All industries are investing heavily in digital transformation 2016 $ Billions
Forecasted digital transformation spend 2016-19
1 Financial services
$ billions
2 Public sector
20161
151
32 20
3 Telco and media
19
4 Advanced manufacturing
19
5 Retail/wholesale trade
15
6 Health 2019
200 - 239
12
7 Professional services 8
12
Basic goods manufacturing
9 Utilities
10 Transportation
9
$151 billion Forecasted digital transformation spend for top ten highestspending industries
7 6
1 2016 calculated based on 2015 actuals from Gartner plus an 8% CAGR Source: IDC, PAC, Gartner, Markets and Markets, MGI analysis
Top of mind for business leaders and their digital transformation
Digital transformation =
Cultural shift technology problem 1
42%
of CIOs with hiring plans are in search of people with combined TECH
RIGHT SKILLS shortage
The most commonly cited barrier to digitization for most CIOs 2
Central to any digital workplace initiative:
increasing the involvement of the employee community in technology strategies 3
By 2018, AI will be incorporated into
+
BUSINESS backgrounds
Most important decision CEOs must make in 2016 is to
$
4
invest in data science development 5
The CIO’s challenge is to convince the entire enterprise that
“SECURE BY DESIGN” should be treated as a business priority 6
Organizations can’t transform to digital unless people do
Leaders embrace digital-first to fast track transformation ADIA
1 Forrester Research. The race to digital mastery is on in 2016. Forrester. November 11, 2015. 2 Andy Rowsell-Jones, et al. 2016 CIO Agenda: Global Perspectives on Building the Digital Platform. Gartner. February 23, 2016. 3 Matthew W. Cain and Paul Miller. Recipe for Digital Workplace Execution: Transform the Employee Experience. Gartner. March 3, 2016.
4 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now (and one to ignore). CIO. December 1, 2015. 5 Ken McGee and Mark Raskino. The Most Important Digital Business Decision Senior Executives Must Make in 2016. Gartner. February 16, 2016. 6 Marcus Shingles et al. Tech Trends 2016: Innovating in the digital era. Deloitte. February 22, 2016.
1/2
of all apps developed. By 2020, savings garnered by AIenabled efficiencies are expected to total an estimated
60B
for U.S. enterprises
7
29%
of the respondents identified IoT initiatives — and related machine-tomachine and telematics projects — as new areas of spending for the year ahead
30%
By the end of 2016, of businesses will have begun monetizing their information assets, which is fueling an information-driven economy targeted at
$156B
Harness information to change the way you do business
7 John Dodge. Who’s in charge of AI in the enterprise? CIO. February 15, 2016. 8 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now (and one to ignore). CIO. December 1, 2015. 9 Mike J. Walker, et al. Top 10 Strategic Technology Trends for 2016: Information of Everything. Gartner. February 26, 2016.
9
8
The Time is Now
From presentations, to conversations • • • •
Accelerating conversations as business requires. Real-time crowd sentiment On and Off conversations Rich more employees
Making digital transformation real Trust
Changing the conversation
Focusing Aligning on customer success our priorities
Engage your customers
Intelligent Cloud
Empower your employees
Optimize your business
Industry Horizontal scenarios scenarios Reinventing Productivity & Business Process
Security
Transform your products
Products
More Personal Computing
Services
Partners
Interactuamos con casi el 2x de equipos que hace 5 años*
41% de los usuarios declara que las apps móviles están cambiando la forma de trabajar* La sobrecarga de información hace malgastar el 25% del tiempo de los empleados (costing U.S. business $997B each year)*
160M de datos de clientes filtrados *
Nuestra Visión del Modern Workplace
229 días para detectar una infiltración de seguridad*
* Multiple industry sources.
[
NUEVAS INTERACCIONES
CENTRADAS E N L A S MÁ QUIN A S DESKTOP
]
CE N TRA DA S E N L A S PE RSON A S MÓVIL
NO CONECTADAS, CABLEADAS
SIEMPRE CONECTADO, MÓVIL
ÚNICO DISPOSTIVO PERSONAL
MÚLTIPLES DISPOSITIVOS POR PERSONA
TECLADO Y RATÓN INDIVIDUAL FÍSICO, DIGITAL
VOZ, TACTO, TINTA (NATURAL) GRUPO, SOCIAL CONVERSACIONAL, BIOLÓGICA
[
NUEVAS ORGANIZACIONES
]
[
NUEVOS HÁBITOS
]
E COSISTE MA DE CA MBIO COMPARTIR OPTIMIZAR EL USO DEL E-MAIL REUNIONES MÁS INTELIGENTES REDUCCIÓN DE IMPRESIÓN TENER INQUIETUD POR INNOVAR ESCUCHAR AL CLIENTE … PERCEPCIÓN +ACTIVA SEGURIDAD
Introducing Microsoft Teams
GDPR is here!
Privacidad Personal Individuos con derechos a: • •
Acceso a sus datos personales Corrección de errores en sus datos personales
•
Borrar sus datos personales
•
Oponerse al procesamiento de sus datos personales
•
Exportar sus datos personales
• • •
Controles y notificaciones
Políticas transparentes
Estrictos requisitos de Seguridad
Políticas transpàrentes y de facil acceso sobre:
Obligación de reportar brechas de seguridad
•
Consentimiento apropiado para el proceso de datos
•
Notificación sobre procesamiento
•
Detalles del procesamiento
•
Confidencialidad
•
Mantenimiento de registros
•
Notificación sobre recogida de datos
Retención y borrado de datos
IT, formación y contratos Necesidad de invertir en: •
Formación a empleados sobre privacidad
•
Políticas de datos
•
Data Protection Officer (DPO) (si + de 250 empleados)
•
Seguridad
•
Contratos Processor/Vendor
¡Ojo! GDPR = Hábitos + Secured-by-design Tech
Privacidad Personal Individuos con derechos a: • •
Acceso a sus datos personales Corrección de errores en sus datos personales
•
Borrar sus datos personales
•
Oponerse al procesamiento de sus datos personales
•
Exportar sus datos personales
• • •
Controles y notificaciones
Políticas transparentes
Estrictos requisitos de Seguridad
Políticas transpàrentes y de facil acceso sobre:
Obligación de reportar brechas de seguridad
•
Consentimiento apropiado para el proceso de datos
•
Notificación sobre procesamiento
•
Detalles del procesamiento
•
Confidencialidad
•
Mantenimiento de registros
•
Notificación sobre recogida de datos
Retención y borrado de datos
IT, formación y contratos Necesidad de invertir en: •
Formación a empleados sobre privacidad
•
Políticas de datos
•
Data Protection Officer (DPO) (si + de 250 empleados)
•
Seguridad
•
Contratos Processor/Vendor
“THERE ARE TWO KINDS OF COMPANIES , THOSE WHO’VE BEEN HACKED, AND THOSE WHO DON’T KNOW THEY’VE BEEN HACKED.” JAMES COMEY, DIRECTOR FBI
200+
Median number of days attackers are present on a victims network before detection
80 Days after detection to full recovery
$3TRILLION $3.5MILLION Impact of lost productivity and growth
Average cost of a data breach (15% YoY increase)
COMO OCURREN LOS INCIDENTES ? No solo hay que preocuparse del Malware y de las Vulnerabilidades
Los ataques rápidos y efectivos de phising te dejan poco tiempo de respuesta
46%
99.9%
23%
50%
de los Sistemas comprometidos no de las Vulnerabilidades fueron tenían ningún tipo de Malware explotadas un año despues de la publicación de su CVE
de los destinatarios abrieron el mensaje de phising (el 11% hizo click en los adjuntos)
De los que abrieron y clickearon el adjnto, lo hicieron en la primera hora
7
PwC’s Cyber Services PwC’s Digital Digital Services Services – Digital Transformation Confidential information for the sole benefit and use of PwC’s client.
“Everyone has a plan 'till they get punched” Mike Tyson
Hay que estar bien preparado y entrenado para hacer frente a los problemas en situaciones de crisis.
“By 2020, a corporate ‘no-cloud’ policy will be as rare as a ‘no-internet’ policy is today.”1
1Gartner: 2KPMG: 3IDC:
“The question is no longer: ‘How do I move to the cloud?’ Instead, it’s ‘Now that I’m in the cloud, how do I make sure I’ve optimized my investment and risk exposure?”2
Smarter with Gartner, Why a No-Cloud Policy Will Become Extinct, February 2, 2016
2014 Cloud Survey Report, Elevating business in the cloud, December 10, 2014
IDC Market Spotlight, Cloud Definitions and Opportunity, April 2015
“By 2020 clouds will stop being referred to as ‘public’ and ‘private’. It will simply be the way business is done and IT is provisioned.”3
Propuesta de Valor
Alineado con las necesidades del negocio y el entorno actual de amenazas
Holística
Impulsada por la Identidad
Innovadora
Inteligente
Dirigida a los retos de la seguridad sobre los usuarios (identidades), dispositivos, datos, apps y plataformas – on-premises y en la nube
Ofrecer una única identidad protegida para asegurar el acceso seguro a todos los recursos corporativos, onpremises y en nube, con acceso condicional basado en perfiles de riesgos.
Proteger los datos de nuevos y cambiantes ataques de ciberseguridad.
Mejora la detección de amenazas y detección de anomalías con nuestra el uso de Microsoft Intelligent Security Graph impulsado por un gran numero de datasets y machine learning en la nube
Visión de las Soluciones de Seguridad de Microsoft
Information Rights Management
x2.25
Multifactor Authentication
x2.25
Protect with and without enrollment
Multi-identitypolicy policy Multi-identity
Corporate apps
Corporate Corporate data data Personal Personal data data
x2.25
Personal apps
Advanced Threat Intelligence built over Security Graph
Locky Malware
Linda Finance Important
Gopi
Infected Sensitive
Targeted Phish Infected
Credit cards
Advanced Threat Protection
Advanced eDiscovery
“Make no mistake, the GDPR sets a
new and higher bar for privacy rights, for security, and for compliance. And while your journey to GDPR may seem challenging, Microsoft is here to help all of our customers around the world.” Brad Smith President & Chief Legal Officer Microsoft Corporation
Our Terms of Service contractually commit the Microsoft Cloud to meet all Data Processor
requirements under GDPR when enforcement begins on May 25, 2018.
We will share our experience in complying with GDPR as a Data Controller and Data Processor. Together with our partners, we will help you meet the people, policy, process, and technology obligations on your own GDPR journey.
Microsoft infrastructure investments 38 Cloud Geographies United Kingdom South North Central US United Kingdom West West US 2 West Central US
West US US Gov Arizona3 US Gov Texas3
Central US
Canada Central North Europe
Canada East
US Gov Iowa
East US
US DoD West
France3 France3
Korea Central Korea South China West1 Japan East
Germany Central2
Japan West
China East1
East US 2
US Gov Virginia South Central US
West Europe Germany Northeast2
West India
US DoD East Central India
South India
East Asia
Southeast Asia
100+ datacenters Top 3 largest networks in the world 1China
datacenters operated by 21 Vianet
2German
data trustee services by T-systems
3France,
and US Gov datacenter regions have been announced but are not currently operational Global datacenters Sovereign datacenters
Brazil South
Australia East Australia Southeast
GDPR + Office Product Mapping Office 365 is a highly secure, intelligent and comprehensive cloud-based productivity platform. Office 365 enables you to keep your enterprises’ users and data protected both in transit and at rest. When you entrust your data to Office 365, you remain the sole owner: you retain the rights, title, and interest in the data. Company Officers can use the rich collaboration and analysis tools of Office 365 to maintain their policies, automate workflows & track responsibilities related to GDPR and other business requirements.
Discover
Right to Erasure Right to Data Portability
Manage
Protect
Documentation Privacy by Design
Data Security Data Transfer
Report
Documentation Breach Response and Notification
Security & Compliance Center
A one-stop portal for protecting your data in Office 365. Grant permissions to people who perform compliance tasks.
Data Loss Prevention
Unified policies covering client end-points, empowering IT pros
Advanced Data Governance
Classify, preserve and/or purge data based on automatic analysis and policy recommendations
Content search
run very large searches across mailboxes, public folders, Office 365 Groups, Microsoft Teams, SharePoint Online sites, One Drive for Business locations, and Skype for Business conversations
eDiscovery
use cases to manage access, place a hold on content locations relevant to the case, associate multiple Content Searches with the case, and export search results
Advanced eDiscovery
significantly reduce cost and effort to identify relevant documents & data relationships by using machine learning to train the system to intelligently explore large datasets
Data Governance
Threat Management
archive and preserve content in Exchange Online mailboxes, SharePoint Online sites, and OneDrive for Business locations, and import data into your Office 365 organization.
helps you control and manage mobile device access to your organization's data, help protect your organization from data loss, and help protect inbound and outbound messages from malicious software and spam
Information Rights Management
Advanced Threat Protection
prevent sensitive information from being printed, forwarded, saved, edited, or copied by unauthorized people
provides security functions that protect user environments that contain consumer data including Safe Attachments & Safe Links
Threat Intelligence
analyze and understand their local threat environment, including malware detected, targeted users, and links to global security stats
Advanced Security Management
gain enhanced visibility and granular security controls and policies including the ability to suspend user accounts, revoking access to personal data
Secure Score
insights into your security position and what features are available to reduce risk while balancing productivity and security
Audit Logs
record and search desired user and admin activity across your organization
Service Assurance
deep insights for conducting risk assessments with details on Microsoft Compliance reports and transparent status of audited controls.
Customer Lockbox
control how a Microsoft support engineer accesses your data during a help session
Por qué Microsoft?
Microsoft is the cloud service provider you can trust We stand behind you through contractual commitments for our cloud services with a fully-transparency approach Since March 2.017, all licensing agreements complies with GDPR Regulation Our commitment to Cloud Trust leverages across security, privacy, transparency & compliance You have visibility into our practices and the right to understand how we handle your data
CULTURE
TECHNOLOGY
Microsoft accelerates the maturity of your digital transformation strategy By leveraging our 3 bold ambitions and network of partners to Inspire your local teams to embrace change Provide specialist resources to develop skills Simplify platforms & Automate process to accelerate adoption Measure Success with Actionable Insights
ORGANIZATION (*) Forrester Digital Maturity Model
INSIGHTS
Microsoft consolidates your vendor management By integrating all your strategic services into a single solution Reducing vendor & PO’s management overloads Saving costs on atomized security and communication service providers Simplifying platforms and improving your employees IT experience
Gartner has named Microsoft a leader
x86 Server virtualization
Cloud IaaS
Cloud PaaS
Gartner “Magic Quadrant for x86 Server Virtualization Infrastructure,” by Thomas J. Bittman, Mark A. Margevicius, Philip Dawson, July 2, 2014
Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” by Lydia Leong, Douglas Toombs, Bob Gill, Gregor Petri, Tiny Haynes, May 28, 2014
Gartner “Magic Quadrant for Enterprise Application Platform as a Service,” by Yefim V. Natis, Massimo Pezzini, Mark Driver, David Mitchell Smith, Kimihiko Iijima, Ross Altman, January 7, 2014
BI and analytics platforms
Social software in the workplace
in all seven Magic Quadrants for cloud-based solutions based on its ability to execute and completeness of vision.
Public cloud storage services
Gartner “Magic Quadrant for Public Cloud Storage Services,” by Gene Ruth, Arun Chandrasekaran, July 9, 2014
Gartner “Magic Quadrant for Business Intelligence and Analytics Platforms,” by Rita L. Sallam, Joao Tapadinhas, Josh Parenteau, Daniel Yuen, and Bill Hostmann, February 20, 2014
Gartner “Magic Quadrant for Social Software in the Workplace,” by Nikos Drakos, Jeffrey Mann, Mike Gotta, September 3, 2014
Sales force automation
Gartner “Magic Quadrant for Sales Force Automation,” by Robert P. Desisto, July 15, 2014
These graphics were published by Gartner, Inc. as part of larger research documents and should be evaluated in the context of each entire document. The Gartner documents are available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Register and watch The Expert’s View: The future decoded. We’ll dive deeper into what’s in store for organizations in the future, and take a closer look at innovation, collaboration, and security trends to help organizations prepare for what’s ahead
44
Unified Comms
Mobility
Intelligence
Security
Office 2016
Outlook on iOS
MyAnalytics
Advanced Threat Protection
Office for Mac 2016
Outlook on Android
Power BI Pro
Customer Lockbox
Office 365 Video
Universal Office
Advanced eDiscovery
PSTN Calling* & Conferencing
OneDrive sync client
PowerPoint Designer and Morph
Compliance Center
Cloud PBX
Compliance Search
SharePoint Online – ‘SharePoint home’ & ‘Site contents’ page redesign
Advanced Security Management
Bookings, Planner, Sway
Skype for Business for Mac
Inking
Workplace Analytics
Threat Intelligence
GigJam
OneNote Universal
Cortana & Office 365
Advanced Data Governance
MileIQ, xRM
Outlook Mobile on Office 365
Office Graph Extensibility
Admin Service Health Dashboard
CollabDB
Word writing assistant
Support for Windows Information Protection Enterprise Mobility + Security Suite
© Copyright Microsoft Corporation. All rights reserved.