Download presentation
Presentation is loading. Please wait.
1
Microsoft Azure Virtual Machines
Discover how your business can benefit from Azure Virtual Machines SPEAKER NAME
2
Azure virtual machines will transform your business
Image: Talk about ‘what is a virtual machine’ before moving on if you have people in the audience who do not understand the technology. Engage your customers Use virtual machines for websites, applications and more Scale up or down depending on customer demand Reduce IT complexity and cost Set up Dev/Test platforms quickly Pay as you go, Azure is a metered service Get more choice. Chose Linux or Windows. Chose your own image or buy pre-configured Improve business processes Combine the performance of a world-class supercomputer with the scalability of the cloud Configure your virtual machine size and performance to handle even the largest business needs Help keep data safe and compliant You govern user access to applications Your data is encrypted at rest and in transit with advanced protocols and best-in-class cryptography Azure conforms to ISO security standards
3
How can you use Azure Virtual Machines?
Development and test VMs offer an easy way to create a computer with specific configurations required to code and test an application Azure Virtual Machines provide an economical way to create VMs, use them, then delete them when they're no longer needed Running applications Azure Virtual Machines help you manage applications with large spikes in demand, and pay as you go Azure Virtual Machines allow you to scale on-demand computing resources quickly and with no commitment, perfect for a smaller business Disaster recovery IaaS-based disaster recovery lets you pay for the computing resources you need only when you really need them If your primary datacenter goes down, you can create VMs running on Azure to run essential applications, then shut them down when they're no longer needed Extend or create a datacenter Create a virtual network (VNET) that's an extension of your own on-premises network and add VMs to that VNET Run applications such as SharePoint, SQL Server and others on an Azure VM Image from Pickit (built on Azure)
4
Are Azure Virtual Machines secure?
Azure Virtual Machines can be protected from viruses and malware. Network traffic can be secured and sensitive data encrypted. It’s affordable, enterprise-grade security that’s monitored 24/7. Azure is tested regularly to protect against cyberattacks. Azure Security Center: Monitors the security state of your Azure resources Defines policies for Azure based on your security requirements, the types of applications that you use, and the sensitivity of your data Rapidly deploys security services and appliances from Microsoft and partners Automatically collects and analyzes security data from your Azure resources, the network, and partner solutions like antimalware programs and firewalls Applies advanced analytics, including machine learning and behavioral analysis Provides prioritized security incidents/alerts Suggests ways to stop attacks and help prevent future attacks Azure uses industry-standard protocols Protection for data in transit and at rest, including encryption for data, files, applications, services, communications, and drives Support for and use of numerous encryption mechanisms, including SSL/TLS, IPsec, and AES Configuration support for BitLocker Drive Encryption on VHDs that contain sensitive information Access to data by Azure support personnel requires your explicit permission and is granted on a “just in time” basis that is logged and audited Azure Security Center: • Monitors the security state of your Azure resources • Defines policies for Azure based on your security requirements, the types of applications that you use, and the sensitivity of your data • Rapidly deploys security services and appliances from Microsoft and partners • Automatically collects and analyzes security data from your Azure resources, the network, and partner solutions like antimalware programs and firewalls • Applies advanced analytics, including machine learning and behavioral analysis • Provides prioritized security incidents/alerts • Suggests ways to stop attacks and help prevent future attacks wbR6ls
5
Demo Image from Pickit (built on Azure)
Create a demo that is in line with the customers you serve. Webinar best practice: Have a demo already set up just in case you have any issues. Secondary backup: Create slides that show the process.
6
Q&A https://unsplash.com/search/questions?photo=i--IN3cvEjg
Conduct a Q&A session during the webinar to find out what your customers need help with. Add a summary and call to action slide.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.