5. Digital transformation pillars
TRANSFORM
YOUR PRODUCTS
to unlock new
opportunities and
achieve growth
OPTIMIZE YOUR
OPERATIONS
for efficiency,
compliance, and
risk management
ENGAGE YOUR
CUSTOMERS
to help increase
relevance, loyalty,
and profitability
EMPOWER YOUR
EMPLOYEES
to innovate faster
and meet client
needs
Digital Workplace
6.
7. The changing modern workforce
generations together in the
workforce for the first time in human
history
of employee time is spent
collaborating
as many teams as 5 years ago
of employees will be working
remotely by 2020
of meetings have at least one remote
attendee
5
80%
2x
72%
56%
The workplace is more team based and mobile than ever
8. 8
Microsoft 365 EnterpriseMicrosoft 365 Business
Microsoft 365 Business Microsoft 365 E3 & E5Microsoft 365 F1
For large organizations or advanced requirementsFor Firstline WorkersFor organizations with less than 300 people
Microsoft 365 – target companies of all sizes
13. Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
The cybersecurity landscape is rapidly changing
14. Complex and expensive integration
Constant training on new tools
Too many alerts to handle
Gaps in visibility
The ‘best-of-breed’ model is broken
16. This is your security team.
OPERATIONS TECHNOLOGY PARTNERSHIPS
17. Secured with cutting-edge
operational security
• Restricted access
• 24x7 monitoring
• Global security experts
Over 100 datacenters
across the planet.
Global cloud infrastructure
with custom hardware and
network protection.
Trusted cloud at global scale
Our trusted cloud is used
by 95% of Fortune 500
companies.
OPERATIONS TECHNOLOGY PARTNERSHIPS
19. Intelligent EdgeIntelligent Cloud
Stopping cyber attacks
OPERATIONS TECHNOLOGY PARTNERSHIPS
2017
October 2017 – Cloud-based
detonation ML models identified
Bad Rabbit, protecting users 14
minutes after the first encounter.
2018
March 2018 – Behavior-based
detection algorithms blocked more
than 400,000 instances of the
Dofoil trojan.
November 2018 – Behavior-based
protections blocked spear-phishing
campaign on non-profits and
public sector, including first seen
samples.
2019
June 2019 – Next generation protection
exposed and blocked a sophisticated,
fileless Astaroth campaign that would
have been undetectable by traditional
file-based solutions.
Local ML models, behavior-based detection
algorithms, generics, heuristics
Metadata-based ML models
Sample analysis-based
ML models
Detonation-based
ML models
Big data
analytics
20. 20
Microsoft 365 EnterpriseMicrosoft 365 Business
Microsoft 365 Business Microsoft 365 E3 & E5Microsoft 365 F1
For large organizations or advanced requirementsFor Firstline WorkersFor organizations with less than 300 people
Microsoft 365