SlideShare une entreprise Scribd logo
1  sur  10
Microsoft 365 E5
Value and contributions of the E5 offer
This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of
previous plans (M365 F1/E1/E3)
Information Protection
Oversight of cloud and
application usages
Identity and access
management
Protection from advanced
threats
Insider risk management Data governance
Cloud Telephony Dynamic dashboards
Microsoft 365 E5 in one image
 Discovery, Classification and
Automated Data Protection
 Import your encryption key
 Advanced messages encryption
 Discovery, investigation, continuous
analysis and detection of anomalies on
cloud applications
 Visibility of your data in the cloud
 Connection risk assessment
 Management of privileged accounts
 Identity Governance
 Advanced protection of messaging,
documents, SaaS application,
workstation and Active Directory
Automatically identify and protect your
sensitive data wherever it is
Supervise, understand, manage and
protect yourself from the uses and
threats of cloud applications
An interconnected defensive arsenal
against sophisticated and targeted
threats
Protectiion and Governance of Data
Access by Users and Administrators
Educate users and protect yourself from
risky behaviors, whether voluntary or not
 Data Access Approval Workflow
 Supervision of communications
 Ethical wall
 Automated data lifecycle management
 Searching for information (litigation or
internal searches)
Keep, delete and find sensitive data
- automatically -
 Next-generation telephony
 Conference bridge
 Advanced business functions
 Choosing the operator connection
Corporate telephony system integrated
into collaborative suite
 Make the most of your data
 Share dashboards
 Artificial intelligence support
Browse your data and bring out key
metrics in real time
Information Protection
Automatic classification of
documents based on their
sensitivity
Personal Public Confidential
Encryption Watermark
Tracking Revocation
Automatic classification of
your local file servers (and
SharePoint)
Use your own key and
infrastructure for document
encryption
Scan and detect sensitive data
based on policies
Classify and lay data based on
their sensitivity
Apply protection, and actions
such as encryption and
restriction of access
Reports, alerts and
remediation
Protection follows the document
wherever it is, even outside of
Office 365
A scanner identifies, classifies and
protects your local file servers
and SharePoint
In highly regulated contexts, you
can use your own encryption
infrastructure with your keys for
data hosted on Office 365
Advanced e-mail
encryption
Send encrypted messages with
your colors and logos, with the
ability to put an expiration date
or revoke the message
Automatically identify and protect your sensitive data wherever it is
Oversight of cloud and application usages
Discovering Cloud
Applications actually used
Advanced Incident
Investigation Tools
Cloud visibility of your data
 Shadow IT detection
(unapproved applications)
 Application risk assessment
 Understand usages, traffic,
categories
 Investigation of users, files,
activities, locations.
 Quantify exposure and risk
 Block or manage apps
 Monitor and protect
information through apps
 Identify how classified and
unclassified data is shared on
cloud applications and assess
risks
Continuous analysis and
detection of anomalies
 Warnings on abnormal uses
and behaviors
 Alerts on new apps and
trends
Office 365
Salesforce Azure
Box
Aws
DropboxFacebook
TwitterYoutube
Supervise, understand, manage and protect yourself from the uses and threats of cloud applications
Identity and access management
Connection risk assessment
Management of Privileged
Identities
Identity Governance
 Conditional access strategies
for connections and risk-
based sessions
 Identifying vulnerabilities and
accounts at risk
 Investigation into risky events
 Workflow to raise privileges
for admin accounts
 Reducing attack surface in
case of compromised
account
 Protection against internal
risk of malicious
administrators
 Automation of access query
workflows, access
assignments, revisions and
expiration.
 Effectively manage access to
groups, applications and sites
Access review
 User access can be reviewed
regularly to ensure that only
appropriate people continue
to benefit from access
 Managing new hires and
changing jobs
Protection and Governance of Data Access by Users and Administrators
Session
Risk
3
User - role
Known and compliant device
Physical/virtual location
Client and authentication method Strategies
Ask for a 2nd authentication
factor
Allow/deny access
**
**
**
Limited access
Force the password
reset
Context Organization policy Conditioned action Access to data
Protection from advanced threats
Protecting messaging and
documents
Protecting the workstation Active Directory Protection
 Automated protection and
response against malicious
links and attachments
 Protection against identity
theft
 Attack Simulator
 Investigation of attacks
 Overview of global and
industry threats
 Automated Detection and
Response (EDR)
 Ransomware protection and
0-day flaws
 Protection from vulnerability
exploitation
 Reducing the attack surface
and investigating
 Identifying advanced attacks
and internal risks before
damage occurs
 Behavior analysis
 In-depth log analysis
 Detection of compromised
accounts
Protecting cloud
applications
 Threat detection in cloud
applications
 Identifying at-risk
applications
 Internal risk protection (data
exfiltration)
 Detection of compromised
accounts and sessions
An interconnected defensive arsenal against sophisticated and targeted threats
PhishingMail
Opening
Attachment
ClickonURL
Exploit&
Installation
Command&
Control
Useraccount
Compromise
SideMovement Adminaccount
Compromise
Domain
Compromise
Access to sensitive data
by the attacker
Dataexfiltration
End-to-end
attack scenario
Protection Messaging and documents Workstation Active Directory Cloud Apps
Insider risk management
Preventing
information
leakage in
Microsoft Teams
Approval workflow
for data access
Approval workflow
for administrator
privilege
elevations
 Educate and block
users about to share
sensitive information in
chats and group
conversations
 In real time, internally
and externally
 Meet compliance
obligations by
demonstrating an
explicit data access
authorization process
 Controlling access to
content for service
operations
 Reduce attack surface
with admin accounts
with zero standing
access
 Protect yourself from
malicious
administrators
 Workflow for validation
of privilege elevations
Supervision of
communications
 Apply your corporate
rules, ethical
standards, in user
communications
 Manage risk on
sensitive topics by
supervising
communications
 Follow current
regulatory
compliances
Educate users and protect yourself from risky behaviors, whether voluntary or not
Ethical wall
between certain
populations
 Segment certain user
populations by
prohibiting them from
communicating with
each other for
business or
compliance reasons
 Isolate a team or site, if
necessary
Data governance
Automated data lifecycle
management
Import your encryption key
for data at rest
Search for information
(litigation or internal
research)
 Automated detection of
sensitive data and application
of a label based on content
 Set retention or deletion
policies to meet compliance
or quality requirements
 Use your own encryption key
for data at rest in Office 365
 Enjoy the right to be
forgotten through key
revocation
 Meet the compliance
requirements that require
you to use your keys
 Drastically reduce the
number of documents to
review
 Rearrange the results,
through themes, deletion of
duplicates and reconstruction
of conversation threads
 Annotate documents
User and administrator
activity logs
 365-day retention of all user
and admin activities
 Find out quickly who did
what on the data or service
configuration
Keep, delete and find sensitive data - automatically -
Governance Label
 Retention strategy
 Deletion strategy
 Review before deletion
 Record management
 Import third-party data
Supervision
Violation of Strategy
Search for
content
 Insights
 Analysis
 Reports
Data at risk
Cloud Telephony
Next-generation telephony Conference bridge
Advanced business
functions
 Full telephony system in the
cloud to replace your local
PBX system
 There's no need to maintain
local infrastructure
 Conference bridge in
meetings to be reached by
phone
 Responding to group calls
 Line sharing
 Call parking
Choosing the operator
connection
 Direct routing in Microsoft
Teams
 Microsoft Call Package
 Communication credits
Corporate telephone system integrated into collaborative suite
Dynamic dashboards
Do more with your data Sharing culture Artificial intelligence
 Get your data talking
 Publication of dynamic
reports, dashboards
 Reduce the costs, complexity
and challenges of multiples
solutions
 Publication of dynamic
reports in a collaborative
workspace
 Self-service spirit
 Many connectors and visual
options
 Include reports in other apps
 Make sense of unstructured
data (images, text, etc.)
 Ask your questions in natural
language
 Discover the hidden
information that influences
your key metrics
Accessible from anywhere
 From a browser
 From the rich app
 From a smartphone
 From an Office app
 From the intranet
 From Microsoft Teams
Browse your data and bring out key metrics in real time

Contenu connexe

Tendances

Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
BoxHQ
 
LogRhythm E Phi Use Case
LogRhythm E Phi Use CaseLogRhythm E Phi Use Case
LogRhythm E Phi Use Case
jordagro
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIO
Martin Nemzow
 

Tendances (19)

Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues -  How to Address Shadow IT in the EnterpriseDecriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
LogRhythm E Phi Use Case
LogRhythm E Phi Use CaseLogRhythm E Phi Use Case
LogRhythm E Phi Use Case
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And Compliance
 
Data Security
Data SecurityData Security
Data Security
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
C02
C02C02
C02
 
Security In Web Conferencing
Security In Web ConferencingSecurity In Web Conferencing
Security In Web Conferencing
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIO
 

Similaire à Value Microsoft 365 E5 English

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 

Similaire à Value Microsoft 365 E5 English (20)

Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Value Microsoft 365 E5 English

  • 1. Microsoft 365 E5 Value and contributions of the E5 offer This document deals only with the features brought by microsoft 365 E5 and deliberately ignores the features of previous plans (M365 F1/E1/E3)
  • 2. Information Protection Oversight of cloud and application usages Identity and access management Protection from advanced threats Insider risk management Data governance Cloud Telephony Dynamic dashboards Microsoft 365 E5 in one image  Discovery, Classification and Automated Data Protection  Import your encryption key  Advanced messages encryption  Discovery, investigation, continuous analysis and detection of anomalies on cloud applications  Visibility of your data in the cloud  Connection risk assessment  Management of privileged accounts  Identity Governance  Advanced protection of messaging, documents, SaaS application, workstation and Active Directory Automatically identify and protect your sensitive data wherever it is Supervise, understand, manage and protect yourself from the uses and threats of cloud applications An interconnected defensive arsenal against sophisticated and targeted threats Protectiion and Governance of Data Access by Users and Administrators Educate users and protect yourself from risky behaviors, whether voluntary or not  Data Access Approval Workflow  Supervision of communications  Ethical wall  Automated data lifecycle management  Searching for information (litigation or internal searches) Keep, delete and find sensitive data - automatically -  Next-generation telephony  Conference bridge  Advanced business functions  Choosing the operator connection Corporate telephony system integrated into collaborative suite  Make the most of your data  Share dashboards  Artificial intelligence support Browse your data and bring out key metrics in real time
  • 3. Information Protection Automatic classification of documents based on their sensitivity Personal Public Confidential Encryption Watermark Tracking Revocation Automatic classification of your local file servers (and SharePoint) Use your own key and infrastructure for document encryption Scan and detect sensitive data based on policies Classify and lay data based on their sensitivity Apply protection, and actions such as encryption and restriction of access Reports, alerts and remediation Protection follows the document wherever it is, even outside of Office 365 A scanner identifies, classifies and protects your local file servers and SharePoint In highly regulated contexts, you can use your own encryption infrastructure with your keys for data hosted on Office 365 Advanced e-mail encryption Send encrypted messages with your colors and logos, with the ability to put an expiration date or revoke the message Automatically identify and protect your sensitive data wherever it is
  • 4. Oversight of cloud and application usages Discovering Cloud Applications actually used Advanced Incident Investigation Tools Cloud visibility of your data  Shadow IT detection (unapproved applications)  Application risk assessment  Understand usages, traffic, categories  Investigation of users, files, activities, locations.  Quantify exposure and risk  Block or manage apps  Monitor and protect information through apps  Identify how classified and unclassified data is shared on cloud applications and assess risks Continuous analysis and detection of anomalies  Warnings on abnormal uses and behaviors  Alerts on new apps and trends Office 365 Salesforce Azure Box Aws DropboxFacebook TwitterYoutube Supervise, understand, manage and protect yourself from the uses and threats of cloud applications
  • 5. Identity and access management Connection risk assessment Management of Privileged Identities Identity Governance  Conditional access strategies for connections and risk- based sessions  Identifying vulnerabilities and accounts at risk  Investigation into risky events  Workflow to raise privileges for admin accounts  Reducing attack surface in case of compromised account  Protection against internal risk of malicious administrators  Automation of access query workflows, access assignments, revisions and expiration.  Effectively manage access to groups, applications and sites Access review  User access can be reviewed regularly to ensure that only appropriate people continue to benefit from access  Managing new hires and changing jobs Protection and Governance of Data Access by Users and Administrators Session Risk 3 User - role Known and compliant device Physical/virtual location Client and authentication method Strategies Ask for a 2nd authentication factor Allow/deny access ** ** ** Limited access Force the password reset Context Organization policy Conditioned action Access to data
  • 6. Protection from advanced threats Protecting messaging and documents Protecting the workstation Active Directory Protection  Automated protection and response against malicious links and attachments  Protection against identity theft  Attack Simulator  Investigation of attacks  Overview of global and industry threats  Automated Detection and Response (EDR)  Ransomware protection and 0-day flaws  Protection from vulnerability exploitation  Reducing the attack surface and investigating  Identifying advanced attacks and internal risks before damage occurs  Behavior analysis  In-depth log analysis  Detection of compromised accounts Protecting cloud applications  Threat detection in cloud applications  Identifying at-risk applications  Internal risk protection (data exfiltration)  Detection of compromised accounts and sessions An interconnected defensive arsenal against sophisticated and targeted threats PhishingMail Opening Attachment ClickonURL Exploit& Installation Command& Control Useraccount Compromise SideMovement Adminaccount Compromise Domain Compromise Access to sensitive data by the attacker Dataexfiltration End-to-end attack scenario Protection Messaging and documents Workstation Active Directory Cloud Apps
  • 7. Insider risk management Preventing information leakage in Microsoft Teams Approval workflow for data access Approval workflow for administrator privilege elevations  Educate and block users about to share sensitive information in chats and group conversations  In real time, internally and externally  Meet compliance obligations by demonstrating an explicit data access authorization process  Controlling access to content for service operations  Reduce attack surface with admin accounts with zero standing access  Protect yourself from malicious administrators  Workflow for validation of privilege elevations Supervision of communications  Apply your corporate rules, ethical standards, in user communications  Manage risk on sensitive topics by supervising communications  Follow current regulatory compliances Educate users and protect yourself from risky behaviors, whether voluntary or not Ethical wall between certain populations  Segment certain user populations by prohibiting them from communicating with each other for business or compliance reasons  Isolate a team or site, if necessary
  • 8. Data governance Automated data lifecycle management Import your encryption key for data at rest Search for information (litigation or internal research)  Automated detection of sensitive data and application of a label based on content  Set retention or deletion policies to meet compliance or quality requirements  Use your own encryption key for data at rest in Office 365  Enjoy the right to be forgotten through key revocation  Meet the compliance requirements that require you to use your keys  Drastically reduce the number of documents to review  Rearrange the results, through themes, deletion of duplicates and reconstruction of conversation threads  Annotate documents User and administrator activity logs  365-day retention of all user and admin activities  Find out quickly who did what on the data or service configuration Keep, delete and find sensitive data - automatically - Governance Label  Retention strategy  Deletion strategy  Review before deletion  Record management  Import third-party data Supervision Violation of Strategy Search for content  Insights  Analysis  Reports Data at risk
  • 9. Cloud Telephony Next-generation telephony Conference bridge Advanced business functions  Full telephony system in the cloud to replace your local PBX system  There's no need to maintain local infrastructure  Conference bridge in meetings to be reached by phone  Responding to group calls  Line sharing  Call parking Choosing the operator connection  Direct routing in Microsoft Teams  Microsoft Call Package  Communication credits Corporate telephone system integrated into collaborative suite
  • 10. Dynamic dashboards Do more with your data Sharing culture Artificial intelligence  Get your data talking  Publication of dynamic reports, dashboards  Reduce the costs, complexity and challenges of multiples solutions  Publication of dynamic reports in a collaborative workspace  Self-service spirit  Many connectors and visual options  Include reports in other apps  Make sense of unstructured data (images, text, etc.)  Ask your questions in natural language  Discover the hidden information that influences your key metrics Accessible from anywhere  From a browser  From the rich app  From a smartphone  From an Office app  From the intranet  From Microsoft Teams Browse your data and bring out key metrics in real time