SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Simplify security.
Save 52%
Cut the complexity and the costs
David J. Rosenthal
VP & GM, Digital Business
May 28, 2020
1 https://go.forrester.com/blogs/tech-titans-google-and-microsoft-are-transforming-cybersecurity/
Simplify security.
Save 52%
Ever-expanding digital
estate is difficult to protect
Growing landscape
Too many vendors
and products to manage
increases risk profile
Complex solutions
Increasing costs and risks
to protect landscape and
manage complex solutions
Mounting costs
Fewer vendors and products
to manage
Less end-user friction
and resistance
Lower integration costs
Reduced blind spots
Category Competition Does Microsoft 365 do it?
Identity & access
management
Threat protection
Information protection
Unified endpoint
management
Okta, Ping, Centrify, Duo, OneLogin, SailPoint
Symantec, FireEye, McAfee, Crowd Strike, Cylance, Fortinet,
Kaspersky Lab, Proof Point, Mimecast, TrendMicro, Javelin,
Preempt, CyberArk, Exabeam, Rapid 7
Symantec, Titus, Bolden James, Zix, Virtru
VMware, Cisco, IBM, MobileIron
CASB McAfee, Netskope, Symantec, Bitglass
Security solutions
Microsoft 365 E5 covers
Security solutions other
Microsoft solutions cover
What Microsoft
Services/MSSPs/
ISVs cover
What Microsoft
integrates with
What Microsoft doesn’t do
can replace up to
26 other security
vendors
SingleSign-on(SSO)
Reporting
Pen Testing/ Risk Assessment
Examples of multi-vendor standalones
Replace 26 vendors
52% savings
$13 PER USER DIFFERENCE
Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative.
Security
($5)
($5)
($5)
Email protection
Identity and access management
Intrusion detection, investigation, prevention,
and threat intelligence
$25 PER USER
$12 PER USER
Microsoft 365 E5 Security
add-on to Microsoft 365 E3
Full suite
Endpoint protection and response
Cloud Access Security Broker
($4)
($6)
Brute force account or use
stolen account credentials Attacker collects
reconnaissance &
configuration data
Command
& Control
Exploitation
& Installation
Click a URL
Phishing
mail
Open
attachment
Exfiltrate data
Attacker accesses
sensitive data
Privileged account
compromised
Attacker attempts
lateral movement
Domain
compromised
User account
is compromised
Brute force account or use
stolen account credentials Attacker collects
reconnaissance &
configuration data
Command
& Control
Exploitation
& Installation
Click a URL
Phishing
mail
Open
attachment
Exfiltrate data
Attacker accesses
sensitive data
Privileged account
compromised
Attacker attempts
lateral movement
Domain
compromised
User account
is compromised
Azure AD Identity Protection
Identity protection & conditional access
Microsoft Cloud App Security
Extends protection & conditional
access to other cloud apps
Office 365 ATP
Malware detection, safe links,
and safe attachments
Microsoft Defender ATP
Endpoint Detection and Response
(EDR) & End-point Protection (EPP)
Azure ATP
Identity protection
Integrated & coordinated
threat protection:
Correlated incidents
Centralized view of
automated workflows
Advanced hunting across
email and endpoints
Example: 5,000 users, 3 years
101% ROI
NPV = $23.5M, $4,696/user
10.25% reduced TCO
11.3 months faster adoption
as a unified solution
10-15% across-the-board
productivity improvement
Forrester Total Economic Impact™ (TEI) Achieving Digital Business Transformation With Microsoft 365 Enterprise E5:
A Total Economic Impact Analysis, September 2017
Third-party security solutions can
be replaced with those built into
EMS, Windows 10, and Office 365
$1.05MPV total savings
in end-user data breaches
($3.3M PV saved in remediation
and other related costs)
55.3%Reduction
Microsoft security workshop
Security discovery
Security immersion experience
Threat check
Let’s get started
© 2020 Razor Technology www.razor-tech.com
@DavidJRosenthal
SlideShare
www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Office: 866.RZR.DATA
LETS KEEP IN TOUCH
18

Más contenido relacionado

Más de David J Rosenthal

What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft Viva
Microsoft VivaMicrosoft Viva
Microsoft Viva
David J Rosenthal
 

Más de David J Rosenthal (20)

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 
What is Microsoft Teams
What is Microsoft TeamsWhat is Microsoft Teams
What is Microsoft Teams
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from Microsoft
 
Microsoft SharePoint Syntex
Microsoft SharePoint SyntexMicrosoft SharePoint Syntex
Microsoft SharePoint Syntex
 
Microsoft Viva
Microsoft VivaMicrosoft Viva
Microsoft Viva
 
Secure Access to Your Enterprise
Secure Access to Your EnterpriseSecure Access to Your Enterprise
Secure Access to Your Enterprise
 
Build Agile Business Processes With Power Apps in Modern Workplace
Build Agile Business Processes With Power Apps in Modern WorkplaceBuild Agile Business Processes With Power Apps in Modern Workplace
Build Agile Business Processes With Power Apps in Modern Workplace
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Simplify Security with Microsoft

  • 1. Simplify security. Save 52% Cut the complexity and the costs David J. Rosenthal VP & GM, Digital Business May 28, 2020
  • 2.
  • 4.
  • 6. Ever-expanding digital estate is difficult to protect Growing landscape Too many vendors and products to manage increases risk profile Complex solutions Increasing costs and risks to protect landscape and manage complex solutions Mounting costs
  • 7. Fewer vendors and products to manage Less end-user friction and resistance Lower integration costs Reduced blind spots
  • 8. Category Competition Does Microsoft 365 do it? Identity & access management Threat protection Information protection Unified endpoint management Okta, Ping, Centrify, Duo, OneLogin, SailPoint Symantec, FireEye, McAfee, Crowd Strike, Cylance, Fortinet, Kaspersky Lab, Proof Point, Mimecast, TrendMicro, Javelin, Preempt, CyberArk, Exabeam, Rapid 7 Symantec, Titus, Bolden James, Zix, Virtru VMware, Cisco, IBM, MobileIron CASB McAfee, Netskope, Symantec, Bitglass
  • 9. Security solutions Microsoft 365 E5 covers Security solutions other Microsoft solutions cover What Microsoft Services/MSSPs/ ISVs cover What Microsoft integrates with What Microsoft doesn’t do can replace up to 26 other security vendors SingleSign-on(SSO) Reporting Pen Testing/ Risk Assessment
  • 10. Examples of multi-vendor standalones Replace 26 vendors 52% savings $13 PER USER DIFFERENCE Web Direct/Base Price shown for Microsoft offerings. Multi-vendor prices based on publicly available estimated pricing for other vendor solutions and are illustrative. Security ($5) ($5) ($5) Email protection Identity and access management Intrusion detection, investigation, prevention, and threat intelligence $25 PER USER $12 PER USER Microsoft 365 E5 Security add-on to Microsoft 365 E3 Full suite Endpoint protection and response Cloud Access Security Broker ($4) ($6)
  • 11. Brute force account or use stolen account credentials Attacker collects reconnaissance & configuration data Command & Control Exploitation & Installation Click a URL Phishing mail Open attachment Exfiltrate data Attacker accesses sensitive data Privileged account compromised Attacker attempts lateral movement Domain compromised User account is compromised
  • 12. Brute force account or use stolen account credentials Attacker collects reconnaissance & configuration data Command & Control Exploitation & Installation Click a URL Phishing mail Open attachment Exfiltrate data Attacker accesses sensitive data Privileged account compromised Attacker attempts lateral movement Domain compromised User account is compromised Azure AD Identity Protection Identity protection & conditional access Microsoft Cloud App Security Extends protection & conditional access to other cloud apps Office 365 ATP Malware detection, safe links, and safe attachments Microsoft Defender ATP Endpoint Detection and Response (EDR) & End-point Protection (EPP) Azure ATP Identity protection
  • 13. Integrated & coordinated threat protection: Correlated incidents Centralized view of automated workflows Advanced hunting across email and endpoints
  • 14. Example: 5,000 users, 3 years 101% ROI NPV = $23.5M, $4,696/user 10.25% reduced TCO 11.3 months faster adoption as a unified solution 10-15% across-the-board productivity improvement Forrester Total Economic Impact™ (TEI) Achieving Digital Business Transformation With Microsoft 365 Enterprise E5: A Total Economic Impact Analysis, September 2017 Third-party security solutions can be replaced with those built into EMS, Windows 10, and Office 365 $1.05MPV total savings in end-user data breaches ($3.3M PV saved in remediation and other related costs) 55.3%Reduction
  • 15. Microsoft security workshop Security discovery Security immersion experience Threat check Let’s get started
  • 16. © 2020 Razor Technology www.razor-tech.com @DavidJRosenthal SlideShare www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Office: 866.RZR.DATA LETS KEEP IN TOUCH 18