(DO NOT SHOW) SMB To-Customer Presentation

Slides:



Advertisements
Similar presentations
Planning Engagement Kickoff
Advertisements

Office 365 Upsell Paths.
Internal primer Empower Your Employees
The time to address enterprise mobility is now
Deployment Planning Services
Security As a Service Value Proposition
Deployment Planning Services
Office 365 is cloud-based productivity, hosted by Microsoft.
Presenter Date | Location
Office 365 FastTrack Planning Engagement Kickoff
Identity & Access Management for a cloud-first, mobile-first world
Deployment Planning Services
Security as A Service Components
Accelerate GDPR compliance with Microsoft 365
Delve Analytics ! Office Summit /1/2018 2:18 PM
Microsoft /4/2018 8:21 AM BRK3082 Build solutions and apps with Microsoft OneDrive API and Microsoft Graph API Ryan Gregg Principal Program Manger,
Office Online title Mike Morton Partner Group Program Manager
Deployment Planning Services
SaaS Application Deep Dive
Modern application lifecycle with DevOps
Windows 10 and the cloud: Why the future needs hybrid solutions
6/17/ :27 AM BRK3341 Unlock extensibility by connecting your service to PowerApps and Microsoft Flow Theresa (Tessa) Palmer–Sr. Program Manager Sunay.
Microsoft Virtual Academy
Manage mobile productivity with Enterprise Mobility + Security (EMS)
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
Security managed from the cloud.
Azure Hybrid Use Benefit Overview
Information Protection
The utility belt for managing security and compliance in Office 365
Rights Management Services (RMS)
1. Define a Vision & Identify Business Scenarios
Microsoft Intune MAM without Device Enrollment
Microsoft 365 Education – Partner Quick Reference Card
Security for your digital transformation
Prevent Costly Data Leaks from Microsoft Office 365
SAM Financial Services Cybersecurity Assessment
The best way to create and brainstorm with others
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
PostBeyond Delivers an Enterprise Solution That Strengthens Communications with Employees and Integrates Seamlessly with Microsoft Office 365 OFFICE 365.
Welcome to Office 365 Launch Event for PT Prasmanindo Boga Utama
SMB practice development: Security play
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Re-defining the global workforce at Dion Global Pvt. Ltd.
Everything Windows User Group Meeting, Aug 2016
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
SMB practice development: Security play
FastTrack at no additional cost to help get you up and running on EMS
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
What’s new with Microsoft’s project portfolio management
Grow Your Business with Office 365 Yammer: Working Social
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
2/25/2019.
Increase your users productivity through Office 365 user profiles
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Information Protection
Microsoft Virtual Academy
Securely run and grow your business
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Azure AD Simon May Technical Evangelist.
Microsoft Data Insights Summit
What's new in Project Pro for Office365 and Sync to SharePoint Online
Information Protection
Microsoft Virtual Academy
Presentation transcript:

(DO NOT SHOW) SMB To-Customer Presentation 1/25/2018 (DO NOT SHOW) SMB To-Customer Presentation Audience: Small and Mid-Sized Customers and Prospects Usage guide: This narrative is relevant for partners who serve customers with 1-300 employees (SMB). This presentation is designed for you to customize: Cover slide – with three versions Logo – add to slide 17 Business Information – can also be added to slide 17 Key Practice Specialties, examples or other relevant information can be added to this presentation Use case scenarios and other examples may be available to add, and be sure to check Microsoft 365 Partner Site for more and up-to-date information.   © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

SMB Name Date Security & Compliance

SMB Name Date Security & Compliance

SMB Name Date Security & Compliance

43% of cyber-attacks target small business1 The reality for your business today and the importance of proactive security 43% of cyber-attacks target small business1 43% Cyberthreats are becoming more of a reality each day. 43% of cyber attacks target small business.1 This is disrupting how we live and work, how we acquire information and communicate, and what it takes to secure company data. Providing peace of mind that your information and company data are safe is becoming a more important part of how we can work together.   We’ve also found that: People, on average, spend 50% more time today in collaborative activities than 2 decades ago.* However, 43% of SMB owners say that improving their workforce productivity is a top priority**. Teams need to be agile and respond quickly to new information. We’re moving into a world where instant sharing and immediate feedback is the new norm. It’s changing how work gets done. It’s becoming more iterative and collaborative in nature. Meanwhile, people are spending less time at their desks and in one place. In fact, research also shows that 37% of the global workforce is mobile, 42% in 2020.*** Yet things like real-time communication, face-to-face interactions and leveraging collective knowledge are still critical to employee productivity. The opportunity lies in allowing employees to connect and stay productive, even when they aren’t in the room together. At the same time, we’re living in a world where cyberthreats are becoming more of a reality each day. 43% of cyber attacks target small business.† When a small business is attacked, there’s a 60% likelihood they’ll be out-of-business six months later. This is disrupting how you live and work, how you acquire information and communicate, and what it takes to secure your company data. Providing peace of mind that your customer information and company data are safe are becoming more and more important to businesses likes yours. Transition: We understand that you have limited resources; your employees are wearing many hats and are always on the go. You need to be able to run and grow your business from anywhere without interruption, without security concerns. We want to help you and your team work better together, be more productive with mobile solutions, and in a secure environment so that you can focus your time on the things that matter and not IT complexity. * Harvard Business Review, January-February Issue 2016, ‘Collaborative Overload’ ** Techaisle, 2015 SMB ‘Mobility Adoption Trends Study’ ***Strategic Analytics, Global Mobile Workforce Forecast, 2015-2020, November 2015 † Small Business Trends, CYBER SECURITY STATISTICS – Numbers Small Businesses Need to Know, Jan. 3, 2017 1 Small Business Trends, CYBER SECURITY STATISTICS – Numbers Small Businesses Need to Know, Jan. 3, 2017

Cyberthreats by the numbers across 3 key attack zones Microsoft Inspire 1/25/2018 12:36 AM Cyberthreats by the numbers across 3 key attack zones Email User Device 63% Weak, default or stolen passwords Within 4 minutes Open email from attacker 53 seconds A laptop is stolen nearly every minute 58% Accidently share sensitive information Will open attachment/link 55,000 Average devices compromised by Ransomware every month in 2016, 5X increase from 2015, 4X increase in Android base 286 days 80% Non-approved SaaS usage: Shadow IT    We understand that you have limited resources; your employees are wearing many hats and are always on the go. You need to be able to run and grow your business from anywhere without interruption, without security concerns.   But here are some scary stats -- It takes hackers 4 min to get into networks through Email attacks and 286 days detection followed by 80 days for damage control. 55K Ransomware attacks happen every month (5X YOY increase). Security is TOP OF THE MIND for Customers today and now they can choose any starting point depending on their needs and budget 200,000 Detect intrusion 80 days PCs attacked by WannaCrypt across 150 countries Contain damage Data leakage: 90% caused by user mistakes 90% $1 Billion It takes hackers 4 min to get into networks through Email attacks and 286 days for detection followed by an additional 80 days for damage control Average earning of a hacker from Ransomware (FBI guesstimate) © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Can you answer “Yes” to these 5 questions? Do you know who is accessing your data? Can you grant access to your data based on risk in real time? Can you quickly find and react to a breach? Can you protect your data on devices, in the cloud, and in transit? Do your users love their work experience? If not, you may need Security as a Service

SMB customers need Security as a Service Today’s mobile and entrepreneurial workforce extends the business beyond the office and customary work hours. Security as a Service, powered by Microsoft 365, helps businesses stay agile and competitive, while keeping their data, tools and resources accessible, yet more secure, anywhere, anytime. Microsoft 365 provides a modular solution that addresses the IT and Bring-Your-Own-Device (BYOD) challenges of your SMB customers, while providing a secure end-to-end managed cloud environment that encompasses identity, apps, content and devices.

Introducing Microsoft 365 We are living in a time of inflection. Digital transformation is the biggest change any of us has seen in our lifetime. Companies invest in technology to optimize operations, transform products, engage customers, and empower employees. The challenge is finding the way to empower people to do their best work. This starts with fostering a culture of work that is inspiring for everyone, and embraces the trends in the workplace that make work inspiring. To deliver on the tremendous opportunity for business growth and innovation, we are simplifying the customer experience by bringing together Office 365, Windows 10 and Enterprise Mobility + Security with the introduction of Microsoft 365. It’s a complete, intelligent solution that empowers everyone to be creative and work together, securely. Four core principles of Microsoft 365 Intelligent security Unlocks creativity Built for teamwork Integrated for simplicity

Four key areas of Intelligent Security Secure the front door Protection from identity driven breaches, email attacks and attacks targeting OS Secure content Protect content: At the time of creation, in transit, and during consumption Secure devices Workplace issued or BYOD devices Great employee experience Productivity without compromise

Secure the Front Door Identity-Driven Security Go beyond passwords and protect against identity compromise, while automatically identifying potential breaches before they cause damage. Risk-based Conditional Access and Multi-Factor Authentication Advanced security reporting Identify threats on-premises Identify high-risk usage of cloud apps, user behavior, detect abnormal downloads, prevent threats

Secure Content Protect content: creation, transit, consumption Use cloud applications without putting company information at risk by adding protection ranging from access privileges to data encryption. Shadow IT Detection: Discovering Apps and Risk Scoring Intelligent Classification and Tagging of content Document encryption, tracking, revocation Monitoring shared files and responding to potential leaks Data segregation at a device/app level

Secure Devices Workplace Issued or BYOD Devices Manage company and BYOD devices to encrypt data and ensure compliance, automatically detect suspicious activities, and quickly block, quarantine, or wipe compromised devices. Conditional Access Device and App access level controls: PIN Device and App encryption at rest Save-As, Copy, Paste restrictions Device and App level data wipe

Great employee experience Workplace Issued or BYOD Devices Implement tools and policies that empower your employees to be productive and secure on personal and company devices while maintaining control of data. Single Sign-On Self Service Advanced Multi-Factor Authentication App Proxy without the need of VPN

What Microsoft 365 plan is right for you? Microsoft 365 plans provide the right fit for any SMB customer. Security add-ons can be used to tailor a solution that meets specific security and compliance requirements. To find the right starting point, review each of these customer scenarios: DO YOU NEED… Microsoft 365 Enterprise + ATP Office 365 E3 + EMS E3 + ATP Microsoft 365 Business + ATP More than 100 seats? ● Extensive eDiscovery, data governance and compliance tools? To protect highly sensitive data such as financial information, health records, or extensive IP? Real-time threat protection? Enterprise-level protection for cloud applications? On-premises domain controller? A solution that can be managed with little to no in-house IT staff? Support for around 150 PCs? Does not need OS upgrade Needs Mobile Device Management and Mobile Application Management Low Risk Profile Needs Proactive Attack Prevention on OS

Our expertise + Microsoft 365 Space for Partner Logo Our expertise + Microsoft 365 We’re experts at… Supporting point #1 Supporting point #2 Supporting point #3 We can help you… Supporting point #1 Supporting point #2 Supporting point #3 This customizable slide is for talking about your company and its value. You can fill it out with your own information and add your company logo.   We can manage your… Supporting point #1 Supporting point #2 Supporting point #3

Appendix