Visit the crayon.com enterprise site
Crayon Channel APAC
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login

Search

Become a Partner Partner Login
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login
Crayon Channel APAC

Search

Home / Enablement Hub / Training / Webinars Series / Microsoft E5: Do more security and compliance with less

Microsoft E5: Do more security and compliance with less

Watch Now
10th December 2024
How to Secure and Ensure Productivity with E5

How to Secure and Ensure Productivity with E5

Microsoft 365 E5 is the most comprehensive suite offered by Microsoft, integrating advanced security, compliance, and IT management features. It is designed to help businesses consolidate multiple solutions into one, thereby reducing costs and simplifying IT management.

Over the next hour our session experts will guide you through the Microsoft E5 solution, how to deploy best practices that safeguard data and streamline compliance.

You’ll learn how implementing Microsoft E5 can help to reduce licensing costs by up to 60% and improve IT management efficiencies.

Watch the full webinar below, read on for key takeaways and download the presentation deck for future reference.

 

Your Hosts


Andrew Aldridge

Pre-sales Technical Specialist, Crayon Channel APAC

Michael Brooke

Solution Architect, Crayon Channel APAC

Special Guests

Dayvyson Chaves 

Security Specialist, Microsoft Australia

Pardeep Sharma

Security Consultant, Microsoft Australia

Webinar Agenda

Unpacking security inclusions in the Microsoft E5 Defender Suite
Defender for Office 365, Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.

Understanding E5 advanced security features
Protection for email, collaboration tools, endpoints, cloud applications, and data.
How to safeguard against threats from insider risk, simplify legal and compliance investigations

Streamlining IT Management
How to use Microsoft E5 to lighten the load and improve outcomes

Compliance and Data Governance
Using Microsoft Purview for data discovery, classification, labelling and encryption.

Simplifying cybersecurity practices
Using automated investigation and response capabilities, risk-based conditional access, and simulation training in E5.

Choosing the right plan
Understand the differences and benefits of P1 and P2 plans

Simplified Cybersecurity Practices with E5

Microsoft E5 provides the means to simplify security practices in five significant ways:

1. Consolidates Security Solutions

Juggling multiple standalone security tools can be both expensive and complex. By switching to Microsoft 365 E5, you get an all-in-one, integrated suite which can greatly reduce licensing costs and contribute to less overall management complexity.

 

2. Automates the Heavy Security Lifting

Defender for Office 365 and Defender for Endpoint come with built-in automated investigation and response features. These tools take over repetitive security tasks, freeing your team to focus on higher-priority issues. Plus, automated responses mean threats are dealt with faster than ever.

3. Leverages Smarter Access Controls with Risk-Based Policies

Using Entra ID’s risk-based conditional access, you can strike the perfect balance between security and convenience. This feature evaluates the risk of each login attempt and adjusts security measures accordingly, keeping data safe without frustrating users.

4. Empowers Employees with Cybersecurity Awareness

Poor organisational culture will eat your cybersecurity strategy for breakfast. Tools like attack simulation training in Defender for Office 365 can create opportunities to wrap ongoing services around employee education and simulated training for improved frontline understanding of common tactics such as phishing.

5. Reduces Frontline Burnout

For technical users, the struggle to manage the complex nature of security is real. The leaner the team, the greater the need to do more with less, while avoiding increased concern and stress about cutting corners or missing critical incidents.Microsoft 365 E5 is like having a Swiss Army knife for security and compliance. Its unified dashboard provides a clear view of threats across the IT environment, while risk-based conditional access and automated remediation help small or less specialised security teams keep pace with changing techniques and tools used by attackers.

Plus, the features in the E5 suite are ideal for reducing manual processes related to regulatory and compliance demands.

P1 or P2 – what’s the difference in E5 plans?

Microsoft 365 E5 is available in two tiers in Australia: P1 and P2, each tailored to different organisational needs.

The P1 plan

This provides robust security and compliance features, including core tools like Microsoft Defender for Office 365 and advanced threat protection capabilities. It’s a solid choice for organisations seeking essential protection and management features without extensive customisation or advanced analytics.

P1 balances affordability and functionality, making it an ideal jump-on plan for SMB customers with lower maturity in their overall approach to security, and/or where there is insufficient technical expertise to manage and maintain more complex security configurations.

The P2 plan

This includes all P1 features but adds more sophisticated capabilities, such as advanced risk-based conditional access, automated investigation and remediation, insider risk management, and advanced eDiscovery.

P2 is designed for businesses with higher security and compliance demands, such as those in regulated industries or with a need for detailed forensic insights.

The choice of plan depends on the client’s specific requirements. P2, however, suits customers with a heightened focus on compliance and proactive threat management. For clients managing sensitive data or working in industries like healthcare or finance, P2 provides the depth of protection and analytics required to meet stringent security and regulatory needs.

Related tags:
Cybersecurity Microsoft E5 Microsoft Defender Risk and ResilienceMicrosoft
SHARE

Related

Data Protection for Business Leadership

Sales and Marketing

Data Protection for Business Leadership

Business leaders don't live in the tools. They live in the outcomes. The metrics they care about most are not always limited to compliance and risk. So how do you connect data protection to the big-ticket objectives, when they're less obvious? Our in-house pre-sales expert, Michael Brooke explains.

Learn More
Data Protection Playbook #3
Featured

Guides and eBooks

Data Protection Playbook #3

As SMBs mature in the Data Protection lifecycle, they need help to optimise spend, reduce the compliance burden and ensure results align to business objectives. The third installment of our Data Protection Playbook series provides practical guidance for partners on how to address emerging pressure and connect ongoing investment to measurable business value.

Get Started
Copilot Agents: Level up from chatbots
Featured

Training

Copilot Agents: Level up from chatbots

Copilot Agents: what are they and how do they differ from AI assistants and chatbots? Our in-house Copilot expert Ksenia Turner explains the use cases and service opportunities for partners.

Learn more
Proving Data Protection Compliance
Featured

Blogs

Proving Data Protection Compliance

Fragmented data protection systems and processes create compliance proof-gaps for SMB customers. Scott Hagenus, Director, Cybersecurity here at Crayon explains.

Learn More
Data Protection Sales
Featured

Sales and Marketing

Data Protection Sales

Ever wonder why a pitch has some IT Managers leaning forward, while others glaze over? Michael Brooke, Cybersecurity Pre-Sales Lead offers some insight on how to tune your approach to chime with different technical mindsets.

Read Now
Data Protection Playbook #2
Featured

Guides and eBooks

Data Protection Playbook #2

How can partners help their SMB customers to move from silos of security and continuity to a more cohesive, measurable and insurable data protection framework? The second edition in our Data Protection Playbook series maps out their journey, and yours.

Get Started
Copilot for Business
Featured

Vendor Announcements

Copilot for Business

Copilot for Business has landed at Microsoft Ignite 2025, levelling the GenAI playing field for SMB customers. Learn all about it from our man on the ground, Andreas Bergman.

Read More
Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award
Featured

Press Release

Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award

Read more
Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award
Featured

Press Release

Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award

Read more
Data Protection Partner Playbooks for SMB Customers

Blogs

Data Protection Partner Playbooks for SMB Customers

As cybersecurity and continuity converge in platforms and in practice, partners need new playbooks to address modern Data Protection standards. Our in-house cybersecurity pre-sales lead, Michael Brooke explains why.

Learn More
Data Protection Playbook #1
Featured

Guides and eBooks

Data Protection Playbook #1

What triggers an SMB customer to begin exploring their need for better Data Protection? The first of our four Data Protection Playbooks for partners breaks down how to position and win in the Pre-Adoption and Exploration stage.

Get Started
Data Protection Resource Round-Up
Featured

Insights

Data Protection Resource Round-Up

Data Protection priorities are shifting for SMBs. Ramp up your ability to respond with curated insights, articles and resources to help you guide every customer conversation with confidence.

Get Started
The strong, supportive partnership driving Acceltech’s growth
Featured

Partner Spotlight

The strong, supportive partnership driving Acceltech’s growth

In this Partner Spotlight, Acceltech Managing Director Ivy Tarrobago shares how Crayon’s responsive support enhances client outcomes and business growth.

Read the Story
Strengthening Data Protection for SMBs
Featured

Whitepapers

Strengthening Data Protection for SMBs

Data Protection is a must for all SMBs but how can partners align solution investment with critical business objectives? Our latest paper shows you how.

Get Started
Crayon wins at CRN Channel Awards Asia 2025

Press Release

Crayon wins at CRN Channel Awards Asia 2025

Crayon has been recognised with a huge double win at the CRN Channel Asia awards ceremony.

Read more
M365 Copilot Hub
Featured

Insights

M365 Copilot Hub

All the latest insights, articles and resources on M365 Copilot, curated into one place.

Read More
Secure Backup and Recovery
Featured

Insights

Secure Backup and Recovery

SMB customers are storing greater volumes of sensitive data in more places than ever. Secure backup and recovery practices are essential to how they protect it.

Learn More
Crayon Expertise: Why Bigfish is hooked
Featured

Partner Spotlight

Crayon Expertise: Why Bigfish is hooked

Bigfish Technology saved AU$20,000 on its annual Microsoft licensing after one call with Crayon and has since built a strong partnership that enabled Bigfish to get access to Crayon’s expertise and vendor ecosystem.

Read the Story
Insider Risk: SMB data and the threat within

Insights

Insider Risk: SMB data and the threat within

Insider risk is a subtle and continuous challenge for SMB customers. Turn it into a manageable and quantifiable aspect of their Data Protection strategy.

Learn More.
Data Protection for SMBs
Featured

Blogs

Data Protection for SMBs

From rethinking backup to governance frameworks and behavioural analytics, what's involved in building a complete Data Protection strategy for SMB customers?

Find Out
Microsoft’s Channel Evolution
Featured

Insights

Microsoft’s Channel Evolution

We explore the evolution of Microsoft's channel strategy over the past ten years, and what can be learned by viewing it through a Value Cycle lens.

Learn More
The Microsoft Fabric Partner Guide

Guides and eBooks

The Microsoft Fabric Partner Guide

The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.

Read more
Cybersecurity Resource Round-up

Insights

Cybersecurity Resource Round-up

Support your cybersecurity game plans with our top picks of new and updated risk and resilience resources.

Webinar: How to monetise Security as a Managed Service

Sales and Marketing

Webinar: How to monetise Security as a Managed Service

Pricing models, service definitions and competitive accelerators. Our latest webinar breaks down how to build a successful MSSP business.

Watch Video
The Data Operatives Field Guide
Featured

Guides and eBooks

The Data Operatives Field Guide

Mission essentials for winning data protection business in education, healthcare, retail and manufacturing.

Read more
Cyber Operatives Field Guide

Guides and eBooks

Cyber Operatives Field Guide

Partners, get your Bond on! Our Cyber Operatives Field Guide breaks down five cybersecurity missions to foil would-be cybercriminals.

Read more
The critical value of the Essential Eight security framework

Insights

The critical value of the Essential Eight security framework

The Essential Eight security framework is a pragmatic and clear-cut way for partners to get their customers on the right track when it comes to improved cybersecurity posture.

Read more
Ransomware attack explosion drives legislation review

Blogs

Ransomware attack explosion drives legislation review

An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.

Read more
Cloud Security Assessments are a Growth Opportunity

Blogs

Cloud Security Assessments are a Growth Opportunity

Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.

Read more
Visit the crayon.com enterprise site

Subscribe to Crayon Channel APAC news

Receive the latest updates, industry insights and technology developments from around the world, and across the Asia Pacific region.

Thank you for subscribing!

  • Become a Partner
    • Partner Value Guide
  • Solutions
    • Business Applications
    • Business Continuity
    • Cloud Infrastructure
    • Productivity
    • Security
  • Community
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • PAC
    • Community Events
  • About
    • Careers
    • Contact Us
    • APAC Leadership
    • Visit Crayon Japan
  • Platforms
    • PRISM
    • Cloud-iQ
  • Services
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Access4
  • Acronis
  • Airlock Digital
  • Automox
  • AvePoint
  • Backup365
  • ConnectWise
  • ContraForce
  • CoreView
  • Cytrack
  • Delinea
  • DNSFilter
  • Docusign
  • ESET
  • Hornetsecurity
  • invicti
  • Layer 8 Security
  • Microsoft
  • Nerdio
  • Netwrix
  • NinjaOne
  • Octopus Cloud
  • Probax
  • Runecast
  • Senserva
  • SigniFlow
  • SmartEncrypt
  • SMX
  • Swoosh.Cloud
  • Trend Micro
  • usecure
  • Veeam
  • VIPRE
  • Virtuozzo
  • VMware by Broadcom
  • Wasabi
  • Zimbra
  • ZIRILIO
  • Zoom
  • View All
Crayon Channel APAC Contact us today
  • Privacy
  • Terms & Conditions
  • Human Rights Transparency Statement

© 2025 Crayon LTD

back to top

Strengthening Data Protection for SMBs

Connect Data Protection to strategic objectives via this Whitepaper

Learn More

Front cover and interior page view of Forrester SMB market study reportch report

Future of Operations 2025

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Download the study

Download Our Partner Value Guide

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.

Download Value Guide