Share

Microsoft 365 E5 – Have your cake and eat it too.

The phrase “You can’t have your cake and eat it too” is an English proverb that’s been a popular saying in one form or another for almost 500 years. It means “You cannot keep your cake, if you want to eat your cake” – in other words, once you have eaten your cake, it is gone. This same concept applies to organisations who want to balance opposing, but related quantitative variables. You cannot keep your costs low (having the cake) if you make investments (eat the cake) to increase productivity and IT security. The below diagram helps illustrate this concept.

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

The image shows the balancing act a business may be forced to deal with when considering the productivity, security and costs associated with an end user computing strategy. To put it simply – you have three options, but you can only pick two:

  • If you want to keep costs down and be productive, you need to relax security.
  • If you want to keep costs down and be secure, you will impact productivity.
  • If you want to be secure and productive, it will not be cheap.

These statements round out a general truth in the traditional IT world. Multiple disjointed technologies were used to secure and manage environments across device management, firewalls, antivirus and malware protection, group policy, identity management, 802.1x etc.

Productivity was disparate with different collaboration tools, file shares, local drives, servers, cloud storage, VPN’s, productivity applications, etc. And of course, all these technologies came with their independent associated costs, renewal fees, support costs and what’s worse – most of them did not talk to each other. For example, the tailored identity management system was not aware of the device health status the identity was being used on.

The resulting complexity became the enemy of security, interrupted productivity, and cost a fortune. To give you an indication of the complexity, 78% of today’s IT teams use over 50 different point products to keep their environments secure. 37% tap into 100 or more tools.1 This patchwork approach to security is expensive, so there tended to be an ethos of “sweating the assets” and milking them for all they were worth. This led to systems hanging around past their used-by date and becoming a burden on agility, progress and ironically security itself. Simplicity is the ultimate sophistication when it comes to cybersecurity.

If we look at a hypothetical example with all three variables under consideration with a bias towards productivity, the balance of the radar chart might look something like this.

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

But what if you could control the cost? What if the cost was fixed?

While many of us enjoy fixed costs in our daily lives with Netflix subscriptions, motor vehicle lease costs, internet, rent and loan repayments, organisations also like fixed costs because they guarantee a finite expenditure for a given outcome. Cloud adoption is popular because the upfront fixed monthly cost of a service is known. IT projects that are fixed price are more favourable than projects delivered as time and materials. Agreements with known quantities of purchase and sales are easier to negotiate. Known fixed costs allow for better budget forecasting, better transparency, more accountability, and overall better management.

Also, once the cost is known (and fixed), it is no longer a “quantitative variable”, but becomes a “quantitative constant”.

And that is what Microsoft 365 E5 licensing enables for an organisation. It allows the jumbled mess of disparate security, management, and productivity systems to consolidate into a single cohesive solution for a fixed per-user monthly price. In other words… have your cake and eat it too!

Microsoft 365 E5

Why am I talking about M365 E5 and not E3? The reason is because E5 is where all the security is, and security is what we need to flesh out that “Risk Mitigation” corner of the triangle. We all know about Office 365 and the productivity apps that are included (Teams, SharePoint, Exchange, OneDrive for Business, PowerBI, Stream, Sway, Yammer, the list goes on…) but security is what makes that productivity possible, in an environment that can be trusted.

With an E5 license you have access to the following:

  • Advanced Identity Protection – making you aware of risky events with risk-based conditional access and vulnerability detection; because logging in from an internet café on the other side of the world with an anonymous VPN, should be considered dodgy.
  • Privileged Identity Management – which enables just-in-time elevation of privileges, because being a Global Administrator 24×7 is a bad idea.
  • Cloud App Security – offering you visibility of who is using what, how much they are using, where they are using it from, as well as the control to allow or block such behaviour. Click here to read on about tackling cloud app security with Microsoft 365.
  • Azure Advanced Threat Protection – how do you know if someone got into your network and is now trying to work against you? Is the threat internal or external? Azure Advanced Threat Protection will tell you.
  • Defender Advanced Threat Protection  gives you detailed analysis and forensics on endpoint attacks and infections, backed by cloud intelligence and remediation. If you need to respond rapidly to a crypto locker attack, where you going to look? Event viewer? No – you look in here.
  • Information Protection – so you want to automatically protect a confidential file that contains the designs of a new product or piece of intellectual property? Wouldn’t it be nice to keep tabs on who’s looked at your file, and revoke access when necessary, regardless if they sit next to you, or on the other side of the world in a different company? Information Protection allows you to do just that.
  • eDiscovery and Compliance – maybe you need to adhere to strict regulation policies and audits? How do you know if you are compliant and by the way… where is your data? Wouldn’t it be a lot easier if discovery and tracking were automated? We all have untold volumes of unstructured data in our infrastructures and Advanced eDiscovery helps you find relevant documents with important content, reduce duplication (think about email threads and their infinite repetition), and helps classify and sort information in a more meaningful format.

And that’s just the beginning of Microsoft 365 E5

The list above is just the icing on the cake, Microsoft 365 E5 is a layered trifle of security and productivity benefits. I have not even touched on the insights and telemetry you can see in the back end when these products connect and talk to each other. In under 60 seconds you can connect Cloud App Security to Office 365 and Azure Active Directory to start getting a bigger picture of what is going on. The wealth of insights you can achieve by connecting the products is incredible. I could keep going – but this blog post needs to wrap up.

My point is when you control the cost, and if you control the cost using Microsoft 365 E5, that radar chart starts to look a lot more like this:

Triangle diagram - Cost Containment, Productivity and Risk Mitigation

Your three quantitative variables become a quantitative constant (the cost) and two variables (risk and productivity). And the two variables are up to you on how much you implement and deploy. You can consolidate your multiple product sets into a cohesive integrated solution. You reduce costs, administrative effort, boost security, enhance productivity, and get a better return on investment.

Take a moment to reflect on your own organisation’s IT setup and how you balance the variables of cost, productivity and security. Are you making things complicated (and expensive) for yourself by having disjointed products doing different things? Could you consolidate down to a single, simpler licensing model and still get the same capability? You might find you actually get more capability. Or could you get 90% of the capability with far less costs – and if so, is the missing 10% really that critical?

It’s worth thinking about. Or reach out to myself or your Data#3 account manager and we’ll be happy to talk about balancing your businesses variables, so you can have the cake and eat it too.

1. Oracle. (2020). Oracle Cloud Threat Report 2020. [Online] Available here.

Tags: Cybersecurity, Device Management, Microsoft, Microsoft 365, Microsoft Azure, Microsoft Azure Active Directory, Productivity, Risk Mitigation

Featured

Related

SOC - Security operations center
Pull your socks up and get a SOC

Your Business Needs A Managed Security Operations Centre (SOC) Investing in high-quality socks can give you generous support and comfort.

To-SIEM-or-not-to-SIEM
To SIEM or Not To SIEM

What is SIEM? The sheer amount of information generated on your network is the stuff…

HP Elite Dragonfly
The HP Elite Dragonfly G2 Has Arrived: Secure, Sustainable, and Spectacular

The old adage that good things come in small packages was never truer than in HP’s latest device offering –…

Cisco-Duo-TechnoPro-Customer-Story-Card
Customer Story: Cisco Duo for TechnoPro

With IoT and digital transformation accelerating at speed to support a newly remote workforce, Japan’s TechnoPro Group…

How Cisco Secure Access by Duo simplifies multi-factor authentication

Multi-factor authentication (MFA) is the simplest, most effective way to make sure users really are who they say they are.

Essential-Eight-Maturity-Model-Patch-Applications
Essential Eight Maturity Model: Patch Applications

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to…

Webinar: Improve your schools’ Essential 8 maturity with Data#3 and Microsoft
Improve your school’s Essential 8 maturity with Data#3 and Microsoft

Many organisations struggle with their cybersecurity posture. Some have managed to arrive at a state of awareness, but very few…

Essential-Eight-Maturity-Model-Application-Control
Essential Eight Maturity Model: Application Control

As of July 12, 2021, the new Essential Eight maturity model became available and inspired me to write a new…