Microsoft 365 Enterprise: The secure and intelligent collaboration platform for large companies

Microsoft 365 Enterprise: Una solución completa e inteligente que permite a todos ser creativos y trabajar juntos de forma segura.

Within the process of digitalization of companies, the transformation of the environment in which the work takes place is becoming increasingly important. It no longer matters from where it is made, or when, or from what devices, so that mobility becomes an important piece. The key to the success of any company must be focused on ensuring that workers are more productive and have greater flexibility, collaborating safely and in this way can create value and innovation for the company.

Microsoft 365 Enterprise

Microsoft 365 Enterprise is the flagship of Microsoft’s strategy to drive this new work culture, a platform that includes Office 365, Windows 10 Enterprise and Enterprise Mobility + Security (EMS), the most complete set of collaboration, analysis and security, which applies artificial intelligence to the day to day of the workers to facilitate productivity.

Microsoft 365 Enterprise is designed for teamwork, in a decentralized and highly mobile work world that demands solutions that bring people, information and analysis together safely, meeting the needs of large organizations (more than 300 users). Specifically Microsoft 365 Enterprise:

  • It provides the most comprehensive and complete set of applications and services for teamwork, giving people flexibility and mobility with the choice of how they connect, share and communicate.
  • It helps to safeguard the confidential information and intellectual property of your company with built-in intelligent security.
  • Train workers to work anywhere and device.
  • It helps to manage complex IT environments, because everything is integrated for simplicity.
  • It allows to obtain more detailed information from your data to make better decisions.

 

Microsoft 365 Enterprise: Una solución completa e inteligente que permite a todos ser creativos y trabajar juntos de forma segura.

Collaboration

It includes the best collaboration tools included in Office 365 Enterprise that help your company to:

  • Promote communication and collaboration between people in your organization, boosting their productivity.
  • Work better as a team, collaborating from any place and device.
  • Optimize work processes.
  • With unified communications, you can extend, duplicate or reduce the company’s entire communications infrastructure to the cloud and also extend it with integration with Microsoft Teams.
  • Connect with the entire company through Yammer.
  • Work naturally with pen inputs, voice and touch functions.

Microsoft 365 Enterprise: Una solución completa e inteligente que permite a todos ser creativos y trabajar juntos de forma segura.

Secure device management
It offers the necessary tools to manage your employees’ devices efficiently and safely, helping you to:

  • Remotely manage devices against theft, loss and termination of employees with Microsoft Intune.
  • Apply security policies to protect business data on all devices, including PCs with iOS, Android and Windows.
  • Offers you upgrade rights to Windows 10 Enterprise from Windows 7, Windows 8 and Windows 8.1 Pro versions
  • Configure computers to automatically install Office and Windows 10 Enterprise applications and updates with Autopilot.
  • Enforce malware protection to help keep Windows 10 devices safe from viruses, spyware and other malicious software.

 

Microsoft 365 Enterprise: Una solución completa e inteligente que permite a todos ser creativos y trabajar juntos de forma segura.

Smart Security and Compliance

 

Microsoft 365 Enterprise provides you with complete protection (with Microsoft Intelligent Security Graph technology) to offer you:

  • Complete protection of identities, applications, data and devices.
  • Advanced protection against security breaches on devices and servers (using Microsoft Defender ATP).
  • Protection against sophisticated threats hidden in attachments and email links, zero-day threats, Ransomware and other advanced malware attempts.
  • Shadow IT prevention and use control of unauthorized cloud applications.
  • Streamlines compliance with the GDPR standard with advanced compliance and government administration capabilities.
  • Control who has access to company information with the ability to track all activities that are carried out with the shared data, see where a document has been opened and revoke access remotely at any time.
  • Secure your business data against accidental or intentional leaks, protecting the shared use of your confidential data inside and outside the organization and applying data loss prevention policies.
  • Unlimited cloud archiving and long-term conservation policies to ensure that email is never lost.

Microsoft 365 Enterprise: Una solución completa e inteligente que permite a todos ser creativos y trabajar juntos de forma segura.

Analysis and intelligence

Microsoft 365 Enterprise, in its higher edition, includes Power BI capabilities that help you achieve significant business value from your data, also taking advantage of the Power Apps platform.

  • Transform data into stunning visual objects and share them on any device.
  • Visually explore and analyze your data in real time, in the local environment and in the cloud, all in one view.
  • Collaborate on custom panels and discover new trends in your data through interactive reports.

Discharge

Microsoft 365 Enterprise offers 3 editions:

Microsoft 365 E3
Get access to key products and features from Microsoft to improve work area productivity and drive innovation safely. This edition includes: Office 365 Enterprise E3, Windows 10 Enterprise E3 and Enterprise Mobility + security E3 (EMS)

Microsoft 365 E5
The most complete plan with which you will get access to the latest products and features with Microsoft, adding an advanced layer of advanced security with Microsoft Defender ATP, voice and data analysis tools. This edition includes Office 365 Enterprise E5, Windows 10 Enterprise E5 and EMS E5

Microsoft 365 F1
The integration of the so-called “Fist line workers” or frontline workers, who work permanently in mobility with the rest of the company, is a very important part in the success of our digital transformation strategy. These workers usually lack access to the appropriate technology, to share ideas, data and information with the rest of the colleagues in the office and thus be more productive, so connecting them efficiently to the collaboration tools will improve the processes of the company.

 

In short, Microsoft 365 Enterprise offers you a modern and highly secure work area for employees, which drives teamwork and collaboration with smart security.

Want to know more about Microsoft 365 Enterprise? Contact us!

Yes, I want to know more

How to promote digital transformation in your company through a modern job

Los motivos por los que apostar por el entorno de trabajo moderno

In an increasingly demanding market, adapting to the new digital culture by training your employees with tools so that they can offer the company all its potential and experience, is a key requirement to guarantee its competitiveness and an essential part of the transformation digital

The modern job

The job is changing, to a large extent, due to the possibilities offered by technology. However, the commitment to offer a modern workplace is much more than technology, it is a work philosophy in which collaboration reaches its maximum exponent to boost the productivity of the company allowing each worker to do their best . According to several studies, it has been possible to demonstrate how technology can almost multiply the productivity of an employee by two, which is a competitive advantage for the company.

What is the modern job?

In short, it consists of offering employees tools that foster innovation , that allow them to be more creative and with which anyone in the organization can contribute ideas. This will increase the value of all employees with tools that allow them to collaborate and work in teams. It will also help the company retain talent and, evidently, with the current threat landscape, this entire environment must be very safe and comply with current regulations .

How can Microsoft and Softeng help us?

Microsoft offers us a modern, collaborative, flexible and secure way of working through Microsoft 365 . The platform helps companies of all sizes and sectors to adopt the digital transformation and facilitate that shift towards the modern workplace and Softeng can help you to implement and adopt it correctly.

Microsoft 365 brings together in the same solution the full potential of the cloud with Office 365 , the best version of the operating system with Windows 10 and the best security and control with Enterprise Mobility + Security ( EMS ):

  • It allows companies to boost their creativity and promote teamwork through the best collaboration and communication tools included in Office 365.
  • It allows users to work safely, simplicity, flexibility and mobility.
  • It helps ensure regulatory compliance.
  • It offers tools that protect both the workers and the intellectual property of the company against an environment with increasingly complex threats.
  • It offers artificial intelligence along with technologies such as Business Intelligence or Machine Learning integrated in the products.

New objectives for your company

Now we know that boosting employee productivity is no longer the only objective that your company must pursue, so is creativity, collaboration and flexibility at work, always guaranteeing a safe environment and complying with legal regulations. Also, this new way of working does not have to be seen as something future, but as an immediate need to continue being competitive.

This article is the introduction to the rest of the posts that make up our May newsletter in which you will know the editions of Microsoft 365 according to the size of your company and also a small summary of our event in which you can verify that Softeng can be your perfect companion to help you modernize your job security.

We invite you to continue reading our newsletter   ?

How to carry out the 3 obligations in the field of security, in order to comply with the GDPR

Cómo deben actuar las empresas si hay una brecha de seguridad

One year has already passed since the General Data Protection Regulation (RGPD) came into force, which affects any company in the European Union, which collects or stores personal data of its clients and workers, guaranteeing that said data is protected, regardless of where they are shipped, processed or stored.

The processing of personal data for various purposes and different volumes of information and complexity is a reality within the daily activity of companies and for this reason, companies must be very aware of the actions they must take in order to comply with the GDPR , especially in the field of security.

Complying with the GDPR implies for companies 3 obligations in the field of security:

  • Protect personal data
  • To be able to demonstrate to the AEPD that we are protected with concrete measures.
  • Being able to detect security breaches and notify them in less than 72 hours.

On this third point, there are usually many questions in this regard and we want to tell you that the Spanish Data Protection Agency (AEPD) recently launched a guide to help companies manage and notify security breaches to the AEPD . The guide, whose link we include at the end of the article, is directed to companies that store personal data and indicates how to report incidents with this type of information, something mandatory since the entry into force of the new data protection law last 25 May 2018.

Currently companies “It takes an average of two to three months to realize there is a problem“, so it is logical that the agency Recommend the document to clearly help you know how to proceed in these cases. To do this, with the aim of being able to discover quickly an incident in terms of privacy, the agency recommends considering symptoms such as network slowdown, but especially emphasizes have alert and remediation systems. Likewise, the agency affirms that once the breach has been detected, classified and notified through the AEPD’s digital portal, “it is possible to regain peace of mind.” However, if the security breach poses a high risk to rights and freedoms, it is mandatory to inform, in addition to the public agency of the problem, to affected people, “with a clear and simple language and in a concise and transparent way”.

How does Microsoft 365 help you?

Cómo deben actuar las empresas si hay una brecha de seguridad

Microsoft 365 is in a unique position to help you comply with the GDPR , offering you the most complete set of compliance capabilities on the market, much broader than any other cloud service provider.

Microsoft 365 solutions help you comply with the regulation like this:

  • Assess compliance risk and gain actionable insights through the centralized Compliance Manager dashboard.
  • Identify personal data and where it resides, regulate its access and use, and establish adequate security controls.
  • Keep data protected across all cloud and on-premises devices, applications, and services using Microsoft 365’s built-in classification, labeling, and protection features, as well as identity protection features.
  • Detect and react to theft of personal data: On the one hand, it helps us detect accidental information leaks and, on the other, to detect cyber attacks and thefts, in order to be able to know the details of what happened instantly and if necessary, be capable of reporting to the agency in less than 72 hours, as required by regulation.

Bottom line: By deploying Microsoft 365 well and fully, you’ll have GDPR compliance at your fingertips. And no matter where you are on your way to comply with the GDPR , at Softeng, as partners specialized in Microsoft cloud solutions we can help you meet the requirements of the new regulations.

Discover HERE the Microsoft 365 solutions that help you comply with the regulation

Cómo deben actuar las empresas si hay una brecha de seguridad

Consult the guide to manage and notify security breaches of the AEPD

Discover how Microsoft 365 and Softeng help you comply with the new GDPR regulation

Microsoft 365, una garantía para el cumplimiento del GDPR y la seguridad en el puesto de trabajo

On May 25, 2018 came into force the GDPR (Global Data Protection Regulation), the regulation that replaces the current Organic Law on Data Protection (LOPD), mandatory for all member countries of the European Union and that It aims to ensure that personal data is protected regardless of where it is sent, processed or stored. The regulation contemplates fines of up to 20 million euros and up to 4% of the turnover of the companies.

GDPR requirements address internal policies, processes, people and technology, requiring companies to:

  • Identify the personal data they have and where they reside.
  • Stipulate how to use them and access them.
  • Establish adequate security controls.
  • Prepare to respond to the requests of people whose personal data are in possession of them.

Microsoft 365: How do Office 365, Enterprise Mobility + Security, and Windows 10 help you?

Microsoft 365, una garantía para el cumplimiento del GDPR y la seguridad en el puesto de trabajo

Microsoft offers Office 365, Windows 10 and Enterprise Mobility + Security in a single, always-up-to-date solution called Microsoft 365, which frees organizations from most of the costs and complexity of using multiple fragmented systems.

Microsoft 365 is in a unique position to help you comply with the GDPR , offering you the most complete set of market compliance capabilities, far more comprehensive than any other cloud service provider.

Microsoft 365 solutions help you:

  • Identify personal data and where they reside, regulate their access and use, and establish adequate security controls.
  • Help protect data on all devices, applications and services in the cloud and locally using the integrated functions of classification, tagging and protection of Microsoft 365.
  • Evaluate compliance risk and gain practical knowledge through the centralized Compliance Manager panel.
  • Keep personal data protected with the Windows 10 identity and information protection functions.

Office 365 and the GDPR

There are several Office 365 solutions that can help you identify or manage access to personal data:

  • Compliance Manager: Helps you to perform a continuous risk assessment so you can constantly monitor your compliance status.
  • Office 365 Data Loss Prevention (DLP): You can identify more than 80 types of common confidential data, including financial, medical, and personal identification information. In addition, DLP allows you to configure the measures that will be adopted after identification to protect confidential information and prevent its accidental disclosure.
  • Office 365 eDiscovery Searches: to find text and metadata in the content of your resources: SharePoint Online, OneDrive for Business, Skype for Business Online and Exchange Online. In addition, Office 365’s advanced eDiscovery employs machine learning technologies and can help you identify documents that are relevant to a particular topic (for example, regulatory compliance research) quickly and with greater accuracy.
  • Customer Lockbox: Office 365 can help you meet regulatory compliance obligations related to express authorization of data access during service operations.

Among the current features of Office 365 that protect data and identify when a data security incident occurs, we highlight:

  • Advanced Threat Protection for Exchange Online Protection: Protects email against new sophisticated malware attacks in real time. It also allows you to create guidelines that prevent users from accessing attachments or malicious websites whose links are sent by email. In addition, the Intelligence against threats helps you to detect and protect you in a proactive way against advanced threats.
  • Advanced security management: Allows you to identify abnormal and high-risk uses, which will alert you to possible security incidents. It also allows you to configure activity policies to track and respond to high-risk activities.
  • Office 365 Audit Logs: You can monitor and track the activities of administrators and users in all Office 365 workloads, which facilitates the early detection and investigation of security and compliance issues.

Microsoft Enterprise Mobility + Security and the GDPR

Enterprise Mobility + Security offers security technologies based on identities that help you detect, control and protect the personal data available to your organization, uncover possible blind spots and detect when data security incidents occur:

  • Azure Active Directory (Azure AD): Helps you ensure that only authorized users can access your computing environments, data and applications.
  • Intune: It helps you protect the data that can be stored on computers and mobile devices. You can control access, encrypt devices, remove data from mobile devices selectively, and control which applications store and share personal data.
  • Azure Information Protection (AIP): Ensures data is identifiable and protected, a fundamental requirement of the GDPR, regardless of where they are stored or how they are shared. You can classify, tag and protect new or existing data, share them securely with people in your organization or outside of it, track their use and even revoke access remotely. It also includes functions for recording and generating reports to monitor the distribution of data.
  • Advanced Threat Analytics: Helps pinpoint security incidents and identifies attackers using innovative behavior analysis and anomaly detection technologies.
  • Microsoft Cloud App Security: Helps control the cloud applications that users use from the company. Also, you can read files labeled with AIP and set policies based on the labels. The service scans confidential files used in cloud applications by company users and automatically applies AIP protection, including encryption.

Windows 10 and the GDPR

Ensuring that devices are protected is another key aspect of information protection. Windows 10 Enterprise provides information protection and identity capabilities that help companies meet the requirements of the GDPR implemented security measures to protect personal data:

  • Windows Hello: It is the password-free login method that offers you the fastest and safest way to unlock your Windows devices, through biometric recognition (recognition of fingerprint, facial and iris)
  • Windows Defender Credential Guard: It is a functionality that protects corporate identities and credentials, storing and encrypting authentication information in a separate container that only the system’s software can access. If someone takes control of your computer, it can not enter your network or copy data or damage, because the system will also ask for a credential that is stored on the computer + Another authentication factor that can be: Pin, fingerprint or phone call to verify that the person who authenticates is who they say they are.
  • BitLocker: It allows you to encrypt the content protecting the data of your computer in case of loss or theft of your device.
  • Windows Information Protection: Allow your organization to control the use of corporate data in personal devices and applications according to the policies you have defined in your MDM (Movile Device Management). This allows remote deletion of corporate data only in case of loss / theft of device and / or loss of user of the company, as well as avoiding leaks of information, preventing users from copying / downloading corporate information in personal applications.

 

No matter at what point you are on your way to comply with the GDPR , at Softeng as Microsoft cloud solutions specialist partners we can offer you the latest technologies that have been designed to help you meet the requirements of the new regulations. These features, together with the correct processes and policies, will help you to be prepared.

Do you want us to help you comply with the GDPR? Contact us!

Yes, I want!

Improve the productivity, mobility and security of your company with Microsoft Intune

INTUNE

As part of any company’s digital transformation strategy, companies are looking for the best way to offer their employees mobility in flexible and productive work environments, whether on desktops or mobile devices (in the office or outside it) , although this implies a greater security challenge for the IT departments .

Therefore, as a consequence, companies need to manage the high number of devices that access corporate data, maintaining control and protection at all times, which a priori is not a simple task. To address this challenge, we have Microsoft Intune, a cloud-based mobile device management (MDM) and mobile application management (MAM) solution that significantly increases the productivity of employees while offering the organization security and protection of their data.

In addition, Intune centralizes the administration and security of PCs, laptops and mobile devices from a single administrative console and provides hardware and software configuration reports, allowing:

INTUNE

Manage mobile devices that employees use to access company data.

INTUNE

Manage mobile applications that employees use to access company data.

INTUNE

Manage the Windows devices of the company.

INTUNE

Verify that all devices and applications comply with the security and compliance policies of the organization.

INTUNE

INTUNE Mobile device management (MDM)

With Intune you can register corporate and personal devices of your employees to establish configurations, enforce regulations and protect your corporate data. Next, we detail some of its main functionalities:

  • INTUNE Authorized devices: You can manage all types of devices (iOS, Android and PCs) as well as enforce security policies to access corporate information.
  • Selective deletion of data: With this function, if a device is lost, stolen or if the employee is no longer part of the organization, the administrators can delete the corporate data that was inside the device, and can optionally do so without deleting the data user’s personal
  • Automated deployment of applications: It allows to install in an automated way new applications and updates of the same, in the devices that Intune manages.
  • Self-service model for IT: Employees have the possibility to register their own devices and install corporate applications on iOS and Android devices, eliminating the burden for your IT department.
  • Supervision of mobile devices: You can create alerts that notify you when an incident occurs in the devices controlled by Intune.
  • Inventory and generation of hardware and software reports : Inventory reports to control devices with access to corporate services and the use of licenses.
  • Measure compliance: Intune automatically and continuously checks whether corporate devices are compatible and secure in accordance with the company’s security policies.

INTUNE Mobile application management (MAM)

In order to keep your company’s confidential information safe, Intune protects and controls how corporate data is used and shared.   In addition, if you have conditional access, there is the possibility of forcing that users’ mobile devices can only use Microsoft applications to access corporate data in Office 365, and can also apply the desired security policies.

INTUNE These are some of its main functionalities:

  • Control of corporate data: Thanks to the isolation of corporate data and personal data within the same application (for example, in Outlook, OneNote, OneDrive, Teams, Edge) the IT department controls the company’s data while the user maintains the privacy of your personal data.
  • Protection of information: Thanks to the previous isolation and through certain directives, corporate data is encrypted and access to each Microsoft App installed on the device is protected through biometric systems (FaceID, fingerprint or PIN). It can also prevent the user from saving or copying corporate data from those applications to personal accounts or applications. Additionally, it is possible to configure which vulnerable devices (for example, Jailbreak or Root) can not access.
  • Reports: Create reports on the inventory of mobile applications and tracking the use of mobile applications.
  • Devices not registered (BYOD): MAM also offers you the possibility to control and protect your data on devices that are not registered (typically personal devices), since the protection is done at the application level. For example, in case of loss of personal device, the organization could delete the corporate data of it, remotely.

INTUNE Management and administration of PCs

With the management of Intune PCs you can manage Windows 10 devices in the same way you do with the company’s mobile devices. These are some of the main functionalities:

  • Updated equipment: With Intune you can make sure that the equipment is always up-to-date.
  • Applies advanced settings for both security and device management: Among them, device protection (Windows encryption, Credential Guard, protection against vulnerabilities …), identity protection (Windows Hello for business), device restriction (Limit the Microsoft store, limit the control panel and configuration options, manage Cortana and Microsoft Edge …).
  • Deployment of Microsoft and third-party applications , from the centralized Intune console.
  • Control and protection of corporate data: Similar to the protection offered by Intune for mobile devices (MAM), it is possible to prevent users from transferring data from desktop applications that use their work account to applications that use personal accounts, helping to prevent information leaks (Applying Windows Information Protection “WIP” directives). In addition, it allows you to control the applications that have access to your company’s data (not only Microsoft applications), applying restrictions on unauthorized ones.
  • Continuous evaluation of the device to confirm that the security standards defined by the organization or the security baselines are met (Group of configuration options recommended by Microsoft and that gather the knowledge of security experts from Microsoft, partners and customers).

Differential value: Intune in Enterprise Mobility + Security (EMS)

Intune is part of EMS and integrates perfectly with other components of the suite such as Azure Active Directory (Azure AD) for identity and access control and Azure Information Protection (AIP) for the protection of corporate data. Also, when used in conjunction with Office 365, it allows employees to be productive on all their devices without compromising the organization’s information. All of this gives Intune a differential value compared to third-party mobility management solutions.

INTUNE By using Intune with the other EMS services, you provide the organization with additional security because an EMS managed application has access to a wider set of identity, device, application and data protection features, including:

  • Start of single session with third-party applications (Twitter, Facebook, Salesforce …)
  • Multi-factor authentication.
  • Conditional access to applications.
  • Simplifies the process of registering new devices with Windows Autopilot.
  • Compatibility with Rights Management.

One of the features we want to highlight is conditional access, which combines the power of Intune and Azure AD Premium. With conditional access, you can define policies that limit access to your corporate data based on location, device, user status, and application sensitivity. In addition, risk detection capabilities can detect suspicious behavior and apply restrictions automatically.

How to acquire Microsoft Intune?

Microsoft Intune can be purchased as an independent product or in one of the following sets of licenses:

Do you want to know more about Intune? Contact us!

Yes, I want to know more

2,200 million passwords stolen and exposed on the network in one of the biggest data leaks: Discover how to protect the identity of your users

2200 millones de passwords robados y expuestos en la red en una de las mayores fugas de datos.

In mid-January media reported a record security breach that exposed 773 million email accounts and 23 million passwords on the network, with the name “Collection # 1”. Now, unfortunately, these figures have fallen short to discover a few days ago, a new leak of up to 2,200 million stolen user names and passwords , under the name of “Collection # 2 to # 5”.

In companies, many of its users (for their convenience to remember them), often reuse the same password they use for personal issues in applications and corporate portals. Given this situation, the security threat for organizations is enormous since there is a risk that a cybercriminal will obtain a password from any employee who performs this type of practice and tries to use it to access your company’s data.

How can you protect the identity of your users?

The solution to the headache of IT departments facing these security threats is in the cloud and is called Azure Active Directory (AAD).

AAD facilitates, through a single identity (single sign-on) and protected (through 2 steps validation and artificial intelligence), a secure access confirming that users trying to connect to corporate applications are who they say they are.

4 measures to guarantee the security of the information of your company

4 medidas definitivas para garantizar la seguridad de la información de tu empresa

Do you know who can access the information stored in your company? Does your organization comply with the new data protection regulations? Do you have a security solution that protects your corporate email from the most advanced threats? In this article we will help you discover what are the main security risks and what solutions you have at your fingertips.

Each year, more than 6,000 vulnerabilities are discovered in systems used by enterprises around the world. This figure, included in the 2016 Trends in Cybersecurity report published by Microsoft, highlights the importance of having certified, solvent and updated security software. For this reason, we can safely say that no company – regardless of size or the sector in which it operates – can afford to do without a security strategy.

And if ensuring the security of documents and data held by a company – whether at its headquarters, in a branch or in the cloud – is one of the main concerns of the managers of half the world, the great headache of the directors technology is to choose the system that best suits the needs of your company.

Ensure security and comply with the new GDP standard 4 medidas definitivas para garantizar la seguridad de la información de tu empresa R

Concern over the guarantee of information security adds to the fear of the millions of penalties that a company that does not comply with the new General Data Protection Regulation (GDPR) which will enter into force on May 25, 2018.

According to the new legislation, which will be mandatory in all EU member states, companies that do not respect the right of citizens to know faithfully the use that will be given to their personal, public or professional data , can be fined up to 20 million euros. In addition, companies should ensure the safekeeping of third-party data and in case of an attack they will be obliged to inform both the authorities and the affected citizens.

4 measures to guarantee the protection of the data of your company 4 medidas definitivas para garantizar la seguridad de la información de tu empresa

To stop attacks and protect against vulnerabilities, the main decision that an IT director should take is to bet on the implementation of security solutions that address the 4 great risks that can arise in an organization:

1 – Prevent the identity of corporate users from being compromised
Lately, theft of passwords through fraudulent mailing practices has proliferated in an alarming way with the aim of inducing recipients to disclose their personal information (technique called Phising).

In addition to this, if we consider the growth of application use in the cloud coupled with the fact that many users often re-use the same password to access them, the security threat to enterprises is enormous given the risk that a cybercriminal get only a user password for an application that maybe .. is not even corporate!

The solution to this headache is called Azure Active Directory , because it can provide, through a single sign-on, secure and validated access in two steps , to all the applications used by the users of the company, also greatly simplifying IT management.  

2 – Protect data and ensure compliance with regulations
Stimulating productivity with cloud access while keeping protected and controlled information is essential. If you do not have a solution that allows you to control the access and diffusion of the documents of your company by your employees, we can help you from Softeng. To this end, we have implemented Azure Information Protection , which allows you to classify, label and protect your essential documents while also controlling compliance with the new GDPR legislation. This aspect is also supported by systems that include Office 365 advanced plans, such as the Customer Lockbox, to obtain the express authorization of data transfer.

3 – Expand the controls of access to the information contained in the different devices of the company
Providing enhanced security to personal and business devices is another major challenge and therefore one of the four steps a company must take to ensure its safety. In this respect, the Microsoft-based cloud-based tool, Microsoft Intune , allows you to control which devices have access to corporate applications and Office 365 data and prevent access to them in the event that devices are lost or stolen, ensuring compliance of the company’s safety regulations.

4 – Safeguard infrastructure
The fourth essential step to have your company information under control is to implement policies that help keep resources secure in the cloud and hybrid environments. For this the key is to bet on technology manufacturers who do not skimp on security like Microsoft, which invests in it more than 1 billion dollars a year. From a prism of protection of infrastructure and data as well as the possibility of recovery, Azure offers us extensive solutions of disaster recovery .

Microsoft 365, the perfect solution for your advanced security needs

Microsoft 365 E5 is the perfect solution for those companies that want to offer a modern, collaborative and highly secure work environment, offering comprehensive protection for the entire company. All this, thanks to a complete suite that includes Office 365, Windows 10 Enterprise and Enterprise Mobility + Security.

Do you need us to help you implement and take advantage of all the security tools you have at your fingertips?

Yes, I want to know more!

The 10 Keys That Yammer Can Help Your Business Succeed

Las 10 claves para el éxito al crear una red social interna en tu empresa

Do you want real-time, fluid and spontaneous communication in your organization? When solving doubts, advancing projects or managing knowledge, using tools such as email and organizing meetings is not always the best solution.

Creating a collaborative social network in the company is not an easy task, regardless of the initial thrust that you want to give and the technology chosen to mount it. There will always be a series of resistances that must be overcome for adoption, use and consumption are desired. It implies a significant cultural change, and the transition to all kinds of employee profiles has to be facilitated as much as possible. We know that the new generations are more made to “the social”, but here we must all participate …

Fortunately, Microsoft Office 365’s Yammer is not only a ready-to-use platform and integrated into its family of online collaboration and productivity services, it also has a series of analytic panels and reports that can help us assess the status of Activity, engagement and adoption, among others.

What are the keys for Yammer to help your company succeed?

1- By its internal character . Being a controlled and secure network – we must not forget this point – we can easily find any companion of the organization, which will be located in the company’s mail accounts directory.

2- You can create thematic groups , which will help you to join teams or decentralized people. And they can be both private and public (as can be the messages you send). Not everything has to be within reach of the entire template. And speaking of template: Yammer allows us to incorporate people from outside the organization , for example, collaborators or customers.

3- Within Yammer it is possible to create pages with the most relevant information for each group or project. And post calendar events (meetings, delivery milestones, or training sessions) in a common Outlook calendar.

4- Can be used on any mobile device . And on the desks. Therefore, there are no restrictions related to the use of a particular model, Android operating system or iOS (iPhone or iPad), to mention the two most common.

5- It allows to upload files of different formats . Videos (those uploaded to the platform, from YouTube, Vimeo, Office 365 V Las 10 claves para el éxito al crear una red social interna en tu empresa Ideo or Microsoft Stream), PDF, links … and of course Microsoft Office (Word, Excel …). The latter can not only be opened in preview, but can also be modified directly from Yammer.

6- Provides native integration with SharePoint Online (for Enterprise contracts). This allows you to create contextualized conversations with relevant content.

7- By gamification . As in a social network “in use”, likes, or send badges can be scored, so that it is possible to reward achievements or encourage the sharing of ideas.

8- For the surveys , which you can easily create, which undoubtedly invites participation among colleagues. And, in addition, you will have the results in real time .

9- You can follow the members of the network that you want. By participating in a particular project or initiative, by its leadership within the organization … And, in addition to people, you can also follow groups and documents.

10- You will receive the notifications that you want , either by SMS or by email and with the frequency that you prefer. And, of course, it has search tools , which can be applied to identities, texts, comments or files.

If all this does not seem enough, we will tell you that you can also use the Office 365 connectors in Yammer. For what? To incorporate content and relevant updates of more than 90 applications and other popular services available from third parties. News, social networks, management tools like Trello, Dynamics 365 …

Yammer is just one piece of everything that Office 365 can offer you. And, you see, its integration with the Microsoft family is already advancing its appeal, ease of use and adoption curve .

Whether you are already a user, but you have not advanced beyond its basic elements, as if you are interested in knowing it for the first time, you have at your disposal to make a demonstration without compromise of its capabilities.

Do you want to know more about Yammer and Office 365?


Yes, I want to know more!

Stream, the new Office 365 corporate video service

Haz tus comunicaciones más atractivas con Stream de Office 365

Increasingly, video has become an important means to share information, train and train employees so Microsoft has decided to bet strong by creating Stream, replacing the application “Videos” so far.

Haz tus comunicaciones más atractivas con Stream de Office 365 Microsoft Stream is the new video service of Office 365, a platform from which it is possible to manage company videos, allowing users to upload, share, discover and manage videos securely within the organization.

Its Office 365 integration allows you to share videos within SharePoint, Microsoft Teams and Yammer . Stream also integrates with Office 365 groups, allowing each group to have a designated channel, which makes it easier to manage content between computers.

 

 

A smart platform

Microsoft Stream has smart features for finding and interacting with videos, so all users can access relevant content quickly, efficiently, and easily.

One of these features is Face Detection, which allows users to know at what times certain people appear along the video and jump to those moments through a timeline that the platform automatically generates. In addition, Stream offers the ability to switch from voice to text to transcribe the videos in this way and to search the audio of the videos by jumping to any point in the video in which the keywords of a search are pronounced.

 

Haz tus comunicaciones más atractivas con Stream de Office 365

Microsoft Stream is included in the Enterprise and K1 versions, including more advanced options in the Office 365 Enterprise E5

Want to know more about Stream and Office 365?

Yes, I want to know more!

 

How to improve your communications thanks to the cloud

¿Te gustaría disponer de comunicaciones empresariales con servicios online y una significativa reducción de costes?

It is increasingly necessary to maintain contact through multiple channels, both among partners and with customers, suppliers, partners and collaborators; We are accustomed to it, sometimes, almost more in the personal plane than in the professional one.

In fact, on many occasions we have moved to the professional level tools designed for the consumer market that make us give up certain benefits present in other alternatives. We talk about WhatsApp, for example, which was finally encrypted not too long ago and has many shortcomings for professional use.

New mobile devices, both tablet and smartphone, and the availability of communications with really reasonable transfer rates and competitive prices allow us to not only check email at any time and from anywhere, or access important corporate documentation , but Also hold conversations and even videoconferences in multiplatform and multi-device scenarios.

The solutions of collaboration, communication and voice have undergone great changes of a time to this part. Not long ago, it was necessary to have different suppliers , who provided us with independent solutions and suffered from a great virtue: integration among all of them.

And another important factor was price : having unified communications with a certain quality meant investing in hardware, software, and services that triggered the cost of ownership (TCO) of any solution .

The multiplatform nature of certain solutions and the attractive current mobile tariffs favor the flexibility of work teams and achieve total mobility . At Softeng we are committed to communication and collaboration solutions based on Microsoft technologies , because they have a proven leadership position.

You just have to look at Gartner’s latest magic quadrant about Unified Communications.

Skype Business Voice Services

Skype Empresarial has reached a level of maturity that allows us to speak both online and over the phone and to make videoconferences and presentations with a very high quality.

¿Te gustaría disponer de comunicaciones empresariales con servicios online y una significativa reducción de costes? Skype Meeting Broadcast provides new communication options for large audiences (customer and employee events). This service allows you to hold a meeting over the internet for a maximum of 10,000 attendees who can join from anywhere and from any device, and interact in the meeting.

¿Te gustaría disponer de comunicaciones empresariales con servicios online y una significativa reducción de costes? Skype Cloud PBX allows you to replace an existing traditional PBX system (eliminating associated costs) with a set of cloud services that integrate directly with local telephone operators, are delivered directly from Office 365 and are closely integrated into the experience Of productivity in the cloud of other Microsoft services.

¿Te gustaría disponer de comunicaciones empresariales con servicios online y una significativa reducción de costes? The Microsoft RTC Call Service allows users to call traditional business phone numbers with Skype Enterprise, as well as allowing businesses to purchase phone numbers and call plans as part of their Office 365 subscription. Fast provisioning by getting, assigning and using new phone numbers in minutes for people in multiple locations. And all this without needing new telephone lines or equipment installation, managing it from a single point : the administration portal of Office 365 .

Microsoft provides the collection of technologies for communication and the most complete collaboration in the cloud, and at Softeng we can advise you to simplify the management of your communications. You’ll be surprised to see how far you can go.

Want to know more about Skype business voice services?

Yes, I want to know more!