The Value Proposition of a Platform: Microsoft Win10/Office365/EM+S
[ Update 20161004: I encourage you to watch Brad Anderson’s keynote session at Microsoft Ignite 2016 – Simply IMPRESSIVE! ]
As I have written before, technology management has made an incredible shift over the past few years (maybe the last 3-5 years). Infrastructure as a Service, Platform as a Service are now the common conversations in most organizations. Some have wholeheartedly embraced the new trends while others are still thinking about it..
One of the most visible shift changes has been Microsoft’s move to services offerings. It has been incredible to see and experience. The one item I want to briefly call-out today is the combination of: Windows 10. Office 365 and Enterprise mobility & Security Suite.
Individually, each of these offerings – which is used daily by millions of users – is powerful on its own. But the real value is when you put the pieces together to delivery secured and useful services to the end-user without having to build or integrate 3rd party-systems in the back-end to support it, and all managed from a centralized (single pane of glass) console)
The set of products produces a modern work space, which is continuously morphing (improvement cycles) to insure you have a protected and secure environment to work in. From a users point of view, it includes:
- Secure Devices / Managed OS
- –Encryption / UEIF / Security Management
- –Device Enrollment
- Modern Identity Management
- –Single Sign On
- –Two-Factor Authentication
- –Self-service Password Reset
- Modern Data Security
- –Document Protection
- –Proactive Threat Management
- Application Delivery & Management
- –Provision Management (MAM)
- Conditional access and delivery of applications
- Creation and Collaboration
- –Document Creation (Office suite)
- –Document repositories (private, shared and public)
- –Shared collaborative work spaces
- –Conferencing / Video / IM
- –Multi-platform support
As far as the technologies that proved above results: Please refer to Microsoft Office 365 E5 or Microsoft Office 365 E3 licensing suite of products.
Windows 10 | ||
Create and join a domain (work network) | ||
Encryption: BitLocker | ||
Windows Defender / SmartScreen filter | ||
Group policy management | ||
Remote Desktop | ||
Hyper-V (virtualisation) | ||
Assigned Access | ||
Enterprise Mode Internet Explorer | ||
Windows Store for Business | ||
Trusted Boot | ||
Windows Update for Business | ||
Max. supported RAM: 2TB | ||
AppLocker* | ||
Direct Access* | ||
Credential Guard* | ||
AppVirtualization* | ||
Virtualization Rights ( up to 4 VDI sessions)* | ||
Office 365 Business Premium | ||
Business class email, calendar, and contacts (50 GB mailbox / User) | ||
OneDrive for Business: 1 TB file storage and sharing per user (10 GB max size) | ||
HD video conferencing | ||
Office Online | ||
Fully installed Office on PC/Mac (5 Devices /User) | ||
Office apps on tablets and phones (5 phones/tables per user) | ||
Cloud PBX* | ||
Enterprise Mobility & Security Suite | ||
Azure AD Premium | ||
Self-service password reset to reduce helpdesk calls | ||
Multi-factor authentication options for greater security | ||
Group-based provisioning and single sign-on for thousands of SaaS apps | ||
Machine learning-driven security reports for visibility and threat management | ||
Robust sync capabilities across cloud and on-premises directories | ||
Microsoft Intune | ||
Mobile application management across devices | ||
Broad device support for iOS, Android, Windows and Windows Phone devices | ||
Selective wipe of apps and data for greater security | ||
Use of System Center Configuration Manager and Endpoint Protection** | ||
Azure Rights Management | ||
Information protection from the cloud or in a hybrid model with your existing on-premises infrastructure | ||
Integration into your native applications with an easy-to-use SDK | ||
Windows Server Active Directory Rights Management Server CAL use rights** | ||
Microsoft Advanced Threat Analytics | ||
Behavioral analytics for advanced threat detection | ||
Detection for known malicious attacks and security issues | ||
Simple, actionable feed for the suspicious activity alerts and the recommendations | ||
Integration with your existing Security Information and Event Management (SIEM) systems | ||
Windows Server CAL | ||
Windows Server CAL use rights** |