Image Security age

Expand your business opportunities with Cloud-Security

Join the sessions to discover new opportunities for partners consulting business, additional project portfolio proposals, stages of cloud security projects, definition and expansion of the scope of work for other projects to Azure security’s stages, project team requirements, trainings and workshops, documentation and PoC in Azure.

Explore sessions Read the blog

Upcoming Security Webinars

Azure Sales Star program’s upcoming webinars to sell Microsoft Azure Security Services like a pro. Sessions designed to increase your Azure Sales readiness.



FEB 6, 2017 at 10.00 AM (CET)

KICK OFF SESSION / AZURE SECURITY SCENARIOS - OVERVIEW OF MAIN SCENARIOS FOR SECURITY PROJECTS. (100 level)

Get started with an introduction to key consulting project scenarios and new partner opportunities with Cloud-based security in Azure. Get an overview as to what are the options to implement a secure Cloud or hybrid identity with Microsoft Entra ID (ME-ID), secure mobile users through Mobile Device Management with Intune and Office 365, protect data access in the Azure or hybrid infrastructure with Azure Resource Manager (ARM)/Information Protection and secure Microsoft Azure IaaS solutions.

Watch the recording Download the PDF


 

 

FEB 9, 2017 at 10.00 AM (CET)

 

NEW PARTNER OPPORTUNITIES AND KEY CONSIDERATIONS TO PLAN CLOUD/HYBRID IDENTITY PROJECTS. (100-200 level)

As a part of business requirements, organizations need to secure authentication and enable authorized access to its on-premises resources and services as well as Cloud services for employees “on the go” and external users. Solutions need to be compatible with existing Microsoft Active Directory infrastructure and cover main security practices such us single sign-on, among others. On this session, we will discuss practical details on planning Cloud/hybrid identity, Azure B2B, B2C, AD – Cloud identity scenarios, synchronized & Federated identity and planning Active Directory Federation Services (AD FS).

Watch the recording Download the PDF

 

 

FEB 13, 2017at 10.00 AM (CET)

 

FINE-TUNE THE DETAILS OF PLANNING HYBRID IDENTITY - MFA, APPLICATION PROXY, MICROSOFT ENTRA CONDITIONAL ACCESS, IDENTITY PROTECTION. (200 level)

Today, more than ever, people are increasingly connected. Customers need reliable and seamless protection across their entire infrastructure network for every one of the devices their internal and external users access. On this session, we will continue to discuss key aspects and the scope of work for hybrid identity projects focusing on more technical details such as planning secure publishing of on-premises application with Cloud-based Microsoft Entra Application Proxy or planning users’ multifactor authentication with on-premises Azure Multi-factor Authentication (MFA) Server deployment, among others.

Watch the recording Download the PDF

 

 

 

FEB 16, 2017 at 10.00 AM (CET)

 

PROVIDE A FULL MANAGEMENT EXPERIENCE FOR HYBRID INFRASTRUCTURE AND IDENTITY PROTECTION FOR MODERN ATTACKS. (200-300 level)

Learn about the key aspects of protection of hybrid infrastructure from the latest attacks on identity and the new security opportunities for on-premises Active Directory. Get relevant Azure operational insights on planning and deploying Operations Management Suite (OMS), advanced threats analytics & path-the-hash/path-the-ticket (PTH/PTT) projects. We will also cover additional consulting opportunities, tasks and scope of work for projects of secure on-premises Active Directory and Microsoft Entra identities.

Watch the recording Download the PDF

 

 

FEB 20, 2017 at 10.00 AM (CET)

 

SECURE MOBILE USERS PLANNING: MOBILE DEVICE MANAGEMENT (MDM) SCENARIOS COMPARISON – O365/INTUNE/SCCM HYBRID. (100 level)

Organizations need to have control of their settings, applications and data on different types of corporate mobile devices as well as user-owned devices (BYOD) used to access the organization’s data. Learn the key aspects of protection for mobile device users with Office 365, Intune and System Center Configurations Manager Cloud-based Mobile Device Management security solutions. We will compare these MDM security scenarios, discuss consulting opportunities, interconnectedness and mutual promotion of MDM and Hybrid Identity projects.

Watch the recording Download the PDF

 

 

 

FEB 23, 2017 at 10.00 AM (CET)

 

IMPLEMENTING MICROSOFT INTUNE TO MDM - COMPLIANCE, CONFIGURATION, MICROSOFT ENTRA CONDITIONAL ACCESS, MOBILE APPLICATION MANAGEMENT POLICIES. (200 level)

Join this session to get the key technical details of Microsoft Intune mobile device management (MDM) projects. We will discuss about the tasks and the scope of work for Microsoft Intune’s implementation projects, such as compliance and configuration policies, Microsoft Entra conditional access policies for Exchange ActiveSync, mobile application management policies, performing full or selective wipe of the devices, mobile Device monitoring and Azure Cloud App Security.

Watch the recording Download the PDF

 

 

FEB 27, 2017 at 10.00 AM (CET)

 

PLANNING DATA ACCESS & PROTECTION IN HYBRID INFRASTRUCTURE - DEFENSE IN DEPTH, SCENARIOS MATRIX, MDM, WORK FOLDERS. (100 level)

Most organizations’ critical data is located on-premises; however, as users get mobile, data security is at greater risk. Solutions have to implement security controls to mitigate potential data leakage and ensure the organization’s data is classified according to the level of confidentiality. Learn the essentials for data access and protection projects, why the discussion with the customer should be oriented towards Defense in Depth strategy and what is the security scenarios’ matrix for projects like this.

Watch the recording Download the PDF

 

 

 

MAR 2, 2017 at 10.00 AM (CET)

 

PLANNING HYBRID DATA PROTECTION AT THE FILE LEVEL - AZURE RIGHTS MANAGEMENT (RMS) & AZURE INFORMATION PROTECTION. (200 level)

How can organizations classify, label and protect documents or emails with sensitive information in the safest and most reliable manner? Expand with comprehensive information about protection capabilities for customers that prevent data loss and track information at the file level regardless of where data resides or with whom it is shared. Also, learn the key technical details of Microsoft Cloud-based security services for mobile data protection and its coexistence with Intune MDM.

Watch the recording Download the PDF

 

 

MAR 6, 2017 at 10.00 AM (CET)

 

PLANNING AZURE INFRASTRUCTURE SECURITY – ADMINS ACCOUNT PROTECTION (MFA, IDENTITY PROTECTION, PRIVILEGES IDENTITY MANAGEMENT, PAW), AZURE NETWORK SECURITY. (200-300 level)

When an organization plans to move some part of their on-premises servers/services to Azure IaaS/PaaS, it is fundamental to ensure that all VMs/data will be protected. The Azure infrastructure uses a defense-in-depth approach by implementing security controls in different layers, which expands from physical security, data security, identity and access management, and application security.

Watch the recording Download the PDF

 

MAR 9, 2017 at 10.00 AM (CET)

PLANNING AZURE INFRASTRUCTURE SECURITY – DATA PROTECTION IN AZURE (VM, STORAGE, SQL ENCRYPTION). AZURE SECURITY CENTER, AZURE OPERATIONAL INSIGHTS. (200-300 level)

We will expand the project’s scope of work on areas such as data protection in Azure IaaS – implementing encrypted virtual machines in Azure, Azure Storage Service Encryption, Azure SQL data encryption – and cover scenarios and insights of protection by Azure Key Vault, Azure VMs security monitoring by Azure Security Center Azure and hybrid monitoring and audit of security by Operations Management Suite (OMS, Operational Insights).

Watch the recording Download the PDF



The Azure Sales Star Blog

Have you already registered for the training sessions? Then it’s time to get started with a selection of posts and expert articles for Cloud sellers like you!



Cloud threats for 2017 500x280

Top Cloud threats for 2017 and how vendors will respond with security

The bright side of Cloud 500x280

The bright side of Cloud-based security

The primary reason for adopt 500x280

Security can be the primary reason for Cloud adoption

Turkiye Finans 500x280

Türkiye Finans trusts Azure Security solutions to keep customers’ data safe

Industry page image 500x375

Selling Cloud Solutions to Industries?

Watch the latest webcasts to address specific Industries and differentiate with Azure services

Explore sessions


PRIVACY STATEMENT


Microsoft respects your privacy. Please read our online Privacy Statement.

If you would prefer not to receive future promotional emails from Microsoft Corporation, please click here to unsubscribe. These settings will not affect any newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.


To set your contact preferences for Microsoft newsletters, see the communications preferences section of the Microsoft Privacy Statement.


To set your contact preferences for other Microsoft Communications, click here.


Microsoft Corporation Ltd.
One Microsoft Way
Redmond, WA 98052-7329
USA


© 2016 Microsoft. All rights reserved