protect your business against cyber threats and ... · protect content: creation, transit,...

12
Protect your business against cyber threats and information loss CPI 4/14/2020

Upload: others

Post on 08-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Protect your business against cyber threats and information loss CPI

4/14/2020

Page 2: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Benefits of Microsoft 365 Business

Page 3: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Simplify your technology investment

$20monthly

Microsoft 365 Business Comprehensive security against

advanced cyberthreats

Monthly cost of

3rd party solutions > $50

Team planner $10

Chat-based workspace, meetings $13.50

Surveys and forms $8

Email anti-virus and DLP ~$3

Productivity apps and file storage $8

Device management $4.25

Security

Productivity

Information rights management $2

Cloud identity management $3

Page 4: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Why choose this solution?

Integrated with Office 365 and Windows

Built-in: No need to deploy additional products

Streamlined: Protects apps without hogging resources

or requiring clunky add-ons

Deep in the operating system: Resistant to tampering

by malware and hackers

Global scale

Threat intelligence: The world’s largest set of threat-

related optics

AI-powered: Advanced data science turns signals into

actionable intelligence with the Security Graph

Team of experts: Global cybersecurity force working to

combats attacks

Enterprise-grade: Powered by the same technology built

for the world’s largest businesses

Page 5: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Secure the Front Door

Identity-Driven Security

Go beyond passwords and protect against identity

compromise, while automatically identifying potential

breaches before they cause damage.

• Risk-based Conditional Access and Multi-Factor

Authentication

• Advanced security reporting

• Identify threats on-premises

• Identify high-risk usage of cloud apps, user behavior,

detect abnormal downloads, prevent threats

Page 6: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Secure Content

Protect content: creation, transit,

consumption

Use cloud applications without putting company information

at risk by adding protection, ranging from access privileges

to data encryption.

• Shadow IT Detection: Discovering Apps and Risk Scoring

• Intelligent Classification and Tagging of content

• Document encryption, tracking, revocation

• Monitoring shared files and responding to potential leaks

• Data segregation at a device/app level

Page 7: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Secure Devices

Workplace Issued or BYOD Devices

Manage company and BYOD devices to encrypt data and

ensure compliance, automatically detect suspicious activities,

and quickly block, quarantine, or wipe compromised devices.

Shadow IT Detection: Discovering Apps and Risk Scoring

• Conditional Access

• Device and App access level controls: PIN

• Device and App encryption at rest

• Save-As, Copy, Paste restrictions

• Device and App level data wipe

Page 8: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding
Page 9: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Gartner

Security &

Compliance

Magic

Quadrants

Full Report Links:• Access Management

• Enterprise Information Archiving

• Unified Endpoint Management Tools

• Endpoint Protection Platforms

• Cloud App Security Brokers

ACCESS

MANAGEMENT

UNIFIED ENDPOINT

MANAGEMENT TOOLSENTERPRISE INFORMATION

ARCHIVING

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Microsoft.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

CLOUD ACCESS

SECURITY BROKERSENDPOINT PROTECTION

PLATFORMS

Page 10: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

FeaturesOffice 365

Business Premium

Microsoft 365

Business

Office 365

E3

Estimated retail price per user per month $USD (with annual commitment) $12.50 $20.00 $20.00

Maximum number of users 300 300 unlimited

Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint,

OneNote, Access), Office OnlineBusiness Business ProPlus

Email & Calendar Outlook, Exchange Online 50GB 50GB 100GB

Hub for Teamwork Chat-based workspace, online meetings, and more in Microsoft Teams ⚫ ⚫ ⚫

File Storage OneDrive for Business 1 TB/user 1 TB/user Unlimited

Social, Video, Sites Stream, Yammer, Planner, SharePoint Online1, Power Apps1, Flow1⚫ ⚫ ⚫

Business Apps Scheduling Apps – Bookings2, StaffHub ⚫ ⚫ ⚫

Business Apps – Outlook Customer Manager, MileIQ2, Invoicing2⚫ ⚫

Threat Protection Office 365 Advanced Threat Protection ⚫

Microsoft Defender Exploit Guard ⚫

Identity Management Full Azure AD Premium Plan 1 * ⚫

Device & App Management Microsoft Intune ⚫

Windows AutoPilot, Windows Pro Management ⚫

Upgrade rights to Windows 10 Pro for Win 7/8.1 Pro licenses ⚫

Information Protection Azure Information Protection Plan 1, BitLocker Enforcement ⚫

Office 365 Data Loss Prevention ⚫ ⚫

Unlimited email archiving3⚫ ⚫

On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype) ⚫

[1] Indicates Office 365 Business Premium has Plan 1 of the functionality and Office 365 E3 has Plan 2; [2] Available in US, UK, Canada; [3] Unlimited archiving when auto-expansion is turned on

*We are now rolling out the full Azure AD Premium P1 capabilities to new Microsoft 365 Business customers. Rollout to current Microsoft 365 Business subscribers is scheduled thereafter over the next several weeks. For more details refer to the blog announcement.

Comparison of Business Premium, Microsoft 365 Business and Office 365 E3

Page 11: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

Next steps

1. Start with a security assessment to understand your current security situation

2. Learn more about security for SMB’s through aka.ms/SMBSecurityReport

3. See more of the product through taking a guided tour of Microsoft 365

Page 12: Protect your business against cyber threats and ... · Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding

© Copyright Microsoft Corporation. All rights reserved.

Thank you