive Enterprise – E3 vs. E5Verkaufen in Wellen: Adoption-Usage-Upsell-Cross-sellDANKE