SAM Healthcare Cybersecurity Assessment

Slides:



Advertisements
Similar presentations
Private Cloud: Application Transformation Business Priorities Presentation.
Advertisements

Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Planning Engagement Kickoff
Azure Stack Foundation
SAM Cybersecurity Engagement
Education SKUs in CSP.
SAM Baseline Review Engagement
Existing Partner - FY17 SAM Incentives Program
The time to address enterprise mobility is now
Deployment Planning Services
Deployment Planning Services
Partner Toolbox Cloud Infrastructure & Management
Customer Guide to Limited-Time Offer
Office 365 FastTrack Planning Engagement Kickoff
SAP on Azure Proactive proposal.
Deployment Planning Services
Hybrid Management and Security
Software Assurance Planning Services
Deployment Planning Services
Владимир Гусаров Директор R&D, Dell Visual Studio ALM MVP ALM Ranger
SAM05 Unlocking the Value of SAM: How SAM Value Engagements impact profitability for partners Arnold Sharp CEO : First Technology South Africa Monique.
Manage mobile productivity with Enterprise Mobility + Security (EMS)
Microsoft SAM for Hosting (SPLA)
8/1/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Dynamics Planning Services
SAM Cloud Productivity Engagement
SAM Server Optimization Engagement
Microsoft Education Solutions - Partner Conversation Flow
1. Define a Vision & Identify Business Scenarios
Microsoft 365 Education – Partner Quick Reference Card
Phase 4: Compelling Case for Change
Welcome! Microsoft Tech Talks - Charlotte, NC
Microsoft SAM Managed Service Program
SQL Server OLTP with Microsoft Azure Virtual Machines
Next Steps to Value 11/8/2018.
Power Apps & Flow for Microsoft Dynamics SL
SAM Infrastructure Optimization Engagement
SAM Financial Services Cybersecurity Assessment
SAP on Azure Proactive proposal.
SAM GDPR Assessment <Insert partner logo here>
Windows Server 2003 Migration
Microsoft Virtual Academy
Title of Presentation 11/22/2018 3:34 PM
Ed oms team OMS: Log Analytics Ed oms team.
Microsoft Virtual Academy
Title of Presentation 12/2/2018 3:48 PM
What’s new with Microsoft’s project portfolio management
Executive Communications Planning
Microsoft Virtual Academy
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
2/25/2019.
Managed Content Services
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Delivering great hardware solutions for Windows
Simplify the management of your M365 workplace with analytics
Introducing the Windows Store
Title of Presentation 5/12/ :53 PM
Microsoft Virtual Academy
Title of Presentation 5/24/2019 1:26 PM
Microsoft Data Insights Summit
Hybrid Storage Direct proposal 6/8/ :37 AM
<offer name> with Microsoft 365 Business Secure Deployment
Next Steps to Value 7/9/2019.
Title of Presentation 7/24/2019 8:53 PM
Microsoft Data Insights Summit
What's new in Project Pro for Office365 and Sync to SharePoint Online
9/24/2019 5:31 PM ©2005 Microsoft Corporation. All rights reserved.
Microsoft Virtual Academy
Workplace Modernization Assessment
Streamline your move to the cloud
Presentation transcript:

SAM Healthcare Cybersecurity Assessment 11/6/2018 6:06 PM <Insert partner logo here> SAM Healthcare Cybersecurity Assessment © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

OPTIMIZE CLINICAL EFFECTIVENESS Digital technology is transforming innovation and care Envision a cost-efficient future that extends healthcare beyond security and privacy ENGAGE PATIENTS with always-on connections and personalized interactions EMPOWER CARE TEAMS with secure and compliant tools for essential devices OPTIMIZE CLINICAL EFFECTIVENESS by reducing risk, cost, and complexity of IT TRANSFORM HEALTH by quickly adapting to changing needs With the arrival of digital transformation, more and more organizations need enhanced visibility and control over their IT infrastructure to take full advantage of the opportunity.   Four major areas that provide the greatest potential for digital transformation are the following: Optimize operations - Optimizing business processes often starts with IT infrastructure. Once you divvy up what information you can store where, you can greatly reduce the cost and complexity of IT management with new resources like the Cloud. You also reduce security risks and help maintain compliance. Transform services - If you innovate with agility, and are open to the consistent changes we see in today’s business landscape, you’ll be able to adapt quickly to changing business needs without sacrificing security. Empower your employees – Your employees need to be empowered to safely do their best work from anywhere, at any time, on any device. Engage your customers – You’re expecting new levels of connections with the businesses you partner with and purchase from. In this digital age, you’re experiencing deep personalization and interactive marketing, as well as enjoying the ability to connect with businesses easier than ever before. All of the different types of engagements need to be safe and secure to use.

Security is fundamental to digital transformation Addressing security challenges as technology evolves can put you ahead of: Unmanaged devices and access points Credential theft and associated fraud Key points: Cyberattacks cost businesses around the world upwards of $400B annually.1 Research estimates that number could climb to $2.1T by 2019.2 Between apps being downloaded without approval, unmanaged devices being used within the corporate network, poor password protection programs, and more, too many businesses leave themselves vulnerable to attack. What they need is a clear understanding of their IT infrastructure as well as more visibility and control over their IT infrastructure. A Software Asset Management, or SAM, Assessment can help identify security risks and compliance issues. Keeping your infrastructure safe and up-to-date with industry standards. 1Stephanie Gandel, “Lloyd's CEO: Cyber attacks cost companies $400 billion every year,” http://fortune.com/, (January 23, 2015) 2Steve Morgan, “Cyber Crime Costs Projected To Reach $2 Trillion by 2019,” http://www.forbes.com/, (January 17, 2016) MSFT Field - Please view associated material at: http://infopedia/SMSG/Pages/EnterpriseSecurity.aspx Vulnerability against ransomware attacks Identification and reduction of current threat vectors

Protect your environment with SAM A SAM Healthcare Cybersecurity Assessment takes a holistic look at your environment and helps empower a strong and cost-efficient foundation of security and privacy, so you can focus on advancing innovation and care. Key points: A Software Asset Management (SAM) Healthcare Cybersecurity Assessment provides you with a comprehensive analysis of your cybersecurity infrastructure, including your current software deployment, usage, and licensing data. Working with a Microsoft-certified SAM partner, you’ll receive key insights into how to ensure you have the right processes in place to minimize cyber-risk. We’ll also provide prescriptive guidance and best practices about cybersecurity, freeing you to focus on innovation instead of protection. Minimizing cyber risks helps organizations decrease costs from data loss, fraud associated with theft, loss in revenue, support, employee downtime, cost to locate and reinstall lost data, and a negative reputation. In addition, you can develop a long-term trusted advisor relationship with your customers by establishing credibility and demonstrating customer- focused problem-solving. You also increase customer satisfaction by helping your customers solve critical business challenges.

11/6/2018 6:06 PM Value to you A SAM Healthcare Cybersecurity Assessment offers best practices around cybersecurity, freeing you to focus on innovation instead of protection. Identity and Access Management Reduces security risks with added policies and controls Minimizes data loss, fraud, and employee downtime Threat Protection Saves money by combatting cyberattacks and increasing efficiencies Develops an agile infrastructure to quickly respond to threats Key points: This SAM program is designed to do more than just gather information. It can help you turn information into insight to add greater value to your business.   Script: First, we provide you with a comprehensive inventory of all deployed software including Microsoft software, as well as a list of all the devices in your environment, including mobile devices and their make and model. This information helps us with planning and reporting and strengthening security as well as: Identifies how Cloud-based scalability can increase agility Determines the best options for migration I’d like to assure you that we are highly skilled and trained to help simplify data collection. While some work will be required, we keep the workload for your staff to a minimum. We ensure that your data is highly secure throughout this process, enabling you to test any tools that we use for data collection. We use the infrastructure that you already have, whether it’s Altiris, LANDesk, Microsoft System Center, or another tool, without introducing anything new into your environment. We continually share our knowledge along the way, so you can repeat the process yourself in the future. We then help you identify any gaps in your current business processes and work with you to help improve SAM, as well as: Enhance cost management through pay-per-use subscription models Deliver recommendations for improving Cloud licensing Finally, we align the plan for Cloud migration with your organization’s goals. This includes the following: Provides a clear prioritization of what’s ready to migrate Offers insights on costs and technology benefits of moving to the Cloud Information Protection Helps ensure data is secure at all access points Removes security and privacy as a blocker to advancement Security Management Offers full visibility into what’s deployed and makes sure everything is catalogued Helps you securely manage your environment and promote reliable cybersecurity practices © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Gain immediate visibility into risk The final SAM Cybersecurity Assessment Report includes: CYBERSECURITY OVERVIEW Executive summary of project background and scope, engagement result, recommendations and next steps Cybersecurity roadmap based on the NIST Cybersecurity Framework SERVER HEALTH AND MAINTENANCE Clear visualization of your SQL Server Service Pack deviations and Windows Server Service Pack deviations USER ACCOUNT MANAGEMENT Comprehensive analysis of all user accounts and a review of access management policies VISIBILITY OF END OF SUPPORT SOFTWARE Summary of current or upcoming end-of-life products, with upgrade path recommendations

Next steps Learn more about Microsoft’s SAM assessments 11/6/2018 Next steps Learn more about Microsoft’s SAM assessments Contact your partner for further information <Insert partner logo here> John Doe John@partneremail.com © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.