fbpx
Share

Microsoft 365 E5 – Have your cake and eat it too.

The phrase “You can’t have your cake and eat it too” is an English proverb that’s been a popular saying in one form or another for almost 500 years. It means “You cannot keep your cake, if you want to eat your cake” – in other words, once you have eaten your cake, it is gone. This same concept applies to organisations who want to balance opposing, but related quantitative variables. You cannot keep your costs low (having the cake) if you make investments (eat the cake) to increase productivity and IT security. The below diagram helps illustrate this concept.

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

The image shows the balancing act a business may be forced to deal with when considering the productivity, security and costs associated with an end user computing strategy. To put it simply – you have three options, but you can only pick two:

  • If you want to keep costs down and be productive, you need to relax security.
  • If you want to keep costs down and be secure, you will impact productivity.
  • If you want to be secure and productive, it will not be cheap.

These statements round out a general truth in the traditional IT world. Multiple disjointed technologies were used to secure and manage environments across device management, firewalls, antivirus and malware protection, group policy, identity management, 802.1x etc.

Productivity was disparate with different collaboration tools, file shares, local drives, servers, cloud storage, VPN’s, productivity applications, etc. And of course, all these technologies came with their independent associated costs, renewal fees, support costs and what’s worse – most of them did not talk to each other. For example, the tailored identity management system was not aware of the device health status the identity was being used on.

The resulting complexity became the enemy of security, interrupted productivity, and cost a fortune. To give you an indication of the complexity, 78% of today’s IT teams use over 50 different point products to keep their environments secure. 37% tap into 100 or more tools.1 This patchwork approach to security is expensive, so there tended to be an ethos of “sweating the assets” and milking them for all they were worth. This led to systems hanging around past their used-by date and becoming a burden on agility, progress and ironically security itself. Simplicity is the ultimate sophistication when it comes to cybersecurity.

If we look at a hypothetical example with all three variables under consideration with a bias towards productivity, the balance of the radar chart might look something like this.

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

But what if you could control the cost? What if the cost was fixed?

While many of us enjoy fixed costs in our daily lives with Netflix subscriptions, motor vehicle lease costs, internet, rent and loan repayments, organisations also like fixed costs because they guarantee a finite expenditure for a given outcome. Cloud adoption is popular because the upfront fixed monthly cost of a service is known. IT projects that are fixed price are more favourable than projects delivered as time and materials. Agreements with known quantities of purchase and sales are easier to negotiate. Known fixed costs allow for better budget forecasting, better transparency, more accountability, and overall better management.

Also, once the cost is known (and fixed), it is no longer a “quantitative variable”, but becomes a “quantitative constant”.

And that is what Microsoft 365 E5 licensing enables for an organisation. It allows the jumbled mess of disparate security, management, and productivity systems to consolidate into a single cohesive solution for a fixed per-user monthly price. In other words… have your cake and eat it too!

Microsoft 365 E5

Why am I talking about M365 E5 and not E3? The reason is because E5 is where all the security is, and security is what we need to flesh out that “Risk Mitigation” corner of the triangle. We all know about Office 365 and the productivity apps that are included (Teams, SharePoint, Exchange, OneDrive for Business, PowerBI, Stream, Sway, Yammer, the list goes on…) but security is what makes that productivity possible, in an environment that can be trusted.

With an E5 license you have access to the following:

  • Advanced Identity Protection – making you aware of risky events with risk-based conditional access and vulnerability detection; because logging in from an internet café on the other side of the world with an anonymous VPN, should be considered dodgy.
  • Privileged Identity Management – which enables just-in-time elevation of privileges, because being a Global Administrator 24×7 is a bad idea.
  • Cloud App Security – offering you visibility of who is using what, how much they are using, where they are using it from, as well as the control to allow or block such behaviour. Click here to read on about tackling cloud app security with Microsoft 365.
  • Azure Advanced Threat Protection – how do you know if someone got into your network and is now trying to work against you? Is the threat internal or external? Azure Advanced Threat Protection will tell you.
  • Defender Advanced Threat Protection  gives you detailed analysis and forensics on endpoint attacks and infections, backed by cloud intelligence and remediation. If you need to respond rapidly to a crypto locker attack, where you going to look? Event viewer? No – you look in here.
  • Information Protection – so you want to automatically protect a confidential file that contains the designs of a new product or piece of intellectual property? Wouldn’t it be nice to keep tabs on who’s looked at your file, and revoke access when necessary, regardless if they sit next to you, or on the other side of the world in a different company? Information Protection allows you to do just that.
  • eDiscovery and Compliance – maybe you need to adhere to strict regulation policies and audits? How do you know if you are compliant and by the way… where is your data? Wouldn’t it be a lot easier if discovery and tracking were automated? We all have untold volumes of unstructured data in our infrastructures and Advanced eDiscovery helps you find relevant documents with important content, reduce duplication (think about email threads and their infinite repetition), and helps classify and sort information in a more meaningful format.

And that’s just the beginning of Microsoft 365 E5

The list above is just the icing on the cake, Microsoft 365 E5 is a layered trifle of security and productivity benefits. I have not even touched on the insights and telemetry you can see in the back end when these products connect and talk to each other. In under 60 seconds you can connect Cloud App Security to Office 365 and Azure Active Directory to start getting a bigger picture of what is going on. The wealth of insights you can achieve by connecting the products is incredible. I could keep going – but this blog post needs to wrap up.

My point is when you control the cost, and if you control the cost using Microsoft 365 E5, that radar chart starts to look a lot more like this:

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

Your three quantitative variables become a quantitative constant (the cost) and two variables (risk and productivity). And the two variables are up to you on how much you implement and deploy. You can consolidate your multiple product sets into a cohesive integrated solution. You reduce costs, administrative effort, boost security, enhance productivity, and get a better return on investment.

Take a moment to reflect on your own organisation’s IT setup and how you balance the variables of cost, productivity and security. Are you making things complicated (and expensive) for yourself by having disjointed products doing different things? Could you consolidate down to a single, simpler licensing model and still get the same capability? You might find you actually get more capability. Or could you get 90% of the capability with far less costs – and if so, is the missing 10% really that critical?

It’s worth thinking about. Or reach out to myself or your Data#3 account manager and we’ll be happy to talk about balancing your businesses variables, so you can have the cake and eat it too.

1. Oracle. (2020). Oracle Cloud Threat Report 2020. [Online] Available here.

Tags: Cybersecurity, Device Management, Microsoft, Microsoft 365, Microsoft Azure, Microsoft Azure Active Directory, Productivity, Risk Mitigation

Featured

Related

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…

Delivering the Digital Future, Securely – for Western Australia
Delivering the Digital Future, Securely – for Western Australia

Data#3, proudly sponsored by Cisco, Microsoft and Palo Alto Networks, are pleased to present to you: Delivering the Digital Future,…