Presentation is loading. Please wait.

Presentation is loading. Please wait.

Deployment Planning Services

Similar presentations


Presentation on theme: "Deployment Planning Services"— Presentation transcript:

1 Deployment Planning Services
6/15/2018 Deployment Planning Services Enterprise Mobility + Security (EMS) Information Protection PARTNER ENGAGEMENT GUIDE © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 System Center Marketing
Key features Automatic, user-driven, and recommended classifications Data can be classified and labelled automatically through content detection rules. Users can also manually classify data or be prompted to make an informed classification decision. Classification overrides and justifications Based on policies and rules, users can be empowered to override a classification and optionally be required to provide a justification. Flexible policy and rules engine A set of default sensitivity labels are available with options to define custom labels based on business needs. Rules can also be configured for actions to take based on classification. Protection using encryption, authentication, and use rights For sensitive data, protection can be applied after classification and labeling. This includes encrypting the document, which requires authentication of the user and enforces user rights that define what can be done with the data. Document tracking and revocation Documents can be tracked to show who has opened the document and from which geographical location. Users can choose to revoke access to the document in the event of unexpected activity. 6/15/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

3 Enterprise Mobility & Security (EMS) Information Protection Overview
6/15/2018 Enterprise Mobility & Security (EMS) Information Protection Overview Classification and labeling Classify data based on source, context, and content at the time of creation or modification, either automatically or manually. Once classified, a persistent label is embedded in the data and actions such as visual marking and encryption can be taken based on the classification and label. Protection and use rights Protect sensitive data by encrypting it and allowing only authorized users access to the data. The protection is persistent to ensure data is protected at all times, regardless of where it’s stored or with whom it’s shared. Tracking and reporting Users can track activities on shared files and revoke access if they encounter unexpected activities. The solution provides rich logs and reporting that can be leveraged for compliance and regulatory purposes. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Engagement Options Choose from 3, 5, 10, or 15 days GOAL ACTIVITY
Assess, Prioritize & Plan Assess, Prioritize, Plan & POC or Limited Online Pilot Pre-engagement Questionnaire Define Customer Problem Statement and Objectives Provide Infrastructure Overview and Solution Concept Deliver Implementation Plan and Next Steps Microsoft Fast Track Customer Success Plan ACTIVITY ACTIVITY

5 Engagement Structure and Prerequisites
6/15/2018 Engagement Structure and Prerequisites Customize the engagement to meet your customer’s unique requirements Engagement Activities Understand the customer’s business objectives and data protection concerns, and assess their computer environment for EMS readiness Create an EMS Implementation Plan to prepare the customer to deploy their Information Protection solution. Run a pilot to demonstrate the value of EMS Information Protection Note: If your knowledge of your customer environment allows you to move more quickly through the engagement and complete further steps than the ones described, the program will honor the engagement as long as the deliverables from an engagement reflect and justify the tasks. For example, if you are conducting a 5-day engagement and your knowledge of the customer environment allows you to move more quickly through the assessment, you are welcome to begin a pilot. Please note the change in the Engagement Completion Template. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 Tools & Resources Websites
6/15/2018 Tools & Resources Websites Support resources for Azure Rights Management Microsoft Cloud and Enterprise Partner Resources (Use MPN credentials to access this material) Support forum SDKs for native app integration    Customer Success Story Plan for and deploy Azure AD Premium Japan Advanced Institute of Science and Technology Learn more Get started Training EMS Cloud Solution Partner Training Plan for and deploy Windows Intune Azure Active Directory: Identity Management and Protection video Get started with mobile device management Azure AD Password Reset Plan for and deploy Azure Rights Management Hybrid Identity Design Considerations Deploy Support resources for Windows Intune Technical documentation library Trust Center © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Deployment Planning Services"

Similar presentations


Ads by Google