Download presentation
Presentation is loading. Please wait.
Published byCory Rachel Wheeler Modified over 6 years ago
1
SAM Financial Services Cybersecurity Assessment
11/9/2018 9:00 PM <Insert partner logo here> SAM Financial Services Cybersecurity Assessment © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Digital technology is transforming Financial Services As technology changes how the world does business, it also introduces new challenges and risks. DIFFERENTIATE SERVICES Provide innovative products that inspire confidence and build loyalty SECURE DATA Guard your data by ensuring you’re running the latest tools and apps PROTECT CUSTOMERS Adopt best practices that protect customer PII and data ENSURE COMPLIANCE Establish controls that ensure regulatory compliance
3
Embrace change with confidence
Systematically address security challenges Discover unmanaged devices and access points Identify and reduce current threat vectors Key points: Cyberattacks cost businesses around the world upwards of $400B annually.1 Research estimates that number could climb to $2.1T by Between apps being downloaded without approval, unmanaged devices being used within the corporate network, poor password protection programs, and more, too many businesses leave themselves vulnerable to attack. What they need is a clear understanding of their IT infrastructure as well as more visibility and control over their IT infrastructure. A Software Asset Management, or SAM, engagement can help identify security risks and compliance issues. Keeping your infrastructure safe and up-to-date with industry standards. 1Stephanie Gandel, “Lloyd's CEO: Cyber attacks cost companies $400 billion every year,” (January 23, 2015) 2Steve Morgan, “Cyber Crime Costs Projected To Reach $2 Trillion by 2019,” (January 17, 2016) MSFT Field - Please view associated material at: Block identity theft and associated fraud Reduce vulnerability to ransomware attacks
4
Asset management is crucial to cybersecurity
A SAM Financial Services Cybersecurity Assessment provides a comprehensive view into your IT estate, offering deep data insights that expose vulnerabilities and risks to customer privacy. Every Cybersecurity Assessment has four phases Key points: A Software Asset Management (SAM) Financial Cybersecurity engagement provides you with a comprehensive analysis of your cybersecurity infrastructure, including your current software deployment, usage, and licensing data. Working with a Microsoft-certified SAM partner, you’ll receive key insights into how to ensure you have the right processes in place to minimize cyber-risk. We’ll also provide prescriptive guidance and best practices about cybersecurity, freeing you to focus on innovation instead of protection. Minimizing cyber risks helps organizations decrease exposure to data loss, fraud associated with theft, loss in revenue, support, employee downtime, cost to locate and reinstall lost data, and a negative reputation. In addition, you can develop a long-term trusted advisor relationship with your customers by establishing credibility and demonstrating customer-focused problem-solving. You also increase customer satisfaction by ensuring the protection of your customer’s PII. PLANNING DATA COLLECTION DATA ANALYSIS FINAL RECOMMENDATIONS
5
11/9/2018 9:00 PM Proven best practices A SAM Cybersecurity Assessment builds on security industry best practices to help you differentiate your services and ensure compliance. Identity and Access Management Comprehensive analysis of all user accounts and a review of access management policies. Information Protection Clear visualization of your SQL Server Service Pack and Windows Server Service Pack deviations. Key points: This SAM program is designed to do more than just gather information. It can help you turn information into insight to add greater value to your business. Script: First, we provide you with a comprehensive inventory of all deployed software including Microsoft software, as well as a list of all the devices in your environment, including mobile devices and their make and model. This information helps us with planning and reporting and strengthening security as well as: Identifies how Cloud-based scalability can increase agility Determines the best options for migration I’d like to assure you that we are highly skilled and trained to help simplify data collection. While some work will be required, we keep the workload for your staff to a minimum. We ensure that your data is highly secure throughout this process, enabling you to test any tools that we use for data collection. We use the infrastructure that you already have, whether it’s Altiris, LANDesk, Microsoft System Center, or another tool, without introducing anything new into your environment. We continually share our knowledge along the way, so you can repeat the process yourself in the future. We then help you identify any gaps in your current business processes and work with you to help improve SAM, as well as: Enhance cost management through pay-per-use subscription models Deliver recommendations for improving Cloud licensing Finally, we align the plan for Cloud migration with your organization’s goals. This includes the following: Provides a clear prioritization of what’s ready to migrate Offers insights on costs and technology benefits of moving to the Cloud Security Management Summary of current or upcoming end-of-life products, with upgrade path recommendations. Threat Protection Roadmap Executive summary of project with recommendations and next steps. This cybersecurity roadmap is based on CIS v. 7 controls. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
Find out more Learn more about Microsoft’s SAM assessments
11/9/2018 Find out more Learn more about Microsoft’s SAM assessments Contact your partner for further information <Insert partner logo here> John Doe © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.