Microsoft is the cloud service provider you can trust

related machine-to- machine and telematics projects — as new areas of spending for the year ahead 8. RIGHT SKILLS. The most commonly cited barrier to ...
7MB Größe 18 Downloads 63 vistas
All industries are investing heavily in digital transformation 2016 $ Billions

Forecasted digital transformation spend 2016-19

1 Financial services

$ billions

2 Public sector

20161

151

32 20

3 Telco and media

19

4 Advanced manufacturing

19

5 Retail/wholesale trade

15

6 Health 2019

200 - 239

12

7 Professional services 8

12

Basic goods manufacturing

9 Utilities

10 Transportation

9

$151 billion Forecasted digital transformation spend for top ten highestspending industries

7 6

1 2016 calculated based on 2015 actuals from Gartner plus an 8% CAGR Source: IDC, PAC, Gartner, Markets and Markets, MGI analysis

Top of mind for business leaders and their digital transformation

Digital transformation =

Cultural shift technology problem 1

42%

of CIOs with hiring plans are in search of people with combined TECH

RIGHT SKILLS shortage

The most commonly cited barrier to digitization for most CIOs 2

Central to any digital workplace initiative:

increasing the involvement of the employee community in technology strategies 3

By 2018, AI will be incorporated into

+

BUSINESS backgrounds

Most important decision CEOs must make in 2016 is to

$

4

invest in data science development 5

The CIO’s challenge is to convince the entire enterprise that

“SECURE BY DESIGN” should be treated as a business priority 6

Organizations can’t transform to digital unless people do

Leaders embrace digital-first to fast track transformation ADIA

1 Forrester Research. The race to digital mastery is on in 2016. Forrester. November 11, 2015. 2 Andy Rowsell-Jones, et al. 2016 CIO Agenda: Global Perspectives on Building the Digital Platform. Gartner. February 23, 2016. 3 Matthew W. Cain and Paul Miller. Recipe for Digital Workplace Execution: Transform the Employee Experience. Gartner. March 3, 2016.

4 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now (and one to ignore). CIO. December 1, 2015. 5 Ken McGee and Mark Raskino. The Most Important Digital Business Decision Senior Executives Must Make in 2016. Gartner. February 16, 2016. 6 Marcus Shingles et al. Tech Trends 2016: Innovating in the digital era. Deloitte. February 22, 2016.

1/2

of all apps developed. By 2020, savings garnered by AIenabled efficiencies are expected to total an estimated

60B

for U.S. enterprises

7

29%

of the respondents identified IoT initiatives — and related machine-tomachine and telematics projects — as new areas of spending for the year ahead

30%

By the end of 2016, of businesses will have begun monetizing their information assets, which is fueling an information-driven economy targeted at

$156B

Harness information to change the way you do business

7 John Dodge. Who’s in charge of AI in the enterprise? CIO. February 15, 2016. 8 Beth Stackpole. Forecast 2016: 5 fast-track trends to tackle now (and one to ignore). CIO. December 1, 2015. 9 Mike J. Walker, et al. Top 10 Strategic Technology Trends for 2016: Information of Everything. Gartner. February 26, 2016.

9

8

The Time is Now

From presentations, to conversations • • • •

Accelerating conversations as business requires. Real-time crowd sentiment On and Off conversations Rich more employees

Making digital transformation real Trust

Changing the conversation

Focusing Aligning on customer success our priorities

Engage your customers

Intelligent Cloud

Empower your employees

Optimize your business

Industry Horizontal scenarios scenarios Reinventing Productivity & Business Process

Security

Transform your products

Products

More Personal Computing

Services

Partners

Interactuamos con casi el 2x de equipos que hace 5 años*

41% de los usuarios declara que las apps móviles están cambiando la forma de trabajar* La sobrecarga de información hace malgastar el 25% del tiempo de los empleados (costing U.S. business $997B each year)*

160M de datos de clientes filtrados *

Nuestra Visión del Modern Workplace

229 días para detectar una infiltración de seguridad*

* Multiple industry sources.

[

NUEVAS INTERACCIONES

CENTRADAS E N L A S MÁ QUIN A S DESKTOP

]

CE N TRA DA S E N L A S PE RSON A S MÓVIL

NO CONECTADAS, CABLEADAS

SIEMPRE CONECTADO, MÓVIL

ÚNICO DISPOSTIVO PERSONAL

MÚLTIPLES DISPOSITIVOS POR PERSONA

TECLADO Y RATÓN INDIVIDUAL FÍSICO, DIGITAL

VOZ, TACTO, TINTA (NATURAL) GRUPO, SOCIAL CONVERSACIONAL, BIOLÓGICA

[

NUEVAS ORGANIZACIONES

]

[

NUEVOS HÁBITOS

]

E COSISTE MA DE CA MBIO COMPARTIR OPTIMIZAR EL USO DEL E-MAIL REUNIONES MÁS INTELIGENTES REDUCCIÓN DE IMPRESIÓN TENER INQUIETUD POR INNOVAR ESCUCHAR AL CLIENTE … PERCEPCIÓN +ACTIVA SEGURIDAD

Introducing Microsoft Teams

GDPR is here!

Privacidad Personal Individuos con derechos a: • •

Acceso a sus datos personales Corrección de errores en sus datos personales



Borrar sus datos personales



Oponerse al procesamiento de sus datos personales



Exportar sus datos personales

• • •

Controles y notificaciones

Políticas transparentes

Estrictos requisitos de Seguridad

Políticas transpàrentes y de facil acceso sobre:

Obligación de reportar brechas de seguridad



Consentimiento apropiado para el proceso de datos



Notificación sobre procesamiento



Detalles del procesamiento



Confidencialidad



Mantenimiento de registros



Notificación sobre recogida de datos

Retención y borrado de datos

IT, formación y contratos Necesidad de invertir en: •

Formación a empleados sobre privacidad



Políticas de datos



Data Protection Officer (DPO) (si + de 250 empleados)



Seguridad



Contratos Processor/Vendor

¡Ojo! GDPR = Hábitos + Secured-by-design Tech

Privacidad Personal Individuos con derechos a: • •

Acceso a sus datos personales Corrección de errores en sus datos personales



Borrar sus datos personales



Oponerse al procesamiento de sus datos personales



Exportar sus datos personales

• • •

Controles y notificaciones

Políticas transparentes

Estrictos requisitos de Seguridad

Políticas transpàrentes y de facil acceso sobre:

Obligación de reportar brechas de seguridad



Consentimiento apropiado para el proceso de datos



Notificación sobre procesamiento



Detalles del procesamiento



Confidencialidad



Mantenimiento de registros



Notificación sobre recogida de datos

Retención y borrado de datos

IT, formación y contratos Necesidad de invertir en: •

Formación a empleados sobre privacidad



Políticas de datos



Data Protection Officer (DPO) (si + de 250 empleados)



Seguridad



Contratos Processor/Vendor

“THERE ARE TWO KINDS OF COMPANIES , THOSE WHO’VE BEEN HACKED, AND THOSE WHO DON’T KNOW THEY’VE BEEN HACKED.” JAMES COMEY, DIRECTOR FBI

200+

Median number of days attackers are present on a victims network before detection

80 Days after detection to full recovery

$3TRILLION $3.5MILLION Impact of lost productivity and growth

Average cost of a data breach (15% YoY increase)

COMO OCURREN LOS INCIDENTES ? No solo hay que preocuparse del Malware y de las Vulnerabilidades

Los ataques rápidos y efectivos de phising te dejan poco tiempo de respuesta

46%

99.9%

23%

50%

de los Sistemas comprometidos no de las Vulnerabilidades fueron tenían ningún tipo de Malware explotadas un año despues de la publicación de su CVE

de los destinatarios abrieron el mensaje de phising (el 11% hizo click en los adjuntos)

De los que abrieron y clickearon el adjnto, lo hicieron en la primera hora

7

PwC’s Cyber Services PwC’s Digital Digital Services Services – Digital Transformation Confidential information for the sole benefit and use of PwC’s client.

“Everyone has a plan 'till they get punched” Mike Tyson

Hay que estar bien preparado y entrenado para hacer frente a los problemas en situaciones de crisis.

“By 2020, a corporate ‘no-cloud’ policy will be as rare as a ‘no-internet’ policy is today.”1

1Gartner: 2KPMG: 3IDC:

“The question is no longer: ‘How do I move to the cloud?’ Instead, it’s ‘Now that I’m in the cloud, how do I make sure I’ve optimized my investment and risk exposure?”2

Smarter with Gartner, Why a No-Cloud Policy Will Become Extinct, February 2, 2016

2014 Cloud Survey Report, Elevating business in the cloud, December 10, 2014

IDC Market Spotlight, Cloud Definitions and Opportunity, April 2015

“By 2020 clouds will stop being referred to as ‘public’ and ‘private’. It will simply be the way business is done and IT is provisioned.”3

Propuesta de Valor

Alineado con las necesidades del negocio y el entorno actual de amenazas

Holística

Impulsada por la Identidad

Innovadora

Inteligente

Dirigida a los retos de la seguridad sobre los usuarios (identidades), dispositivos, datos, apps y plataformas – on-premises y en la nube

Ofrecer una única identidad protegida para asegurar el acceso seguro a todos los recursos corporativos, onpremises y en nube, con acceso condicional basado en perfiles de riesgos.

Proteger los datos de nuevos y cambiantes ataques de ciberseguridad.

Mejora la detección de amenazas y detección de anomalías con nuestra el uso de Microsoft Intelligent Security Graph impulsado por un gran numero de datasets y machine learning en la nube

Visión de las Soluciones de Seguridad de Microsoft

Information Rights Management

x2.25

Multifactor Authentication

x2.25

Protect with and without enrollment

Multi-identitypolicy policy Multi-identity

Corporate apps

Corporate Corporate data data Personal Personal data data

x2.25

Personal apps

Advanced Threat Intelligence built over Security Graph

Locky Malware

Linda Finance Important

Gopi

Infected Sensitive

Targeted Phish Infected

Credit cards

Advanced Threat Protection

Advanced eDiscovery

“Make no mistake, the GDPR sets a

new and higher bar for privacy rights, for security, and for compliance. And while your journey to GDPR may seem challenging, Microsoft is here to help all of our customers around the world.” Brad Smith President & Chief Legal Officer Microsoft Corporation

Our Terms of Service contractually commit the Microsoft Cloud to meet all Data Processor

requirements under GDPR when enforcement begins on May 25, 2018.

We will share our experience in complying with GDPR as a Data Controller and Data Processor. Together with our partners, we will help you meet the people, policy, process, and technology obligations on your own GDPR journey.

Microsoft infrastructure investments 38 Cloud Geographies United Kingdom South North Central US United Kingdom West West US 2 West Central US

West US US Gov Arizona3 US Gov Texas3

Central US

Canada Central North Europe

Canada East

US Gov Iowa

East US

US DoD West

France3 France3

Korea Central Korea South China West1 Japan East

Germany Central2

Japan West

China East1

East US 2

US Gov Virginia South Central US

West Europe Germany Northeast2

West India

US DoD East Central India

South India

East Asia

Southeast Asia

100+ datacenters Top 3 largest networks in the world 1China

datacenters operated by 21 Vianet

2German

data trustee services by T-systems

3France,

and US Gov datacenter regions have been announced but are not currently operational Global datacenters Sovereign datacenters

Brazil South

Australia East Australia Southeast

GDPR + Office Product Mapping Office 365 is a highly secure, intelligent and comprehensive cloud-based productivity platform. Office 365 enables you to keep your enterprises’ users and data protected both in transit and at rest. When you entrust your data to Office 365, you remain the sole owner: you retain the rights, title, and interest in the data. Company Officers can use the rich collaboration and analysis tools of Office 365 to maintain their policies, automate workflows & track responsibilities related to GDPR and other business requirements.

Discover

Right to Erasure Right to Data Portability

Manage

Protect

Documentation Privacy by Design

Data Security Data Transfer

Report

Documentation Breach Response and Notification

Security & Compliance Center

A one-stop portal for protecting your data in Office 365. Grant permissions to people who perform compliance tasks.

Data Loss Prevention

Unified policies covering client end-points, empowering IT pros

Advanced Data Governance

Classify, preserve and/or purge data based on automatic analysis and policy recommendations

Content search

run very large searches across mailboxes, public folders, Office 365 Groups, Microsoft Teams, SharePoint Online sites, One Drive for Business locations, and Skype for Business conversations

eDiscovery

use cases to manage access, place a hold on content locations relevant to the case, associate multiple Content Searches with the case, and export search results

Advanced eDiscovery

significantly reduce cost and effort to identify relevant documents & data relationships by using machine learning to train the system to intelligently explore large datasets

Data Governance

Threat Management

archive and preserve content in Exchange Online mailboxes, SharePoint Online sites, and OneDrive for Business locations, and import data into your Office 365 organization.

helps you control and manage mobile device access to your organization's data, help protect your organization from data loss, and help protect inbound and outbound messages from malicious software and spam

Information Rights Management

Advanced Threat Protection

prevent sensitive information from being printed, forwarded, saved, edited, or copied by unauthorized people

provides security functions that protect user environments that contain consumer data including Safe Attachments & Safe Links

Threat Intelligence

analyze and understand their local threat environment, including malware detected, targeted users, and links to global security stats

Advanced Security Management

gain enhanced visibility and granular security controls and policies including the ability to suspend user accounts, revoking access to personal data

Secure Score

insights into your security position and what features are available to reduce risk while balancing productivity and security

Audit Logs

record and search desired user and admin activity across your organization

Service Assurance

deep insights for conducting risk assessments with details on Microsoft Compliance reports and transparent status of audited controls.

Customer Lockbox

control how a Microsoft support engineer accesses your data during a help session

Por qué Microsoft?

Microsoft is the cloud service provider you can trust We stand behind you through contractual commitments for our cloud services with a fully-transparency approach Since March 2.017, all licensing agreements complies with GDPR Regulation Our commitment to Cloud Trust leverages across security, privacy, transparency & compliance You have visibility into our practices and the right to understand how we handle your data

CULTURE

TECHNOLOGY

Microsoft accelerates the maturity of your digital transformation strategy By leveraging our 3 bold ambitions and network of partners to Inspire your local teams to embrace change Provide specialist resources to develop skills Simplify platforms & Automate process to accelerate adoption Measure Success with Actionable Insights

ORGANIZATION (*) Forrester Digital Maturity Model

INSIGHTS

Microsoft consolidates your vendor management By integrating all your strategic services into a single solution Reducing vendor & PO’s management overloads Saving costs on atomized security and communication service providers Simplifying platforms and improving your employees IT experience

Gartner has named Microsoft a leader

x86 Server virtualization

Cloud IaaS

Cloud PaaS

Gartner “Magic Quadrant for x86 Server Virtualization Infrastructure,” by Thomas J. Bittman, Mark A. Margevicius, Philip Dawson, July 2, 2014

Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” by Lydia Leong, Douglas Toombs, Bob Gill, Gregor Petri, Tiny Haynes, May 28, 2014

Gartner “Magic Quadrant for Enterprise Application Platform as a Service,” by Yefim V. Natis, Massimo Pezzini, Mark Driver, David Mitchell Smith, Kimihiko Iijima, Ross Altman, January 7, 2014

BI and analytics platforms

Social software in the workplace

in all seven Magic Quadrants for cloud-based solutions based on its ability to execute and completeness of vision.

Public cloud storage services

Gartner “Magic Quadrant for Public Cloud Storage Services,” by Gene Ruth, Arun Chandrasekaran, July 9, 2014

Gartner “Magic Quadrant for Business Intelligence and Analytics Platforms,” by Rita L. Sallam, Joao Tapadinhas, Josh Parenteau, Daniel Yuen, and Bill Hostmann, February 20, 2014

Gartner “Magic Quadrant for Social Software in the Workplace,” by Nikos Drakos, Jeffrey Mann, Mike Gotta, September 3, 2014

Sales force automation

Gartner “Magic Quadrant for Sales Force Automation,” by Robert P. Desisto, July 15, 2014

These graphics were published by Gartner, Inc. as part of larger research documents and should be evaluated in the context of each entire document. The Gartner documents are available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Register and watch The Expert’s View: The future decoded. We’ll dive deeper into what’s in store for organizations in the future, and take a closer look at innovation, collaboration, and security trends to help organizations prepare for what’s ahead

44

Unified Comms

Mobility

Intelligence

Security

Office 2016

Outlook on iOS

MyAnalytics

Advanced Threat Protection

Office for Mac 2016

Outlook on Android

Power BI Pro

Customer Lockbox

Office 365 Video

Universal Office

Advanced eDiscovery

PSTN Calling* & Conferencing

OneDrive sync client

PowerPoint Designer and Morph

Compliance Center

Cloud PBX

Compliance Search

SharePoint Online – ‘SharePoint home’ & ‘Site contents’ page redesign

Advanced Security Management

Bookings, Planner, Sway

Skype for Business for Mac

Inking

Workplace Analytics

Threat Intelligence

GigJam

OneNote Universal

Cortana & Office 365

Advanced Data Governance

MileIQ, xRM

Outlook Mobile on Office 365

Office Graph Extensibility

Admin Service Health Dashboard

CollabDB

Word writing assistant

Support for Windows Information Protection Enterprise Mobility + Security Suite

© Copyright Microsoft Corporation. All rights reserved.