all industries are investing heavily in digital€¦ · decision ceos must make in 2016 is to $...
TRANSCRIPT
All industries are investing heavily in digital transformation
Source: IDC, PAC, Gartner, Markets and Markets, MGI analysis
1 2016 calculated based on 2015 actuals from Gartner plus an 8% CAGR
$151
billionForecasted
digital
transformation
spend for top
ten highest-
spending
industries
Public sector
Telco and media
Advanced manufacturing
Retail/wholesale trade
Health
Professional services
Basic goods
manufacturing
Utilities
Transportation
1
2
3
4
5
6
7
8
9
10
2016
$ Billions
Financial services
6
7
9
12
12
15
19
19
20
32
2019
20161 151
200 - 239
$ billions
Forecasted digital transformation spend 2016-19
Organizations can’t transform to digital unless people do
Top of mind for business leaders and their digital transformation
Leaders embracedigital-first to fast track transformation ADIA
Harness informationto change the way youdo business
Digital transformation =
Cultural shifttechnology problem 1
of the respondents
identified IoT
initiatives — and
related machine-to-
machine and telematics projects — as
new areas of spending for the year ahead 8
RIGHT SKILLS
The most commonly cited
barrier to digitization for
most CIOs 2
shortage
Central to any
digital workplace
initiative:
increasing the
involvement of the
employee community in
technology strategies 3
of CIOs with hiring plans are in
search of people with combined
42%
TECH BUSINESS+backgrounds 4
Most important
decision
CEOs must
make in
2016 is to$invest in data
science
development 5
The CIO’s challenge is
to convince the entire
enterprise that
“SECURE BY DESIGN”
should be treated as a
business priority 6
By 2018,
AI will be
incorporated
into
1/2of all apps developed. By
2020, savings garnered by AI-
enabled efficiencies are
expected to total an estimated
60B for U.S.
enterprises 7
29%
30%By the end of 2016,
of businesses will have begun monetizing
their information assets, which is fueling
an information-driven
economy targeted at $156B 9
1 Forrester Research. The race to digital mastery is on in 2016. Forrester.November 11, 2015.
2 Andy Rowsell-Jones, et al. 2016 CIO Agenda: Global Perspectives onBuilding the Digital Platform. Gartner. February 23, 2016.
3 Matthew W. Cain and Paul Miller. Recipe for Digital Workplace Execution:Transform the Employee Experience. Gartner. March 3, 2016.
7 John Dodge. Who’s in charge of AI in the enterprise? CIO. February 15, 2016. 8 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now
(and one to ignore). CIO. December 1, 2015. 9 Mike J. Walker, et al. Top 10 Strategic Technology Trends for 2016:
Information of Everything. Gartner. February 26, 2016.
4 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now(and one to ignore). CIO. December 1, 2015.
5 Ken McGee and Mark Raskino. The Most Important Digital Business DecisionSenior Executives Must Make in 2016. Gartner. February 16, 2016.
6 Marcus Shingles et al. Tech Trends 2016: Innovating in the digital era.Deloitte. February 22, 2016.
The Time is Now
From presentations, to conversations• Accelerating conversations as business requires.• Real-time crowd sentiment• On and Off conversations• Rich more employees
Intelligent Cloud
Reinventing Productivity & Business Process
More PersonalComputing
Aligning our priorities
Security
Industryscenarios
Horizontalscenarios
Focusing on customer success
Products Services Partners
Intelligent Cloud
Reinventing Productivity & Business Process
More PersonalComputing
Aligning our priorities
Changing the conversation
Trust
Engage your
customers
Empower your
employees
Optimize your
business
Transform your
products
Making digital transformation real
Interactuamos con casi el 2x de equipos que hace 5 años*
41% de los usuarios declara que las apps móviles están cambiando la forma de trabajar*
La sobrecarga de información hacemalgastar el 25% del tiempo de losempleados (costing U.S. business $997B each year)*
160M de datos de clientes filtrados *
229 días para detectar una infiltraciónde seguridad*
* Multiple industry sources.
Nuestra Visión del
Modern Workplace
CENTRADAS EN L AS MÁQUINAS
DESKTOP
NO CONECTADAS, CABLEADAS
ÚNICO DISPOSTIVO PERSONAL
TECLADO Y RATÓN
INDIVIDUAL
FÍSICO, DIGITAL
CENTRADAS EN L AS PERSONAS
MÓVIL
SIEMPRE CONECTADO, MÓVIL
MÚLTIPLES DISPOSITIVOS POR PERSONA
VOZ, TACTO, TINTA (NATURAL)
GRUPO, SOCIAL
CONVERSACIONAL, BIOLÓGICA
[ NUEVAS INTERACCIONES ]
[ NUEVAS ORGANIZACIONES ]
[ NUEVOS HÁBITOS ]
ECOSISTEMA DE CAMBIO
COMPARTIR
OPTIMIZAR EL USO DEL E-MAIL
REUNIONES MÁS INTELIGENTES
REDUCCIÓN DE IMPRESIÓN
TENER INQUIETUD POR INNOVAR
ESCUCHAR AL CLIENTE
… PERCEPCIÓN +ACTIVA SEGURIDAD
Introducing Microsoft Teams
Privacidad
Personal
GDPR is here!
Controles y
notificaciones
Políticas
transparentes
IT, formación y
contratos
Necesidad de invertir en:
• Formación a empleados
sobre privacidad
• Políticas de datos
• Data Protection Officer
(DPO) (si + de 250
empleados)
• Seguridad
• Contratos
Processor/Vendor
• Estrictos requisitos de
Seguridad
• Obligación de reportar
brechas de seguridad
• Consentimiento
apropiado para el
proceso de datos
• Confidencialidad
• Mantenimiento de
registros
Individuos con derechos a:
• Acceso a sus datos
personales
• Corrección de errores en sus
datos personales
• Borrar sus datos personales
• Oponerse al procesamiento
de sus datos personales
• Exportar sus datos
personales
Políticas transpàrentes y de
facil acceso sobre:
• Notificación sobre
recogida de datos
• Notificación sobre
procesamiento
• Detalles del
procesamiento
• Retención y borrado de
datos
Privacidad
Personal
¡Ojo! GDPR = Hábitos + Secured-by-design Tech
Controles y
notificaciones
Políticas
transparentes
IT, formación y
contratos
Necesidad de invertir en:
• Formación a empleados
sobre privacidad
• Políticas de datos
• Data Protection Officer
(DPO) (si + de 250
empleados)
• Seguridad
• Contratos
Processor/Vendor
• Estrictos requisitos de
Seguridad
• Obligación de reportar
brechas de seguridad
• Consentimiento
apropiado para el
proceso de datos
• Confidencialidad
• Mantenimiento de
registros
Individuos con derechos a:
• Acceso a sus datos
personales
• Corrección de errores en sus
datos personales
• Borrar sus datos personales
• Oponerse al procesamiento
de sus datos personales
• Exportar sus datos
personales
Políticas transpàrentes y de
facil acceso sobre:
• Notificación sobre
recogida de datos
• Notificación sobre
procesamiento
• Detalles del
procesamiento
• Retención y borrado de
datos
“THERE ARE TWO KINDS OF COMPANIES, THOSE WHO’VE BEEN HACKED, AND THOSE
WHO DON’T KNOW THEY’VE BEEN HACKED.”
J A M E S C O M E Y , D I R E C T O R F B I
Median number of days attackers are present on a
victims network before detection
200+Days after detection to
full recovery
80Impact of lost productivity
and growth
$3TRILLION
Average cost of a data breach (15% YoY increase)
$3.5MILLION
COMO OCURREN LOS INCIDENTES?
No solo hay que preocuparse del Malware y de las Vulnerabilidades
99.9%de las Vulnerabilidades fueronexplotadas un año despues de la publicación de su CVE
46%de los Sistemas comprometidos no tenían ningún tipo de Malware
50%De los que abrieron y clickearon el adjnto, lo hicieron en la primerahora
23%de los destinatarios abrieron el mensaje de phising (el 11% hizoclick en los adjuntos)
Los ataquesrápidos y
efectivos de phising te dejanpoco tiempo de
respuesta
PwC’s Digital Services
Confidential information for the sole benefit and use of PwC’s client.
1
7
PwC’s Digital ServicesPwC’s Cyber Services – Digital Transformation
“Everyone has a plan 'till they get punched” Mike Tyson
Hay que estar bien preparado y entrenadopara hacer frente a los problemas en
situaciones de crisis.
“By 2020, a corporate
‘no-cloud’ policy will be
as rare as a ‘no-internet’
policy is today.”1
“The question is no longer:
‘How do I move to the
cloud?’ Instead, it’s ‘Now
that I’m in the cloud, how
do I make sure I’ve
optimized my
investment and risk
exposure?”2
“By 2020 clouds will stop
being referred to as
‘public’ and ‘private’. It
will simply be the way
business is done and IT
is provisioned.”3
1Gartner: Smarter with Gartner, Why a No-Cloud Policy Will Become Extinct, February 2, 2016
2KPMG: 2014 Cloud Survey Report, Elevating business in the cloud, December 10, 2014
3IDC: IDC Market Spotlight, Cloud Definitions and Opportunity, April 2015
Propuesta de ValorAlineado con las necesidades del negocio y el entorno actual de amenazas
Ofrecer una única identidad
protegida para asegurar el
acceso seguro a todos los
recursos corporativos, on-
premises y en nube, con
acceso condicional basado
en perfiles de riesgos.
Impulsada por la Identidad
Proteger los datos de
nuevos y cambiantes
ataques de
ciberseguridad.
Innovadora
Mejora la detección de
amenazas y detección de
anomalías con nuestra el uso
de Microsoft Intelligent
Security Graph impulsado por
un gran numero de datasets
y machine learning en la
nube
Inteligente
Dirigida a los retos de la
seguridad sobre los usuarios
(identidades), dispositivos,
datos, apps y plataformas –
on-premises y en la nube
Holística
Visión de las Soluciones de Seguridad de Microsoft
Information Rights Management
x2.25
Multifactor Authentication
x2.25
Protect with and without enrollment
x2.25
Personal apps
Corporate appsCorporate data
Personaldata
Multi-identity policy
Corporate data
Personaldata
Multi-identity policy
Advanced Threat Intelligence built over Security Graph
Finance
Important
Locky
Targeted
Credit cards
Infected
Linda
Malware
Sensitive
Phish
InfectedGopi
Advanced Threat Protection
Advanced eDiscovery
“Make no mistake, the GDPR sets a new and higher bar for privacy rights, for security, and for compliance.
And while your journey to GDPR may seem challenging, Microsoft is here to help all of our customers around the world.”
Brad Smith
President & Chief Legal OfficerMicrosoft Corporation
Our Terms of Service contractually commit the
Microsoft Cloud to meet all Data Processor
requirements under GDPR when enforcement begins
on May 25, 2018.
We will share our experience in complying with
GDPR as a Data Controller and Data Processor.
Together with our partners, we will help you meet
the people, policy, process, and technology
obligations on your own GDPR journey.
West US
West US 2
Microsoft infrastructure investments38 Cloud Geographies
Central US
East US
North Central US
Brazil South
West Europe
Japan East
South India
Southeast
Asia
Australia Southeast
Australia East
Central India
West India
Japan West
East Asia
China West1
North EuropeGermany
Northeast2Canada East
Canada Central
South Central US
China East1
Germany
Central2
Korea South
East US 2
Korea Central
United Kingdom West
United Kingdom
South
West Central US
US Gov Virginia
US Gov Iowa
US DoD East
US DoD
West
France3
France3
100+ datacenters
Top 3 largest networks in the world
1China datacenters operated by 21 Vianet
2German data trustee services by T-systems
3France, and US Gov datacenter regions have
been announced but are not currently
operational
Sovereign datacenters
Global datacenters
US Gov Texas3
US Gov Arizona3
GDPR + Office Product Mapping
DiscoverRight to Erasure
Right to Data Portability
ManageDocumentation
Privacy by Design
ProtectData Security
Data Transfer
ReportDocumentation
Breach Response and Notification
Security & Compliance CenterA one-stop portal for protecting your data in Office 365. Grant permissions to people who perform compliance tasks.
Data Loss PreventionUnified policies covering client end-points, empowering IT pros
Advanced Data GovernanceClassify, preserve and/or purge data based on automatic analysis and policy recommendations
Content searchrun very large searches across mailboxes, public folders, Office
365 Groups, Microsoft Teams, SharePoint Online sites, One Drive
for Business locations, and Skype for Business conversations
Data Governancearchive and preserve content in Exchange Online mailboxes,
SharePoint Online sites, and OneDrive for Business locations,
and import data into your Office 365 organization.
Threat Managementhelps you control and manage mobile device access to your
organization's data, help protect your organization from data
loss, and help protect inbound and outbound messages from
malicious software and spam
Audit Logsrecord and search desired user and admin
activity across your organization
eDiscovery use cases to manage access, place a hold on content locations
relevant to the case, associate multiple Content Searches with
the case, and export search results
Information Rights Managementprevent sensitive information from being printed, forwarded,
saved, edited, or copied by unauthorized people
Advanced Threat Protectionprovides security functions that protect user environments that
contain consumer data including Safe Attachments & Safe Links
Service Assurancedeep insights for conducting risk assessments
with details on Microsoft Compliance reports
and transparent status of audited controls.
Advanced eDiscoverysignificantly reduce cost and effort to identify relevant
documents & data relationships by using machine learning to
train the system to intelligently explore large datasets
Threat Intelligenceanalyze and understand their local threat environment, including
malware detected, targeted users, and links to global security
stats
Customer Lockboxcontrol how a Microsoft support engineer
accesses your data during a help session
Advanced Security Managementgain enhanced visibility and granular security controls and
policies including the ability to suspend user accounts, revoking
access to personal data
Secure Scoreinsights into your security position and what features are
available to reduce risk while balancing productivity and security
Office 365 is a highly secure, intelligent and comprehensive cloud-based productivity platform. Office 365 enables you to keep your enterprises’ users and data protected both in
transit and at rest. When you entrust your data to Office 365, you remain the sole owner: you retain the rights, title, and interest in the data. Company Officers can use the rich
collaboration and analysis tools of Office 365 to maintain their policies, automate workflows & track responsibilities related to GDPR and other business requirements.
Por qué Microsoft?
Microsoft is the cloud service provider you can trust
We stand behind you through contractual commitments for our cloud services with a fully-transparency approach
Since March 2.017, all licensing agreements complies with GDPR Regulation
Our commitment to Cloud Trust leverages across security, privacy, transparency & compliance
You have visibility into our practices and the right to understand how we handle your data
CULTURE TECHNOLOGY
INSIGHTSORGANIZATION
Microsoft accelerates the maturity of your digital transformation strategy
By leveraging our 3 bold ambitions and network of partners to
(*) Forrester Digital Maturity Model
Inspire your local teams to embrace change
Provide specialist resources to develop skills
Simplify platforms & Automate process to accelerate adoption
Measure Success with Actionable Insights
By integrating all your strategic services into a single solution
Reducing vendor & PO’s management overloads
Saving costs on atomized security and communication service providers
Simplifying platforms and improving your employees IT experience
Microsoft consolidates your vendor management
These graphics were published by Gartner, Inc. as part of larger research documents and should be evaluated in the context of each entire document. The Gartner documents are available upon request from Microsoft.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of
Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner has named
Microsoft a leader
in all seven Magic
Quadrants for cloud-based
solutions based on its ability
to execute and
completeness of vision.
x86 Server virtualization Cloud IaaS Cloud PaaS
Public cloud storage services BI and analytics platforms Social software in the workplace Sales force automation
Gartner “Magic Quadrant for x86 Server Virtualization Infrastructure,” by Thomas J. Bittman,
Mark A. Margevicius, Philip Dawson, July 2, 2014
Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” by Lydia Leong, Douglas
Toombs, Bob Gill, Gregor Petri, Tiny Haynes, May 28, 2014
Gartner “Magic Quadrant for Enterprise Application Platform as a Service,” by Yefim V. Natis,
Massimo Pezzini, Mark Driver, David Mitchell Smith, Kimihiko Iijima, Ross Altman, January 7, 2014
Gartner “Magic Quadrant for Business Intelligence and Analytics Platforms,” by Rita L. Sallam,
Joao Tapadinhas, Josh Parenteau, Daniel Yuen, and Bill Hostmann, February 20, 2014
Gartner “Magic Quadrant for Public Cloud Storage Services,” by Gene Ruth, Arun
Chandrasekaran, July 9, 2014
Gartner “Magic Quadrant for Social Software in the Workplace,” by Nikos Drakos, Jeffrey
Mann, Mike Gotta, September 3, 2014
Gartner “Magic Quadrant for Sales Force Automation,” by Robert P. Desisto, July 15, 2014
44
Register and watch The Expert’s View: The future decoded. We’ll dive
deeper into what’s in store for organizations in the future, and take a
closer look at innovation, collaboration, and security trends to help
organizations prepare for what’s ahead
Office 2016
Office for Mac 2016
Office 365 Video
PSTN Calling* & Conferencing
Cloud PBX
SharePoint Online – ‘SharePoint
home’ & ‘Site contents’ page
redesign
Bookings, Planner, Sway
MyAnalytics
Power BI Pro
PowerPoint Designer and
Morph
Outlook on iOS
Outlook on Android
Universal Office
OneDrive sync client
Advanced Threat Protection
Customer Lockbox
Advanced eDiscovery
Compliance Center
Compliance Search
Advanced Security
Management
Skype for Business for Mac
GigJam
MileIQ, xRM
CollabDB
Workplace Analytics
Cortana & Office 365
Office Graph Extensibility
Word writing assistant
Inking
OneNote Universal
Outlook Mobile on
Office 365
Threat Intelligence
Advanced Data Governance
Admin Service Health
Dashboard
Support for Windows
Information Protection
Enterprise Mobility + Security
Suite
Unified Comms IntelligenceMobility Security
© Copyright Microsoft Corporation. All rights reserved.