+110 MILLION +12 MILLION

Size: px
Start display at page:

Download "+110 MILLION +12 MILLION"

Transcription

1 +110 MILLION +12 MILLION FOR WINDOWS 10, MICROSOFT WENT ALL-OUT TO TURN AROUND PERCEPTIONS AMONG CORPORATE CUSTOMERS S H I R A O V I D E W S J THE BOTTOM LINE? MICROSOFT IS GOING TO BEND OVER BACKWARDS TO MAKE THE BUSINESS TRANSITION TO WINDOWS 10 AS EASY AS POSSIBLE. M A R K H A R T M A N P C W O R L D WINDOWS AS A SERVICE MAKES WINDOWS 10 THE MOST ATTRACTIVE DEVELOPMENT PLATFORM EVER. PAUL THURROT T THURROT T. COM Windows 10 on Surface 3 provides the security and management I we need in a highly regulated environment. We made the decision early to use Windows 10 and deploy it immediately. Today, it is the most secure platform from Microsoft and we didn t see a need to wait. - Jim Jensen, VP Information Services

2 Partner Momentum

3 Gartner Advocates for Windows 10 "By 2018, 80% of enterprises will run Windows 10. A year ahead of Windows 7" "Windows 10 is an inevitable migration for organizations running Windows PCs poised to become the most widely installed version of Windows ever To a large extent, Windows 10 is a cloudcentric operating system Windows 10 Investments for business Protection against modern security threats Managed for continuous innovation Be more productive Innovative devices for your business Require Device security Identity protection Data protection Threat resistance

4 Protection against modern security threats Replace passwords Protect corporate identities Only run software you trust Protect sensitive corporate data Biometrics Hardware-based multi-factor Hardware-based credential isolation Eliminate Malware on corporate devices Automatic encryption Persistent protection Data Separation Windows Hello Microsoft Passport Credential Guard Trusted Boot Device Guard Enterprise Data Protection (coming later) Shared secrets shhh! Easily mishandled or lost (Hint: The user is the problem) Microsoft Passport and Windows Hello Easy to deploy two-factor password alternative Breach, theft, and phish resistant credentials Single sign-on experience Convenient enterprise grade security for both enterprises and consumers Supports PIN and biometric sign-in using Windows Hello

5 Hello Chris WINDOWS HELLO Fingerprint Iris Facial FIDO ALLIANCE Example Board level members Credential Guard Pass the Hash (PtH) attacks are the #1 go-to tool for hackers Used in nearly every major breach and APT type of attack Credential Guard uses VBS to isolate Windows authentication services and derived credentials Fundamentally breaks delivered credential theft using MimiKatz, etc

6 Azure Active Directory Use Azure AD to sign-into devices and the Windows store, no Microsoft Account needed Azure AD is a comprehensive identity and access management solution for the cloud Supports the use of Microsoft Passport and Windows Hello to access 1000 s of SaS apps Device Guard Provides next generation app control and kernel mode protection Uses signed policies to help prevent users and malware with elevated privilege from changing IT s app control policies Protects kernel mode processes and drivers from zero days and vulnerabilities using hardware enforced vulnerability mitigations BitLocker data protection Protects data when a device is lost or stolen using full disk encryption Provides single sign on and protection from cold boot attacks Easy to deploy and manageable (via MBAM) at scale Excellent integration, performance, and reliability Submitted for Common Criteria and FIPS certification. Will be supported for HIPPA, PCI DSS, etc scenarios

7 Enterprise data protection Delivers user friendly corporate/personal data separation and containment Ensures only trusted apps can access business data Helps prevent accidental data leakage through copy and paste scenarios Integrates with Microsoft Azure Right Management for secure roaming and sharing Available on mobile and the desktop Managed for continuous innovation End wipe-andreplace deployment Simplify device management Embrace mobile-first, cloud-first Eliminate the heavy lifting and inefficiency Move to a single MDM platform for all Windows 10 devices Enterprise-class cloud, universal app model, and store for business In-place upgrades Dynamic Provisioning App compat WINDOWS AS A SERVICE Mobile Device Management Azure AD Join Universal Apps for Windows Windows Store for Business Be more productive Get the best experience Interact the way you want Always have what you need Intelligent assistants You screen adapts to your device and task Every user is a first class citizen Access your apps and data from any Windows device Get proactive and personalized help from a true assistant Continuum Continuum for Phone Mouse and keyboard Touch, Pen and Ink Voice Universal Windows Apps User state roaming with Azure AD Join Cortana

8 Innovative devices for your business Bring innovation to your current PCs Industry strength solutions Chose devices that are right for you Redefine productivity Windows 10 works great Windows 7 PCs Support your Line of Business scenarios Range of innovative devices across 2-1s, tablets, phones Revolutionary new devices In place upgrade Hardware Compatibility Windows 10 IoT Granular UX control Ruggedized devices Surface Pro 4 Surface Book Lumia 950, 950 XL 3 rd party devices Surface Hub HoloLens Empower your customers with the Microsoft enterprise cloud Seamless user access to apps and data from any Windows 10 device, with Azure AD Join in Windows 10 Reduced deployment complexity with dynamic provisioning delivered via Azure AD Join and automatic MDM enrollment Extended protection for your corporate data with Enterprise Data Protection and Azure Rights Management (coming later) Enterprise Data Protection and Azure Rights Management enablement in Office (coming later); Exchange Advance Threat Protection Windows 10 November update Ready for business The first major upgrade as we deliver Windows as a Service Broad enterprise pilots and evals underway Evaluate, pilot and start Windows 10 deployment today

9 Windows 10 November update Enhancements to Azure AD Join Enhancements to Microsoft Passport Windows Store for Business Windows Update for Business MDM support for BYOD Enhancements to Telemetry Control User Experience Enhancements Seamless, secured, roaming of user settings across Windows 10 deices, via your Azure cloud. Utilize Microsoft Passport for your domain accounts on the corporate network. (AD/AAD Hybrid mode) Iris support (Beta) Centrally acquire, manage and distribute Windows Store apps in your organization. Create your own private store with your corporate LOB apps and curated free apps. Manage deployment to internal groups (rings) in your enterprise for controlled rollout of Current Branch for Business (CBB) updates. Manage updates to align with your business rhythm (maintenance no-update windows). MDM support for Windows 10 Home for most MDM settings. GP/ MDM Controls enabling enterprises to fully turn telemetry off. Enhancements to Cortana, Edge, Continuum, Support for Continuum for Phone on select Phone devices. Windows Update for Business Policy setting example in Windows Update for Business Keeping devices secure and up-to-date Reducing device management costs Quick access to latest security updates Capabilities Time to test and validate feature updates Summer 15 Peer to peer delivery to optimize for bandwidth Summer 15 Ability to create internal deployment groups Fall 15 Integration with your existing tools like System Center Coming later Maintenance windows to align with business rhythm Fall 15 Access to Current branch and Current branch for Business Summer 15 Windows Store for Business Centrally acquire, manage and distribute Windows Store apps in your organization. Create your own private store with your corporate LOB apps and curated free apps. Sign-up with your organizational account at ness-store

10 Enterprise data protection Currently tested with select enterprise TAP customers Will become available via Insider Preview soon Planned release later in 2016 Deployment Approach with Windows as a Service?

11 What to deploy Ongoing engineering development Windows Insider Preview Branch Current Branch Current Branch For Business Long Term Servicing Branch* Feedback and asks Specific feature and performance feedback Application compatibility validation Deploy to appropriate audiences via WUB Test and prepare for broad deployment Stage broad deployment via WU for Business Deploy for mission critical systems via WSUS Lab machines Early adopters Initial pilots IT devices Information workers General population Specialized systems Factory floor, point-of-sale, etc. When to deploy Windows Insider Preview Branch Current Branch Current Branch For Business Specific feature and performance feedback Application compatibility validation Deploy to appropriate audiences via WUB Test and prepare for broad deployment Stage broad deployment via WU for Business Evaluate Pilot Deploy 4-8 months of active development 4 months 8 months 12 month to test and deploy Evaluate upcoming features Pilot Get going with Windows 10 Evaluate Windows 10 November Update Start Windows 10 Pilot in your organization Join Windows Insider Preview for early access to the upcoming capabilities Migrate to Internet Browser 11 Talk to your account team about Accelerate Program Prepare to testing and adopt Windows 10 Mobile on phones

12 Appendix Windows 10 Investments for Business Protect your company against modern security threats Enable continuous innovation with the platform that keeps your company up to date Deliver experience your users will love, make them more productive Innovative devices for your business Replace passwords with more secure options, such as biometrics and hardware- based multi factor credentials (Windows Hello and Microsoft Passport) Protect your corporate identity with hardware-based credential isolation (Credential Guard) Protect your corporate data, no matter where that data is, with the automatic encryption (Enterprise Data Protection coming later) Eliminate malware on your corporate devices by ensuring that only the software you trust can run (Trusted Boot, Device Guard) End wipe and replace deployments of the past with in-place upgrades (app compatibility). Simplify device management by moving to a single mobile device management platform across all Windows 10 devices, from phones to laptops to Internet-of- Things devices; and from personal BYO devices to corporate systems. Power your business with the enterpriseclass strength of the Azure cloud and Universal Windows Apps. (Azure AD Join, Windows Store for Business, Private Catalog) Move to the platform that keeps your company up to date, so that you can adopt latest technologies and continuously innovate. (Windows Update for Business, Windows as a service) Get he best experience no matter what screen you re using by running in desktop or tablet mode, using typing or touch inputs, or use your phone like a desktop so the best screen is always the one your are on. (Start Menu, Continuum, Continuum for Phones) Windows 10 is familiar, and every user is a first class citizen whether using mouse and keyboard, touch, pen & ink or voice Anywhere, anytime access to users apps and data from any Windows device (Universal Windows Apps, user state roaming w/azure AD Join) Proactive and personalized help from Cortana, who can integrate with company s LOB systems. Bring Windows 10 innovation to your existing PC fleet. (hardware compatibly) Bring industry-strength Windows 10 IoT solutions to support your Line of Business scenarios (Granular UX control) Choose devices that are best for your business and your people, from the broad range of innovative Windows devices across 2-in-1s, tablets, laptops and phones. (Surface Pro 4, Surface Book, Lumia 950, 950XL) Redefine productivity with revolutionary new windows devices, such as Surface Hub and HoloLens. Windows 10 November update: MDM support for BYOD

13 Windows 10 has been the easiest Windows upgrade. Our plan was to finish by the end of December, but the ease of upgrade let us complete it in only two months - three months ahead of schedule! Christopher Rhoda Thomas College Vice President for Information Services and CIO Surface Empower your customers with the Microsoft

14 Enterprise Cloud Suite EMS Windows 10 Office 365 Azure Active Directory RMS Intune

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility

More information

v-fspuls@microsoft.com

v-fspuls@microsoft.com v-fspuls@microsoft.com Agenda Get Current Upgrade Plan Segment Current OS Upgrade To RTW RTW + 1 year Consumer Commercial Windows 8/8.1 Windows 7 Home Basic, Home Premium Windows 8/8.1 Pro Windows 7

More information

Frederique Dennison and Scott Gosling Microsoft and Data#3

Frederique Dennison and Scott Gosling Microsoft and Data#3 Frederique Dennison and Scott Gosling Microsoft and Data#3 The Modern Mobile World Everything is mobile 50% Data User will go to tablet or

More information

UPGRADE THE WAY YOU WORK

UPGRADE THE WAY YOU WORK WHITE PAPER UPGRADE THE WAY YOU WORK WHY WINDOWS 10 HELPS INCREASE PRODUCTIVITY AND REDUCE COMPLEXITY WHERE TO GO How Windows 10 Can Help Your Teams Perform Better 2 What to Consider Before Choosing to

More information

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile.

Windows 10 edition. Find out which. is right for you. Core features. Familar, and better than ever Home Pro Enterprise Education Mobile. Core features Familar, and better than ever Home Pro Education Customizable Start Menu Windows Defender & Windows firewall N/A 1 N/A Fast start up with Hiberboot and InstantGo 2 N/A N/A TPM support 3 Battery

More information

Place partner logo and/or Microsoft Partner Program logo here

Place partner logo and/or Microsoft Partner Program logo here Place partner logo and/or Microsoft Partner Program logo here TODAY, WE RE EXPERIENCING A REVOLUTION OF CYBER-THREATS THE REVOLUTION CYBER-CRIME CYBER-ESPIONAGE CYBER-WARFARE CYBER-TERROR THE REVOLUTION

More information

Introducing Microsoft Lumia with Windows 10.

Introducing Microsoft Lumia with Windows 10. Introducing Microsoft Lumia with Windows 10. Your business. Mobile. 104901-054_MSG_Lumia_A5 Overview Brochure_Print_a1.indd 1 20/10/2015 14:42 Contents Your business. Mobile.... 4 Windows 10 for phone....

More information

Registrazione partecipanti e caffè di benvenuto

Registrazione partecipanti e caffè di benvenuto Registrazione partecipanti e caffè di benvenuto Alignment with Business Strategy MB 81% SB 73% AMI-Partners GM 2H 2013 97M devices in 2013 Growing to 147M in 2018 55% SMBs support a mobile workforce AMI-Partners

More information

Lasse Svane Ryby, Windows Commercial PMM lasry@microsoft.com Microsoft Danmark. #windows10 #ninjacat

Lasse Svane Ryby, Windows Commercial PMM lasry@microsoft.com Microsoft Danmark. #windows10 #ninjacat Lasse Svane Ryby, Windows Commercial PMM lasry@microsoft.com Microsoft Danmark #windows10 #ninjacat Skal du hente det? Det opfordrer vi klart til. Det er en stor opgradering for både Windows 7 og 8-brugere

More information

Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum!

Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum! Session Overview Andy Malone (Scotland, UK) Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum! Worldwide Event Speaker Winner:

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

This is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.

This is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. The information contained in this document represents the current view of Microsoft Corp on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions,

More information

Should your business upgrade to Windows 10? A comprehensive guide from the Microsoft experts at Softchoice

Should your business upgrade to Windows 10? A comprehensive guide from the Microsoft experts at Softchoice A comprehensive guide from the Microsoft experts at Softchoice FALL 2015 Introduction Microsoft promises the newest version of their operating system, Windows 10, to be the best yet. But organizations

More information

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

Microsoft Enterprise Mobility and Client Futures

Microsoft Enterprise Mobility and Client Futures Microsoft Enterprise Mobility and Client Futures Steve Newby& Andy Taylor Device & Mobility TSPs Microsoft UK 66% 18% 33% of employees use personal devices for work purposes.* of all software spending

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Course 20688A: Managing and Maintaining Windows 8

Course 20688A: Managing and Maintaining Windows 8 Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

More Than Just Hosted Email

More Than Just Hosted Email More Than Just Hosted Email Presented by David Johnson February 25, 2016 The world works differently today. The change from a world of individual creation to real-time, anytime, anywhere collaboration

More information

#ModernBiz Support a Mobile Workforce so Employees Can Stay Connected Anywhere

#ModernBiz Support a Mobile Workforce so Employees Can Stay Connected Anywhere #ModernBiz Support a Mobile Workforce so Employees Can Stay Connected Anywhere $ # Agenda Part 1: Intro Part 2: Solutions Part 3: Demo Part 4: Next steps Welcome Poll Get Your Work Done Anywhere Office

More information

Microsoft 70-696 Exam

Microsoft 70-696 Exam Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General

More information

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1) Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what

More information

Password Management Evaluation Guide for Businesses

Password Management Evaluation Guide for Businesses Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

IRONKEY CASE STUDIES. Healthcare Solutions

IRONKEY CASE STUDIES. Healthcare Solutions IRONKEY CASE STUDIES Healthcare Solutions HEALTHCARE Business Problem Healthcare providers, insurers and pharmaceutical companies, have a lengthening list of regulations and standards on protecting confidential

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

BYOD Strategy (Service Mobility) 2014

BYOD Strategy (Service Mobility) 2014 Information Resources BYOD Strategy (Service Mobility) 2014 BYOD Strategy Group Joseph Casabona Lee DeAngelis Adam Edwards Diane Kennedy Calvin Krzywiec (Chair) Timothy Meade Glen Pace Jason Wimmer 1 Summary

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015 Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits

More information

Introducing Windows 8

Introducing Windows 8 Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu

More information

Dell Mobile Clinical Computing

Dell Mobile Clinical Computing Dell Mobile Clinical Computing Healthcare Technology Solutions that Deliver Greater Security, IT Productivity and Clinician Efficiency Today s healthcare environment relies heavily on the latest technology

More information

Implementing a Desktop Infrastructure Course 20415B; 5 days, Instructor-led

Implementing a Desktop Infrastructure Course 20415B; 5 days, Instructor-led Implementing a Desktop Infrastructure Course 20415B; 5 days, Instructor-led Course Description This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement

More information

One device, no compromise.

One device, no compromise. One device, no compromise. Healthcare Telesales Conversation Guide 1. Ask probing questions to understand customer priorities: Compatibility What do your current key clinical systems run on? Have you invested

More information

BYOD & Virtualization: Managing Mobile

BYOD & Virtualization: Managing Mobile White Paper 01 Finches Only 02 ViewSonic Only BYOD & Virtualization: Managing Mobile Devices from the Desktop Erik Willey 04.15.2014 SUMMARY: Integrated with Citrix XenMobile, ViewSonic s SD-A245 smart

More information

Enabling the Full Potential of Windows 10

Enabling the Full Potential of Windows 10 Executive Brief Enabling the Full Potential of Windows 10 Sponsored by: Intel Andrew Buss October 2015 Maciej Gornicki IDC OPINION Business demands for greater productivity and innovation continue to be

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Windows 8 Pro: For Small Business. Speaker Name, Title

Windows 8 Pro: For Small Business. Speaker Name, Title Windows 8 Pro: For Small Business Speaker Name, Title The growing needs of small businesses Balance work and life Work smarter Stay connected and mobile Stay in control Improved security Increase competitive

More information

MOC20697-2. Deploying and Managing Windows 10 Using Enterprise Services

MOC20697-2. Deploying and Managing Windows 10 Using Enterprise Services Module 1: Deploying Windows 10 Enterprise Desktops Overview of Windows 10 Enterprise Deployment Customizing Enterprise Desktop Deployments Deploying Windows 10 by Using MDT Maintaining a Windows 10 Installation

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Dell Bring Your Own Device

Dell Bring Your Own Device Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most

More information

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

20688 Managing and Maintaining Windows 8

20688 Managing and Maintaining Windows 8 20688 Managing and Maintaining Windows 8 Audience Profile This course is intended for experienced information technology (IT) professionals that remotely manage and maintain Windows desktops and devices,

More information

How to upgrade your TOSHIBA Windows PC or Tablet to Windows 10

How to upgrade your TOSHIBA Windows PC or Tablet to Windows 10 How to upgrade your TOSHIBA Windows PC or Tablet to Windows 10 Dear Customer, The information in this document explains how to upgrade certain TOSHIBA Windows PC or Tablets pre-installed with Windows 7

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

MS-6294- Planning and Managing Windows 7 Desktop Deployment and Environments

MS-6294- Planning and Managing Windows 7 Desktop Deployment and Environments MS-6294- Planning and Managing Windows 7 Desktop Deployment and Environments Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,

More information

Securing end-user mobile devices in the enterprise

Securing end-user mobile devices in the enterprise IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

USING THE HP UNIVERSAL PRINT DRIVER WITH WINDOWS 8 AND WINDOWS SERVER 2012

USING THE HP UNIVERSAL PRINT DRIVER WITH WINDOWS 8 AND WINDOWS SERVER 2012 USING THE HP UNIVERSAL PRINT DRIVER WITH WINDOWS 8 AND WINDOWS SERVER 2012 CONTENTS Overview... 1 Windows 8 and Windows Server 2012 HP UPD Support... 2 PARK tools... 2 Windows 8 User Interfaces... 2 Windows

More information

Optimizing the Mobile Cloud Era Through Agility and Automation

Optimizing the Mobile Cloud Era Through Agility and Automation Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Deploying and Managing Windows 10 Using Enterprise Services ACC20697-2; 3 Days; Instructor-led

Deploying and Managing Windows 10 Using Enterprise Services ACC20697-2; 3 Days; Instructor-led Deploying and Managing Windows 10 Using Enterprise Services ACC20697-2; 3 Days; Instructor-led Course Description This 5-day course provides administrators with the knowledge and skills needed to deploy

More information

Intelligent Systems for Health Solutions

Intelligent Systems for Health Solutions Bringing People, Systems, and Information Together Today s health organizations are increasingly challenged to accomplish what we call the triple aim of effective healthcare: deliver higher quality care

More information

Identity + Mobile Management + Security = Enterprise Mobility Suite

Identity + Mobile Management + Security = Enterprise Mobility Suite presenta Identity + Mobile Management + Security = Enterprise Mobility Suite Alessandro Appiani Founder & CTO - Pulsar IT alessandro.appiani@pulsarit.net twitter: @AlexAppiani Gabriele Tansini Partner

More information

A Guide to Managing Microsoft BitLocker in the Enterprise

A Guide to Managing Microsoft BitLocker in the Enterprise 20140410 A Guide to Managing Microsoft BitLocker in the Enterprise TABLE OF CONTENTS Introduction 2 Why You Can t Ignore Effective FDE 3 BitLocker by Default 4 BitLocker s Total Cost of Ownership 5 SecureDoc

More information

I believe. Satya Nadella CEO, Microsoft. History of making big bets

I believe. Satya Nadella CEO, Microsoft. History of making big bets I believe over the next decade computing will become even more ubiquitous and intelligence will become ambient. The coevolution of software and new hardware form factors will intermediate and digitize

More information

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure

More information

Managing BitLocker Encryption

Managing BitLocker Encryption Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate

More information

A Guide to Consumerization & Building a BYOD Policy June 2012

A Guide to Consumerization & Building a BYOD Policy June 2012 INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

Enterprise Mobile Management

Enterprise Mobile Management Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud

More information

Planning and Managing Windows 7 Desktop Deployments and Environments

Planning and Managing Windows 7 Desktop Deployments and Environments Planning and Managing Windows 7 Desktop Deployments and Environments Course Details Duration: Course code: 5 Days M6294 Overview: This five-day instructor-led course is intended for desktop administrators

More information

Course Outline: Course 20415-Implementing a Desktop Infrastructure

Course Outline: Course 20415-Implementing a Desktop Infrastructure Course Outline: Course 20415-Implementing a Desktop Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This 5-day instructor-led course provides you

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

Planning and Managing Windows 7 Desktop Deployments and Environments

Planning and Managing Windows 7 Desktop Deployments and Environments Planning and Managing Windows 7 Desktop s and s Introduction This five-day instructor-led course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and

More information

WHITE PAPER. Mobile Document Management. with eakte2go*

WHITE PAPER. Mobile Document Management. with eakte2go* WHITE PAPER Mobile Document Management with eakte2go* Contents The New World of Apps... 3 Electronic files for businesses... 3 Government Agencies as a Modern Employer... 4 The eakte2go App... 5 An Opportunity:

More information

How To Make Your Computer System More Secure And Secure

How To Make Your Computer System More Secure And Secure Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management

More information

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two

More information

Better Mobility for the Enterprise: Windows Phone 8.1 and MobileIron

Better Mobility for the Enterprise: Windows Phone 8.1 and MobileIron Better Mobility for the Enterprise: Windows Phone 8.1 and MobileIron Table of Contents Executive Summary 3 Windows Phone 8.1: The Right Choice for the Enterprise 3 Unparalleled Productivity 3 Uncompromising

More information

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors

More information

Planning and Managing Windows 7 Desktop Deployments and Environments

Planning and Managing Windows 7 Desktop Deployments and Environments Planning and Managing Windows 7 Desktop Deployments and Environments Course Number: 6294A Course Length: 5 Days Course Overview This five-day course is intended for desktop administrators who want to specialize

More information

Microsoft Office 365 from Vodafone. Do business virtually anywhere

Microsoft Office 365 from Vodafone. Do business virtually anywhere Do business virtually anywhere Now there s an easy way to do business virtually anywhere 2 Microsoft Office 365 from Vodafone is helping to empower people to work the way they want, on their terms, from

More information

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

IBM MobileFirst Protect: Secure & Manage your mobile enterprise IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making

More information

Microsoft Partner Network. Cloud Services Dashboard User Guide

Microsoft Partner Network. Cloud Services Dashboard User Guide Microsoft Partner Network Cloud Services Dashboard User Guide Table of Contents 1. Navigation... 4 1.1 MPN Portal... 4 2. Azure Consumption... 4 2.1 Subscriptions... 5 2.2 Consumption... 6 2.3 Customers...

More information

A Definitive Guide to Windows 10 Management: A VMware Whitepaper. November 2015

A Definitive Guide to Windows 10 Management: A VMware Whitepaper. November 2015 A Definitive Guide to Windows 10 Management: A VMware Whitepaper November 2015 Table of Contents Executive Summary...3 Challenges with Windows Management...5 How Windows 10 Differs...7 Windows 10 Management

More information

The Top 7 Ways to Protect Your Data in the New World of

The Top 7 Ways to Protect Your Data in the New World of The Top 7 Ways to Protect Your Data in the New World of Shadow IT and Shadow Data Brought to you by Elastica and Centrify Introduction According to research conducted by Elastica, most companies use over

More information

MS 20688 Managing and Maintaining Windows 8

MS 20688 Managing and Maintaining Windows 8 P a g e 1 of 9 MS 20688 Managing and Maintaining Windows 8 About this Course In this course, students learn how to plan and implement the installation, management, and maintenance of Windows 8. Course

More information

NE-6294A Planning and Managing Windows 7 Desktop Deployments and Environments

NE-6294A Planning and Managing Windows 7 Desktop Deployments and Environments NE-6294A Planning and Managing Windows 7 Desktop s and s Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 04 January 2010 300 Windows 7 Delivery Method Instructor-led

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn

Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn Presenter: J Abernethy Practice Manager of Legal Applications mindshift, a Ricoh Company Presenter: Josh Quinn Manager, Desktop & Application

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

Get Tough with Mobile Device Management

Get Tough with Mobile Device Management Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic SOTI is the Worlds Most Trusted

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Six myths of Windows RT revealed!

Six myths of Windows RT revealed! Six myths of Windows RT revealed! There has been a lot of (mis)information being circulated about capabilities of Windows RT, the new Microsoft operating system for ARM tablets. This discussion should

More information

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise

More information