Presentation is loading. Please wait.

Presentation is loading. Please wait.

SAM Cybersecurity Engagement

Similar presentations


Presentation on theme: "SAM Cybersecurity Engagement"— Presentation transcript:

1 SAM Cybersecurity Engagement
10/21/2017 3:49 PM SAM Cybersecurity Engagement Name © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Digital technology is transforming how people work More and more organizations are taking intelligence and distributing it to the edge. OPTIMIZE OPERATIONS by reducing risk, cost, and complexity of IT TRANSFORM PRODUCTS by quickly adapting to changing business needs EMPOWER EMPLOYEES with anywhere, anytime, on any device access ENGAGE CUSTOMERS with constant connections and personalized interactions With the arrival of digital transformation, more and more organizations need enhanced visibility and control over their IT infrastructure to take full advantage of the opportunity. Four major areas that provide the greatest potential for digital transformation are the following: Optimize operations - Optimizing business processes often starts with IT infrastructure. Once you divvy up what information you can store where, you can greatly reduce the cost and complexity of IT management with new resources like the Cloud. You also reduce security risks and help maintain compliance. Transform services - If you innovate with agility, and are open to the consistent changes we see in today’s business landscape, you’ll be able to adapt quickly to changing business needs without sacrificing security. Empower your employees – Your employees need to be empowered to safely do their best work from anywhere, at any time, on any device. Engage your customers – You’re expecting new levels of connections with the businesses you partner with and purchase from. In this digital age, you’re experiencing deep personalization and interactive marketing, as well as enjoying the ability to connect with businesses easier than ever before. All of the different types of engagements need to be safe and secure to use.

3 But digital transformation comes with security challenges:
Protection against data breaches and lost revenue Staying current with the latest updates Prevention of credential theft and associated fraud Key points: Cyberattacks cost businesses around the world upwards of $400B annually.1 Research estimates that number could climb to $2.1T by Between apps being downloaded without approval, unmanaged devices being used within the corporate network, poor password protection programs, and more, too many businesses leave themselves vulnerable to attack. What they need is a clear understanding of their IT infrastructure as well as more visibility and control over their IT infrastructure. A Software Asset Management, or SAM, engagement can help identify security risks and compliance issues. Keeping your infrastructure safe and up-to-date with industry standards. 1Stephanie Gandel, “Lloyd's CEO: Cyber attacks cost companies $400 billion every year,” (January 23, 2015) 2Steve Morgan, “Cyber Crime Costs Projected To Reach $2 Trillion by 2019,” (January 17, 2016) MSFT Field - Please view associated material at: Control of unmanaged devices

4 Pave the way for digital transformation by enhancing your security and compliance
A SAM Cybersecurity engagement helps: OPTIMIZE OPERATIONS by reducing risk, cost, and complexity of IT TRANSFORM PRODUCTS by quickly adapting to changing business needs EMPOWER EMPLOYEES with anywhere, anytime, on any device access ENGAGE CUSTOMERS with constant connections and personalized interactions Out of the four areas of digital transformation, a SAM engagement concerning cybersecurity focuses on three: Optimizing operations by reducing security risks and preventing cyberattacks. Empowering employees by giving them secure anytime, anywhere access to information and contacts on any device. Engaging customers by letting you establish secure connections between inside your business and outside with them.

5 Protect against cyberattacks with SAM
A SAM Cybersecurity engagement takes a comprehensive look at your cybersecurity infrastructure, including current software deployment, usage, and licenses. Key insights help you establish the right processes for cyber-risk reduction. Key points: A Software Asset Management (SAM) Cybersecurity engagement provides you with a comprehensive analysis of your cybersecurity infrastructure, including your current software deployment, usage, and licensing data. Working with a Microsoft-certified SAM partner, you’ll receive key insights into how to ensure you have the right processes in place to minimize cyber-risk. We’ll also provide prescriptive guidance and best practices about cybersecurity, freeing you to focus on innovation instead of protection. Minimizing cyber risks helps organizations decrease costs from data loss, fraud associated with theft, loss in revenue, support, employee downtime, cost to locate and reinstall lost data, and a negative reputation. In addition, you can develop a long-term trusted advisor relationship with your customers by establishing credibility and demonstrating customer- focused problem-solving. You also increase customer satisfaction by helping your customers solve critical business challenges.

6 10/21/2017 3:49 PM Value to you A SAM Cybersecurity engagement offers best practices around cybersecurity, freeing you to focus on innovation instead of protection. Control Reduces security risks with added policies and controls Offers full visibility into what’s deployed and makes sure everything is accounted for Optimize Minimizes data loss, fraud, and employee downtime Saves money by combatting cyberattacks and increasing efficiencies Key points: This SAM program is designed to do more than just gather information. It can help you turn information into insight to add greater value to your business. Script: First, we provide you with a comprehensive inventory of all deployed software including Microsoft software, as well as a list of all the devices in your environment, including mobile devices and their make and model. This information helps us with planning and reporting and strengthening security as well as: Identifies how Cloud-based scalability can increase agility Determines the best options for migration I’d like to assure you that we are highly skilled and trained to help simplify data collection. While some work will be required, we keep the workload for your staff to a minimum. We ensure that your data is highly secure throughout this process, enabling you to test any tools that we use for data collection. We use the infrastructure that you already have, whether it’s Altiris, LANDesk, Microsoft System Center, or another tool, without introducing anything new into your environment. We continually share our knowledge along the way, so you can repeat the process yourself in the future. We then help you identify any gaps in your current business processes and work with you to help improve SAM, as well as: Enhance cost management through pay-per-use subscription models Deliver recommendations for improving Cloud licensing Finally, we align the plan for Cloud migration with your organization’s goals. This includes the following: Provides a clear prioritization of what’s ready to migrate Offers insights on costs and technology benefits of moving to the Cloud Align Develops an agile infrastructure to quickly respond to threats Helps you securely manage software assets and promote reliable cybersecurity practices © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 What to expect from a SAM engagement
10/21/2017 3:49 PM What to expect from a SAM engagement Every SAM engagement focuses on four phases PLANNING Identify your needs & goals Gather information on licensing, IT landscape & business organization Discuss project and arrange access & resources DATA COLLECTION Take inventory of hardware, software, and licenses using tools, questionnaires, and stakeholder interviews Gather information on process & procedures DATA ANALYSIS Review & validate all collected data Compare deployed assets with current utilization Map to an optimized environment based on your goals FINAL RECOMMENDATIONS Discuss final recommendations and engage in data-driven discussions to ensure your business needs & goals are met Every engagement will be slightly varied depending on your infrastructure, needs, and goals. At a high level, an engagement can be broken down into four phases: Planning, Data Collection, Data Analysis, and Final Presentation. Planning – The planning phase consists of gathering information from you on your infrastructure, identifying engagement goals, securing appointments and meetings, and arranging access to begin data collection and analysis. Data Collection – The data collection phase consists of the discovery and inventory of software assets using an inventory tool followed by the mapping of inventory data, usage, and license entitlements. This may include a questionnaire and interviews with key stakeholders to ensure all relevant data and information is collected to provide a full and accurate analysis of software deployments, licensing entitlements, and current management processes. Data Analysis – The data analysis phase includes the review and validation of all collected data, the identification of Microsoft license agreements, and the analysis of your long-term virtualization strategy. During this phase, ways to optimize virtual environments and licensing are explored to provide final engagement considerations and recommendations. Final Recommendations – At the conclusion of the SAM Engagement your SAM partner will present their results, recommendations, and next steps in an overview presentation along with a set of detailed reports. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 Next steps Contact your partner for further information. 10/21/2017
© 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "SAM Cybersecurity Engagement"

Similar presentations


Ads by Google