Getting started with Microsoft Secure Productive Enterprise

Getting started with Microsoft Secure Productive Enterprise

How to stay secure and be more productive with Microsoft Secure Productive Enterprise. We show you how to get started and make sure that where ever corporate data resides or travels, you can protect it.

Getting started with Microsoft Secure Productive Enterprise

We are creating and sharing more information with colleagues and partners than ever before. This information traverses internal and external networks; it goes to team members via collaboration and messaging tools. In many cases enterprise information systems are regularly accessed by employees anywhere, any time via any device.

This means that organisations need to focus on more sophisticated ways of securing and protecting their data as it moves around the enterprise and beyond it. This information is the business’s most important asset, alongside those workers who create that content.

That’s why Microsoft has added security tools to its productivity suite. Secure Productive Enterprise adds protection features to its widely deployed office productivity tools, mobile device management and identity access management solutions.

Where to begin

When rolling out Secure Productive Enterprise, it is best to start with Windows 10 Enterprise E5. This is the only version of Windows 10 that includes Defender Advanced Threat Protection (more on that below). Windows 10 Enterprise E5 also sports all the features of its E3 sibling and so can be used in businesses that handle sensitive customer data or are in regulated industries.

Next up are the productivity tools themselves; Office 365. This is the suite your users will understand and work with the most. Not only will it create content, it can also be used to manage enterprise and customer data. With the E5 plan, organisations will also have the most up to date version of the Office applications and more besides, including mobile versions of the same apps so that your mobile warriors can access information wherever they are.

It is also cloud-based, so productivity is possible regardless of location and device. But this begs the question, how can the IT manager protect corporate data from malicious attacks?

IT administrators can implement a number of security features that come with Secure Productive Enterprise. Windows Defender Advanced Threat Protection (ATP) can assist in helping enterprises detect, investigate, and respond to advanced and targeted attacks on their networks. Part of this is built into Windows 10 and is activated upon service enrolment. The client logs relevant security events and behaviours from the endpoint.

There is also a cloud security analytics service that processes data from endpoints in combination with historical data and Microsoft’s wide data repository to detect anomalous behaviours. Lastly, Microsoft helps users by gathering intelligence data from the security community to find new behavioural patterns.

Microsoft Cloud App Security can be used by administrators to gain control of the SaaS apps employees, while Azure Information Protection helps ensure information stays secure.

Within Office 365 itself is Advanced Security Management. This can be implemented throughout an organisation to give IT administrators more visibility and control over an Office 365 environment.


Creating and securing content are just part of the puzzle; organisations also need to communicate internally and externally.

Skype for Business provides voice-over-IP (VoIP) calling over your network and the internet to users in your organisation, Skype for Business users in other companies, as well as ordinary Skype users. This solution can also be used to share content and video as well.

In addition to this, Cloud PBX can get rid of a traditional PBX system and its costs with a new offering based in the cloud. Not only can it be set up to carry out all the functions of that traditional PBX, but also has built-in voicemail and Exchange integration. Cloud PBX also comes with encryption by default.

Managing mobility

Microsoft’s Enterprise Mobility Suite has been renamed Enterprise Mobility + Security. This solution can help IT administrators manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. It provides a framework to protect assets whether they’re on-premise, on your mobile devices, or in the cloud.

The solution delivers and manages apps across a broad range of devices, including iOS, Android, Windows and Windows Phone, all from a single management console. It is important to note here that when planning a mobility strategy, organisations need to understand their users’ needs, as well as what devices they have and what platforms or applications will be used.

Getting started with Secure Productive Enterprise means that your organisation will be in a great place to deal with a multitude of issues that could face you now and in the future.

Thinking of rolling out Microsoft’s Secure Productive Enterprise for your organisation? Crayon has a team of experts on hand to reduce enterprise risk and total cost of ownership (TCO) through true strategic software asset management. In Spain Logtrust – an ISV that delivers a service of logs and metrics in Machine Real-Time (sub-second) or Human Real-Time (within 10 seconds) for any data, with any volume at any time – has chosen Crayon to assist with its migration to Azure. Logtrust will also work with Crayon’s specialists to help it drive channel sales.

I am the Group Chief Marketing Officer at Crayon. My team are focused on driving enhanced lead generation campaigns and nurturing for our sales organisations across multiple geographies though the utilisation and coordination of all online and offline communication channels. We are driving increased brand awareness in the business's core competency areas of Software Asset Management (SAM), cloud and volume licensing solutions and associated consultancy services. I have over 20 years of senior business leadership experience within direct marketing/direct sales and mass distribution businesses, in both the B2B and B2C markets serving on the boards of both private and public multinational corporations.