executive keynote: microsoft - dell technologies us · office 365. on-premises. in the era of cloud...
TRANSCRIPT
![Page 1: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/1.jpg)
Trustworthy Computing: Stay Secure and Productive in a connected, mobile world
Chris PapaphotisCommercial and Partner Director, Microsoft
![Page 2: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/2.jpg)
Our Customers need to evolve in the new Era while Building their Infrastructure on Trust
Cloud is transforming Technology
Technology is transforming Business
![Page 3: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/3.jpg)
86% of CEOs believe technology will transform their business more than any other global trend
26% set a clear vision for digital transformation
Source: Digital Transformation Infographic by Forrester
19% believe their companies have the technology to transform
Source: Digital Transformation nfographic by Forrester
73% of Fortune 500 CEOs said pace of technology change is a challenge
Source: Fortune 500 CEO Survey
Technology is transforming Businesses
![Page 4: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/4.jpg)
“CYBER SECUR IT Y I S A BUSINESS OWNER ISSUE .”
Impact of lost productivity and growth
Average cost of a data breach (15% YoY increase)
$3.0 TRILL ION $3.5 MILL ION
Corporate liability coverage.
$500 MILL ION
In a Connected, Mobile World, Cyber Threats are the MAJOR IT RISK
![Page 5: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/5.jpg)
EVOLUTION OF ATTACKS
Mischief
Script Kiddies
Unsophisticated
Fraud and Theft
Organized Crime
More sophisticated
Damage and Disruption
Nations, Terror Groups, Activists
Very sophisticated and well resourced
![Page 6: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/6.jpg)
Data Breaches & Cybercrime
![Page 7: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/7.jpg)
Traditional Workplace
Multiple Devices
User and Business Owned
Cloud Managed & SaaS Apps
Automated
Proactive
Self-Service
Modern Workplace
Single Device
Business Owned
Corporate Network & Legacy Apps
Manual
Reactive
High-touch
![Page 8: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/8.jpg)
On-premises
Apps & SaaS
Office 365
![Page 9: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/9.jpg)
Office 365
Company-owned and personal devices
On-premises
![Page 10: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/10.jpg)
Data$$
On-premises
Office 365
![Page 11: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/11.jpg)
$$
Office 365
On-premises
In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure
![Page 12: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/12.jpg)
$$
Office 365
On-premises
Data LossMalware
Trojan Horses
Compromised Identity
Virus
Shadow IT
Personal data Leakage
![Page 13: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/13.jpg)
Information Rights ManagementMobile Device
& Application Management
Cloud Access Security Broker
SIEM
Data Loss Prevention
User & Entity Behavioral Analytics
Mobile Data Loss Prevention
Threat Detection
Identity governance
Single-sign on
Cloud Data Loss Prevention
Conditional access
Discovery
Cloud visibility
Secure collaboration
Cloud anomaly detection
Identity & Access Management
![Page 14: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/14.jpg)
Enterprise Security without compromising Productivity
Mobile device & app management
Information protection
Identity and access management
Threat protection
Holistic and innovative solution for protection across users, devices, apps and data
Protect at thefront door
Detect &remediate attacks
Protect yourdata anywhere
![Page 15: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/15.jpg)
Windows 10 Security on Modern Devices (Fresh Install or upgraded from 64-bit Windows 8 )
POST-BREACHPRE-BREACH
Mobile device & app management
Information protection
Identity and access management
Threat protection
Detect and Remediate Advanced Attacks
![Page 16: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/16.jpg)
WINDOWS DEFENDER ADVANCED THREAT PROTECTION
DETECT ADVANCED ATTACKS AND REMEDIATE BREACHES
Unique threat intelligence knowledge base Unparalleled threat optics provide detailed actor profiles1st and 3rd party threat intelligence data.
Rich timeline for investigationEasily understand scope of breach. Data pivoting across endpoints. Deep file and URL analysis.
Behavior-based, cloud-powered breach detectionActionable, correlated alerts for known and unknown adversaries. Real-time and historical data.
Built in to WindowsNo additional deployment & infrastructure. Continuously up-to-date, lower costs.
![Page 17: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/17.jpg)
Mobile ProductivityEnable a mobile experience that works
the way employees want it to.
Device choice
Easy accessto resources
Self-service options
Familiar Office apps
Data Protection Ensure that the right data protection
is applied to the right scenarios.
User, device, app,file control
Conditional access
Protectionafter access
Management Tools and services that empower IT pros to do strategically more with less.
Unified management Cloud-based scalability and reliability
24/7
Deployment support
Enable Mobile Productivity without compromising Security
![Page 18: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/18.jpg)
Intelligent security
Unlocks creativity
Built for teamwork
Integratedfor simplicity
Digitally Transforming the Modern Workplace
Lead your Customers to Cloud withModern Desktop deploying Genuine Windows 10 & Office 365. Evolve to Microsoft 365.
- Creativity- Communication- Collaboration- Productivity
- Security & Compliance- Simple Administration- Lower TCO- New culture of Work
Microsoft 365
![Page 19: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/19.jpg)
Discover Manage Protect Report
Microsoft cloud services make it easier to locate and identify the personal data you collect, so you can more easily find and evaluate the data across your organization.
Microsoft cloud services make it possible to centralize processing by more effectively managing applicable policies, data categorizations, and use cases.
Microsoft cloud services synthesize threat intelligence and provide tools that help you get the greatest benefit from that intelligence for your security efforts.
Microsoft cloud services centralize and streamline technical and administrative steps that are required for compliance, such as demonstrating due diligence and handling data access requests.
Office & Office 365:Data Loss PreventionAdvanced Data GovernanceOffice 365 eDiscovery
Enterprise Mobility + Security (EMS):Microsoft Cloud App Security
Windows 10:PowerShell
Dynamics 365: Audit Data and User ActivityReport & Analytics with Dynamics 365Dynamics 365 metadata & data models
SQL Server and Azure SQL Database:SQL Query Language
Microsoft Azure:Microsoft Azure Data Catalog
Windows 10 & Windows Server 2016:Microsoft Data Classification Toolkit
Office & Office 365: Advanced Data Governance
Enterprise Mobility + Security (EMS):Microsoft Azure Information Protection
Windows 10:Permissions
Dynamics 365:Security concepts for Microsoft Dynamics 365
Enterprise Mobility + Security (EMS):Azure Active Directory (Azure AD)Azure Active Directory PremiumCloud App SecurityMicrosoft Cloud App SecurityMicrosoft IntuneMicrosoft Azure Information Protection
SQL Server and Azure SQL Database:Azure SQL Database firewallSQL Server authenticationDynamic Data Masking (DDM)Row-Level Security (RLS)Transparent Data EncryptionAlways EncryptedAuditing for SQL Database and SQL Server auditSQL Database Threat Detection
Microsoft Azure:Azure Security CenterData Encryption in Azure StorageAzure Key VaultLog Analytics
Windows 10 & Windows Server 2016:Windows HelloWindows Defender AntivirusWindows Defender Advanced Threat ProtectionDevice GuardCredential GuardBitLocker Drive EncryptionWindows Information ProtectionShielded Virtual MachinesJust Enough Administration and Just in Time Administration
Office & Office 365: Advanced Threat ProtectionThreat IntelligenceAdvanced Security ManagementOffice 365 Audit Logs
Office & Office 365: Service AssuranceOffice 365 Audit LogsCustomer Lockbox
Windows 10:Windows Defender Advanced Threat Protection (ATP)
Dynamics 365Report & Analytics with Dynamics 365
Microsoft Azure:Azure Auditing and Logging
Enable Compliance without compromising Productivity
![Page 20: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/20.jpg)
Identity and Access Management
Virtualization Based Security / Advanced Threat Protection
Compliance and Data Protection
Threat Protection and Information Protection
BUSINESS I S BUILT ON TRUST . TRUST I S BUILT ON GENUINEP R OT E C T Y O U R I T I N V E S T M E N T U S I N G M O D E R N D E V I C E S W I T H P R O P E R LY L I C E N S E D S O F T WA R E
![Page 21: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/21.jpg)
Source: BSA
![Page 22: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/22.jpg)
Source: BSA
![Page 23: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/23.jpg)
Workshop: A survival guide on building a secure IT Infrastructure in Modern Workplace
![Page 24: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/24.jpg)
Software price is too good to be true.
Software comes from file sharing apps or is circulated through email, social networks or websites.
Product keys are sold separately from software or they come in bundles of multiple product keys.
Packaging has been opened or is not standard Microsoft packaging.
Product key or installation code doesn’t work, or the software cannot be activated.
Software comes in non-standard or unprofessional packaging.
They are asked to download files to complete activation.
Their PC or other device comes with software already activated.
It is very likely that Customers are victims of Piracy when:
![Page 25: EXECUTIVE KEYNOTE: Microsoft - Dell Technologies US · Office 365. On-premises. In the Era of Cloud Apps and Mobily, IT goes beyond legacy Infrastructure ... Microsoft Data Classification](https://reader033.vdocument.in/reader033/viewer/2022050214/5f6014d3027e185666531edd/html5/thumbnails/25.jpg)
THANK YOU