How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Size: px
Start display at page:

Download "How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT"

Transcription

1 How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

2 2

3 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November

4 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November

5 Processes People Technology Strategy 5

6 Similarities Security and Cost Reduction are our top priorities Too much work, too little time, mostly reactive A mix of Microsoft operating systems and configurations Not all users are cooperative Balancing security, cost, and efficiency is the bottom line Differences Being Microsoft s first and best customer Software deployed more than once Majority of users are technical, local administrators High target for security attacks

7 1,2m PCs and devices SVC Redmond Collaboration 210k mailboxes 3m internal per day 25m+ s from the Internet per day 92% rejected as spam 99.99% availability 746k Sharepoint sites Dublin Users/Sites 106 countries 700+ buildings 7,500 production servers 190K end users Office dweller (40%) Campus Nomad (40%) Remote users (20%) 2.3 Tb DB Single Instance SAP ERP on SQL 2008 R2 Singapore Remote connectivity 2,5m remote con p.m. 78m IMs p.m. 88m RPC/HTTP p.m. 100m Active Sync p.m. High scale Worlds largest corporate website 1.2B hit per day 755k concurrent usr.

8 Processes People Technology STRATEGY 8

9 Global Business Model Customer Requirements Supplier Requirements Security of Information Assets Privacy Protection Industry Mandates Mobile Devices Collaboration Tools Dogfooding

10 Savings FY13: 15% apps in the Cloud FY15: 80% apps in the Cloud FY11: Less than 5% apps in the Cloud Portfolio Mix in FY15 20% Apps retired or last to move 50% Apps moved to Cloud in VM role 20% Apps rearchitected for Cloud 10% New apps written directly to Cloud 10

11 Savings FY15: Effectiveness Fully cross-premise services management FY13: Efficiency Integrated provisioning, feature parity, integrated monitoring and support escalation FY11: Experience Manual provisioning, monitoring, support, and escalation FY11 Services Exchange Online: 3K SharePoint Online: LBI Only FY13 Services Exchange Online: 50% of Users SharePoint Online: Sample of sites and portals Lync Online: Dogfood deployment FY15 Services Exchange Online: Majority of Users SharePoint Online: Majority of sites Lync Online: Majority of users

12 Risk Management Intellectual Property Protection Targeted Malware Attacks Increased Data Leakage and Portability Zero Day Attacks Diverse Compliance Challenges Insider Tracks Foreign National Threats Risk Management vs. Risk Elimination Critical Infrastructure Protection Integration with ERM Initiatives Business Enablement Support for Rapidly Changing Business Focus on New Revenue Streams Mergers, Sourcing and Workforce Changes Increased Value Change Integration Need for Improved Business Intelligence E-Discovery and Investigations Technical Architecture Cloud Computing/SaaS Data Loss Prevention SIEM Platforms and Programs IAM Governance and Process (Role Optimization) Increased Encryption (Data Level and Portables) Application and Code Review Endpoint Security Operational Excellence Better Integration with Board/ERM Doing More with Less Vendor and 3 rd Party Management Security Organization Model and Structure Asset and Configuration Management Executive Reporting and Metrics Managed Security Services Awareness and Training

13 User Empowerment Mobility Proliferation Personal devices User-centric Social networking Partnering IT Controls Cost Reliability Security Efficiency Governance Risk & Compliance

14 Security of Digital Assets Anywhere & any device Access Time

15 P r a c t i t i o n e r Partners Scale thru Partners Policy Driving Policy and Compliance Product MS Security and Management Products Platform Securing the MS Platform

16

17 Processes PEOPLE Technology Strategy 17

18 Site Classification Information Security Risk Branding Upon classification, one of three graphics are affixed to the site.

19 PROCESSES People Technology Strategy 19

20 Impact considers potential financial loss, recovery time, operational scope, reputational impact, legal/regulatory impact

21 The cost of removing an application security vulnerability during the design phase ranges from times less than if removed during production. NIST, IBM, and Gartner Group 100X Customers In the Field 15X System/Acceptance Testing 1 X 6.5X Static Analysis Integration Testing Design Development Testing Deployment Source IDC and IBM Systems Sciences Institute

22 Process that is integrated into software development lifecycles (SDLC) Goals: Assess risk (security/privacy) at every stage within the SDLC Reduce cost of developing secure applications SDLC Envision Design Develop Test Release SDL-LOB App Entry / Risk Assessment Threat Modeling Internal Review Pre-Prod Assessment Post-Prod Assessment Catalog & Classify Identify Controls Implement Controls Verify Controls Monitor Controls

23 Cost Center More Efficient Cost Center Business Enabler Strategic Asset IT staff taxed by operational challenges Users come up with their own IT solutions IT Staff trained in best practices i.e., MOF, ITIL Users expect basic services from IT IT managed environment Users have the right tools, availability, & access to info IT is viewed as a strategic asset IT is a valued partner & enables new business initiatives IT processes undefined Complexity due to localized processes & decentralization Central Admin & configuration of security Standard desktop images defined, not adopted by all SLAs are linked to business objectives Clearly defined and enforced images, security & best practices Self-assessing & continuous improvement Easy, secure access to info from anywhere Patch status of desktops is unknown No unified directory for access mgmt Multiple directories for authentication Limited automated s/w distribution Automated identity/ access management Automated system management Self provisioning & quarantine capable systems ensure compliance & high availability

24 Processes People TECHNOLOGY Strategy 24

25 BASIC STANDARDIZED RATIONALIZED DYNAMIC Two Factor Authentication Secure Remote User Enforce Strong Passwords Secure Wireless Access Network Intrusion Detection Basic to Standardized S Network Segmentation 2FA: Elevated Access Accts Security Event Monitoring LPA Controls Standardized to Rationalized R Network Access Protection Strong User Authent. User Account Control Bitlocker Drive Encryption Rights Management Rationalized to Dynamic D Sticky note

26 Gained Executive Level Support Changed Security and Procurement Polices Include BitLocker Config in Image Store Recovery Keys in AD Tools Deployed BitLocker Automated System Enforcement (BASE) BDEVault: Bitlocker Self-Service Recovery Tool BitLocker Check Automated Notifications Windows 7 BitLocker FAQs

27 Persistent Protection Encryption + Policy: Access Permissions Use Right Permissions

28 28

29 29

30

31 Domain Joined Active Directory policies requiring certificates EAS Pin Policy Remote Wipe secure wireless w/ certificates BitLocker Drive Encryption Direct Access for Remote Access Non-Domain Joined Client Auth Certificate

32 Secure the Network Perimeter Secure the Network Interior Secure Key Assets Monitor and Audit Secure Wireless Direct Access Smart Cards for VPN Network Access Protection Intrusion Detection Anti-Malware Protection Patch Management IPSec - Network Segmentation Smart Cards for Admin Access SecureNet via IPSec Data Classification Rights Management Services BitLocker Drive Encryption Awareness Enforcement BG Scorecard Penalties

33

34 You manage You manage You manage Private (On-Premises) Infrastructure as a Service Platform as a Service Software as a Service Applications Runtimes Security & Integration No Databases provider may Databases fit all requirements Databases Servers Servers Servers However we have a choice now! Virtualization Virtualization BCDR built into most clouds Server HW Storage Networking Applications Runtimes Security & Integration Server HW Storage Networking Managed by vendor Applications Applications We need still to be in control & need to manage risk Runtimes Not all qualifies (yet) to be in the cloud Security & Integration Virtualization Server HW Storage Networking Managed by vendor Runtimes Security & Integration Databases Servers Virtualization Server HW Cloud provider building in depth security expertise Private vs. Public Cloud again is a difference Storage Networking Managed by vendor Control + Cost Efficiency + Savings

35 35

36

37 Additional content on Microsoft IT deployments and best practices can be found on Microsoft Case Study Resources Microsoft Security Intelligence Report

38 How Microsoft Optimizes and Secures its IT Environment 38

39

40 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

Michael Nowacki, CISSP - ISSAP. Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com

Michael Nowacki, CISSP - ISSAP. Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com Michael Nowacki, CISSP - ISSAP Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com More advanced Application-oriented More frequent Profit motivated Too many point

More information

Optimizing the Mobile Cloud Era Through Agility and Automation

Optimizing the Mobile Cloud Era Through Agility and Automation Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Network Security. Intertech Associates, Inc.

Network Security. Intertech Associates, Inc. Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture

More information

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility

More information

Security Best Practices for Microsoft Azure Applications

Security Best Practices for Microsoft Azure Applications Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure

More information

Microsoft Enterprise Mobility and Client Futures

Microsoft Enterprise Mobility and Client Futures Microsoft Enterprise Mobility and Client Futures Steve Newby& Andy Taylor Device & Mobility TSPs Microsoft UK 66% 18% 33% of employees use personal devices for work purposes.* of all software spending

More information

CenterBeam Managed Services Overview

CenterBeam Managed Services Overview CenterBeam Managed Services Overview Q3 2011 Accelerating IT to the Speed of Business CenterBeam s DNA Founded as a Cloud Services Provider in 1999 HQ, San Jose, CA NOC and Engineering, San Diego, CA NOC

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC Virtualization as a key enabler for Cloud OS vision Vasily Malanin Datacenter Product Management Lead Microsoft APAC Can I enable employees to work from anywhere? How can I evolve my business apps to

More information

Making ISO 20000 stick. Guido Hartmann Senior ITSM Consultant Microsoft Premier Support

Making ISO 20000 stick. Guido Hartmann Senior ITSM Consultant Microsoft Premier Support Making ISO 20000 stick Guido Hartmann Senior ITSM Consultant Microsoft Premier Support Microsoft is known for tools and technology. Should customers consider Microsoft for IT Service Management support

More information

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev WINDOWS SERVER SMALL BUSINESS SOLUTIONS Name: Marko Drev SMB Windows Server Family SOLUTION SERVERS TRADITIONAL SERVERS Complete server platform, integrated and optimized Customizable Server platform for

More information

Microsoft Future of Productivity Unified Communications. Marius Stoica Microsoft Corporation Solution Specialist, Productivity

Microsoft Future of Productivity Unified Communications. Marius Stoica Microsoft Corporation Solution Specialist, Productivity Microsoft Future of Productivity Unified Communications Marius Stoica Microsoft Corporation Solution Specialist, Productivity The Future of Productivity Best Productivity Experience Across PC, Phone, and

More information

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

MS 20688 Managing and Maintaining Windows 8

MS 20688 Managing and Maintaining Windows 8 P a g e 1 of 9 MS 20688 Managing and Maintaining Windows 8 About this Course In this course, students learn how to plan and implement the installation, management, and maintenance of Windows 8. Course

More information

Vision and Roadmap: IT Client Manager. David Howells and Laural Gentry

Vision and Roadmap: IT Client Manager. David Howells and Laural Gentry Vision and Roadmap: IT Client Manager David Howells and Laural Gentry Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject

More information

MS 20247C Configuring and Deploying a Private Cloud

MS 20247C Configuring and Deploying a Private Cloud MS 20247C Configuring and Deploying a Private Cloud Description: Days: 5 Prerequisites: This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Jonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation

Jonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up Agenda 3 Intro

More information

MS 10751A - Configuring and Deploying a Private Cloud with System Center 2012

MS 10751A - Configuring and Deploying a Private Cloud with System Center 2012 MS 10751A - Configuring and Deploying a Private Cloud with System Center 2012 Description: Days: 5 Prerequisites: This course describes private cloud configuration and deployment with Microsoft System

More information

Client Operating System and Applications Scope

Client Operating System and Applications Scope Client Operating System and Applications Scope Workshop Purpose and Objectives Workshop Purpose Review client experience options for the user base Review requirements to enable the rich experience and

More information

All your apps & data in the cloud, all in one place.

All your apps & data in the cloud, all in one place. The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access

More information

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information.

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information. Course Name Start Date End Date Start Time End Time Active Directory Services with Windows Server 8/31/2015 9/4/2015 9:00 AM 5:00 PM Active Directory Services with Windows Server 9/28/2015 10/2/2015 9:00

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Identity and Access Management

Identity and Access Management Identity and Access Management Business Ready Security Solutions Karl Bjarne Westbye Security & Management, Microsoft 24. Mars 2010 Business Needs and IT Challenges Provide secure access to applications

More information

Cloud OS Microsoft s vision of the unified platform for modern business. Mike Shelton October 2, 2014

Cloud OS Microsoft s vision of the unified platform for modern business. Mike Shelton October 2, 2014 Cloud OS Microsoft s vision of the unified platform for modern business Mike Shelton October 2, 2014 Trends driving IT pressures & opportunities Devices Apps Big data Cloud Enable employees to work from

More information

Getting Down to Business with Mobile

Getting Down to Business with Mobile Getting Down to Business with Mobile How do you take your business to new heights? Create new tools that inform & delight customers and employees. 3+ Devices Anywhere Dispersed Anytime Data The world has

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

6 Things To Think About Before Implementing BYOD

6 Things To Think About Before Implementing BYOD 6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

System Center 2012 Configuration Manager Overview. Ryan Chan Partner Technology Manager

System Center 2012 Configuration Manager Overview. Ryan Chan Partner Technology Manager 2012 System Center 2012 Configuration Manager Overview Ryan Chan Partner Technology Manager Evolution of Microsoft Client Management 2012 Client Management Infancy (NT Domain) Groups Model Laptops, Servers,

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus IBM MOBILE SECURITY SOLUTIONS - Identity and Access Focus May 2012 Executive Overview Mobile devices are pervasive in our daily lives and increasingly coming to work Bring Your Own Device (BYOD) IBM is

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a

More information

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise

More information

This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties,

This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties, This information is presented under the terms and conditions of non-disclosure agreement with Microsoft Corporation. Microsoft makes no warranties, express, implied or statutory, as to the information

More information

Datacenter Management Optimization with Microsoft System Center

Datacenter Management Optimization with Microsoft System Center Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

October 2014. Four Best Practices for Passing Privileged Account Audits

October 2014. Four Best Practices for Passing Privileged Account Audits Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least

More information

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Sam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860

Sam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Sam Cavaliere Unified Communications Solutions Sales Professional Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Agenda Define UC Foundation for Communications Demo Wrap up Q&A Confusing,

More information

ICT Professional Optional Programmes

ICT Professional Optional Programmes ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications

More information

Implementing Desktop Application Environments Course 20416B; 5 days, Instructor-led

Implementing Desktop Application Environments Course 20416B; 5 days, Instructor-led Implementing Desktop Application Environments Course 20416B; 5 days, Instructor-led Course Description In this five-day course, build the skills you need to design, deploy, and manage a physical and virtual

More information

Tivoli Automation for Proactive Integrated Service Management

Tivoli Automation for Proactive Integrated Service Management Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,

More information

City of Pittsburgh SaaS Email and Data File Collaboration System Vendor Questions and Answers 3/10/2015

City of Pittsburgh SaaS Email and Data File Collaboration System Vendor Questions and Answers 3/10/2015 1. Is Vendor the allowed to take exceptions to terms and conditions in the RFP? If yes, would you like to see alternate positions? a. Answer: The City would like to see all options that meet the City s

More information

Hosting Models. Business Model Software (as a Service) Platform (as a Service) Infrastructure (as a Service) On Premises. Applications. Data.

Hosting Models. Business Model Software (as a Service) Platform (as a Service) Infrastructure (as a Service) On Premises. Applications. Data. You manage You manage You manage On Premises Hosting Models Infrastructure (as a Service) Platform (as a Service) Business Model Software (as a Service) Customizations Applications Data Runtime Middleware

More information

1. Digital Literacy - Computer Security and Privacy 2. Partners in Learning: Organize and Manage the Use of ICT in Your Classroom 3.

1. Digital Literacy - Computer Security and Privacy 2. Partners in Learning: Organize and Manage the Use of ICT in Your Classroom 3. 1. Digital Literacy - Computer Security and Privacy 2. Partners in Learning: Organize and Manage the Use of ICT in Your Classroom 3. Course 10391: Intermediate Skills in Microsoft Word 2010 4. Partners

More information

Unified Device Management with Windows Intune. Andras Khan Microsoft Western Europe HQ

Unified Device Management with Windows Intune. Andras Khan Microsoft Western Europe HQ Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management

More information

LICENSTJEK OUTSOURCING

LICENSTJEK OUTSOURCING LICENSTJEK CLOUD OUTSOURCING DEPLOYMENT 1 Agenda Speaker Cloud Cloud Services DEMO Considerations Hosting EG Hosting Services DEMO Considerations Questions 2 Speaker Peter Schmidt Infrastructure Architect

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL procurement@portoftacoma.com PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Protect Your Enterprise by Securing All Entry and Exit Points

Protect Your Enterprise by Securing All Entry and Exit Points SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Course 20416B: Implementing Desktop Application Environments

Course 20416B: Implementing Desktop Application Environments Course 20416B: Implementing Desktop Application Environments Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course Specifications

More information

Windows Server 2003 End of Support Options

Windows Server 2003 End of Support Options Windows Server 2003 End of Support Options February 26, 2015 Copyright 2015 CompuCom Systems, Inc. All rights reserved. This document is copyright protected with all rights reserved and may not be reproduced

More information

The Seven Deadly ^Sins

The Seven Deadly ^Sins The Seven Deadly ^Sins Brian Killian President NorthPoint Technology Group 225 South Westmonte Drive, Suite 1170 Altamonte Springs, Florida 32714 bkillian@teamnorthpoint.com Agenda Discuss recurring problems

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Barnaby Jeans Sr. Solution Architect Business Critical Applications

Barnaby Jeans Sr. Solution Architect Business Critical Applications Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration

More information

Session ID: Session Classification:

Session ID: Session Classification: Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate

More information

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

I believe. Satya Nadella CEO, Microsoft. History of making big bets

I believe. Satya Nadella CEO, Microsoft. History of making big bets I believe over the next decade computing will become even more ubiquitous and intelligence will become ambient. The coevolution of software and new hardware form factors will intermediate and digitize

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Course 20416B: Implementing Desktop Application Environments NEW!

Course 20416B: Implementing Desktop Application Environments NEW! Course 20416B: Implementing Desktop Application Environments NEW! Five Days, Instructor-Led About this course In this five-day course, build the skills you need to design, deploy, and manage a physical

More information

Exchange 2010 Advanced Security with Forefront. Aleš Chudý IW BG Lead Microsoft Slovakia

Exchange 2010 Advanced Security with Forefront. Aleš Chudý IW BG Lead Microsoft Slovakia Exchange 2010 Advanced Security with Forefront Aleš Chudý IW BG Lead Microsoft Slovakia E-mail Security A Growing Concern Spam problems continue Spammers constantly evolving new techniques Systems often

More information

The Time has come for A Single View of IT. Sridhar Iyengar March 2011

The Time has come for A Single View of IT. Sridhar Iyengar March 2011 The Time has come for A Single View of IT Sridhar Iyengar March 2011 ManageEngine Portfolio Network Servers & Applications Desktop ServiceDesk Windows Infrastructure Event Log & Compliance Security Network

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Configuring and Deploying a Private Cloud. Day(s): 5. Overview

Configuring and Deploying a Private Cloud. Day(s): 5. Overview Configuring and Deploying a Private Cloud Day(s): 5 Course Code: M20247 Overview This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End Users & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Identity at Center of Cyber Attacks PRIVILEGED USERS END USERS Copyright 2015 Centrify

More information

Hybrid Cloud Identity and Access Management Challenges

Hybrid Cloud Identity and Access Management Challenges Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley timothy.mcaliley@microsoft.com Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

A tailored Asset Management solution to best suit your needs

A tailored Asset Management solution to best suit your needs ASSET MANAGEMENT A tailored Asset Management Data # 3 s Asset Management solution enables customers to manage, plan and optimise their investments in ICT hardware and software licenses. Customers can understand

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe QualysGuard ICT Security Management Integrated Suite of ICT Security

More information

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 OVERVIEW About this Course This course describes private cloud configuration and deployment with Microsoft System Center

More information