Download presentation
Presentation is loading. Please wait.
1
(DO NOT SHOW) SMB To-Customer Presentation
1/25/2018 (DO NOT SHOW) SMB To-Customer Presentation Audience: Small and Mid-Sized Customers and Prospects Usage guide: This narrative is relevant for partners who serve customers with employees (SMB). This presentation is designed for you to customize: Cover slide – with three versions Logo – add to slide 17 Business Information – can also be added to slide 17 Key Practice Specialties, examples or other relevant information can be added to this presentation Use case scenarios and other examples may be available to add, and be sure to check Microsoft 365 Partner Site for more and up-to-date information. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
SMB Name Date Security & Compliance
3
SMB Name Date Security & Compliance
4
SMB Name Date Security & Compliance
5
43% of cyber-attacks target small business1
The reality for your business today and the importance of proactive security 43% of cyber-attacks target small business1 43% Cyberthreats are becoming more of a reality each day. 43% of cyber attacks target small business.1 This is disrupting how we live and work, how we acquire information and communicate, and what it takes to secure company data. Providing peace of mind that your information and company data are safe is becoming a more important part of how we can work together. We’ve also found that: People, on average, spend 50% more time today in collaborative activities than 2 decades ago.* However, 43% of SMB owners say that improving their workforce productivity is a top priority**. Teams need to be agile and respond quickly to new information. We’re moving into a world where instant sharing and immediate feedback is the new norm. It’s changing how work gets done. It’s becoming more iterative and collaborative in nature. Meanwhile, people are spending less time at their desks and in one place. In fact, research also shows that 37% of the global workforce is mobile, 42% in 2020.*** Yet things like real-time communication, face-to-face interactions and leveraging collective knowledge are still critical to employee productivity. The opportunity lies in allowing employees to connect and stay productive, even when they aren’t in the room together. At the same time, we’re living in a world where cyberthreats are becoming more of a reality each day. 43% of cyber attacks target small business.† When a small business is attacked, there’s a 60% likelihood they’ll be out-of-business six months later. This is disrupting how you live and work, how you acquire information and communicate, and what it takes to secure your company data. Providing peace of mind that your customer information and company data are safe are becoming more and more important to businesses likes yours. Transition: We understand that you have limited resources; your employees are wearing many hats and are always on the go. You need to be able to run and grow your business from anywhere without interruption, without security concerns. We want to help you and your team work better together, be more productive with mobile solutions, and in a secure environment so that you can focus your time on the things that matter and not IT complexity. * Harvard Business Review, January-February Issue 2016, ‘Collaborative Overload’ ** Techaisle, 2015 SMB ‘Mobility Adoption Trends Study’ ***Strategic Analytics, Global Mobile Workforce Forecast, , November 2015 † Small Business Trends, CYBER SECURITY STATISTICS – Numbers Small Businesses Need to Know, Jan. 3, 2017 1 Small Business Trends, CYBER SECURITY STATISTICS – Numbers Small Businesses Need to Know, Jan. 3, 2017
6
Cyberthreats by the numbers across 3 key attack zones
Microsoft Inspire 1/25/ :36 AM Cyberthreats by the numbers across 3 key attack zones User Device 63% Weak, default or stolen passwords Within 4 minutes Open from attacker 53 seconds A laptop is stolen nearly every minute 58% Accidently share sensitive information Will open attachment/link 55,000 Average devices compromised by Ransomware every month in 2016, 5X increase from 2015, 4X increase in Android base 286 days 80% Non-approved SaaS usage: Shadow IT We understand that you have limited resources; your employees are wearing many hats and are always on the go. You need to be able to run and grow your business from anywhere without interruption, without security concerns. But here are some scary stats -- It takes hackers 4 min to get into networks through attacks and 286 days detection followed by 80 days for damage control. 55K Ransomware attacks happen every month (5X YOY increase). Security is TOP OF THE MIND for Customers today and now they can choose any starting point depending on their needs and budget 200,000 Detect intrusion 80 days PCs attacked by WannaCrypt across 150 countries Contain damage Data leakage: 90% caused by user mistakes 90% $1 Billion It takes hackers 4 min to get into networks through attacks and 286 days for detection followed by an additional 80 days for damage control Average earning of a hacker from Ransomware (FBI guesstimate) © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
7
Can you answer “Yes” to these 5 questions?
Do you know who is accessing your data? Can you grant access to your data based on risk in real time? Can you quickly find and react to a breach? Can you protect your data on devices, in the cloud, and in transit? Do your users love their work experience? If not, you may need Security as a Service
8
SMB customers need Security as a Service
Today’s mobile and entrepreneurial workforce extends the business beyond the office and customary work hours. Security as a Service, powered by Microsoft 365, helps businesses stay agile and competitive, while keeping their data, tools and resources accessible, yet more secure, anywhere, anytime. Microsoft 365 provides a modular solution that addresses the IT and Bring-Your-Own-Device (BYOD) challenges of your SMB customers, while providing a secure end-to-end managed cloud environment that encompasses identity, apps, content and devices.
9
Introducing Microsoft 365
We are living in a time of inflection. Digital transformation is the biggest change any of us has seen in our lifetime. Companies invest in technology to optimize operations, transform products, engage customers, and empower employees. The challenge is finding the way to empower people to do their best work. This starts with fostering a culture of work that is inspiring for everyone, and embraces the trends in the workplace that make work inspiring. To deliver on the tremendous opportunity for business growth and innovation, we are simplifying the customer experience by bringing together Office 365, Windows 10 and Enterprise Mobility + Security with the introduction of Microsoft 365. It’s a complete, intelligent solution that empowers everyone to be creative and work together, securely. Four core principles of Microsoft 365 Intelligent security Unlocks creativity Built for teamwork Integrated for simplicity
10
Four key areas of Intelligent Security
Secure the front door Protection from identity driven breaches, attacks and attacks targeting OS Secure content Protect content: At the time of creation, in transit, and during consumption Secure devices Workplace issued or BYOD devices Great employee experience Productivity without compromise
11
Secure the Front Door Identity-Driven Security
Go beyond passwords and protect against identity compromise, while automatically identifying potential breaches before they cause damage. Risk-based Conditional Access and Multi-Factor Authentication Advanced security reporting Identify threats on-premises Identify high-risk usage of cloud apps, user behavior, detect abnormal downloads, prevent threats
12
Secure Content Protect content: creation, transit, consumption
Use cloud applications without putting company information at risk by adding protection ranging from access privileges to data encryption. Shadow IT Detection: Discovering Apps and Risk Scoring Intelligent Classification and Tagging of content Document encryption, tracking, revocation Monitoring shared files and responding to potential leaks Data segregation at a device/app level
13
Secure Devices Workplace Issued or BYOD Devices
Manage company and BYOD devices to encrypt data and ensure compliance, automatically detect suspicious activities, and quickly block, quarantine, or wipe compromised devices. Conditional Access Device and App access level controls: PIN Device and App encryption at rest Save-As, Copy, Paste restrictions Device and App level data wipe
14
Great employee experience
Workplace Issued or BYOD Devices Implement tools and policies that empower your employees to be productive and secure on personal and company devices while maintaining control of data. Single Sign-On Self Service Advanced Multi-Factor Authentication App Proxy without the need of VPN
15
What Microsoft 365 plan is right for you?
Microsoft 365 plans provide the right fit for any SMB customer. Security add-ons can be used to tailor a solution that meets specific security and compliance requirements. To find the right starting point, review each of these customer scenarios: DO YOU NEED… Microsoft 365 Enterprise + ATP Office 365 E3 + EMS E3 + ATP Microsoft 365 Business + ATP More than 100 seats? ● Extensive eDiscovery, data governance and compliance tools? To protect highly sensitive data such as financial information, health records, or extensive IP? Real-time threat protection? Enterprise-level protection for cloud applications? On-premises domain controller? A solution that can be managed with little to no in-house IT staff? Support for around 150 PCs? Does not need OS upgrade Needs Mobile Device Management and Mobile Application Management Low Risk Profile Needs Proactive Attack Prevention on OS
16
Our expertise + Microsoft 365
Space for Partner Logo Our expertise + Microsoft 365 We’re experts at… Supporting point #1 Supporting point #2 Supporting point #3 We can help you… Supporting point #1 Supporting point #2 Supporting point #3 This customizable slide is for talking about your company and its value. You can fill it out with your own information and add your company logo. We can manage your… Supporting point #1 Supporting point #2 Supporting point #3
17
Appendix
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.