Office Exchange SharePoint Lync

Size: px
Start display at page:

Download "Office Exchange SharePoint Lync"

Transcription

1

2 Office Exchange SharePoint Lync

3 Comprehensive tools to do your best work Enterprise-grade cloud services

4

5

6

7

8 Office 365 is A HIGHLY CONFIGURABLE, but not a customizable solution.

9

10 MICROSOFT DATA CENTER INTERNET INTRANET Office 365 Tenant SharePoint Online Outbound SharePoint Server 2013 Search: One-way outbound BCS: Not supported Duet: Not supported Site collection Inbound Primary web application Local Search portal: Local search results ONLY Local/Remote Search portal: Local + Remote search results SharePoint Online CANNOT QUERY SharePoint Server 2013 SharePoint Server 2013 CAN QUERY SharePoint Online

11 MICROSOFT DATA CENTER INTERNET PERIMETER INTRANET NETWORK Office 365 Tenant SharePoint Online Outbound SharePoint Server 2013 Search: One-way inbound BCS: Supported Duet: Supported Site collection Inbound Primary web application Local/Remote Search portal: Local + Remote search results Reverse proxy Local Search portal: Local search results ONLY SharePoint Online CAN QUERY SharePoint Server 2013 SharePoint Server 2013 CANNOT QUERY SharePoint Online

12 MICROSOFT DATA CENTER INTERNET PERIMETER INTRANET NETWORK Office 365 Tenant SharePoint Online Outbound SharePoint Server 2013 Search: Bidirectional BCS: Supported Duet: Supported Site collection Inbound Primary web application Local/Remote Local/Remote Search portal: Local + Remote search results SharePoint Online CAN QUERY SharePoint Server 2013 Reverse proxy Search portal: Local + Remote search results SharePoint Server 2013 CAN QUERY SharePoint Online

13 Cloud Identity Directory Synchronization Federated Identity (SSO) Single identity in the cloud Single identity Single federated identity

14

15 Office 365 Built-in Security Microsoft security best practices 24 Hour Monitored Physical Hardware Office 365 Customer Controls Automated operations Isolated Customer Data Office 365 Independent Verification and Compliance Encrypted Data Secure Network

16 Microsoft Security best practices 24 Hour Monitored Physical Hardware Automated operations Isolated Customer Data Encrypted Data Secure Network

17 24-hour monitored physical hardware Isolated customer data Microsoft security best practices Secure Network Automated operations Encrypted data

18 Isolated customer data Secure Network 24 hour monitored physical hardware Encrypted data Microsoft security best practices Automated operations

19 Secure network Encrypted Data Isolated customer data Automated operations 24 hour monitored physical hardware Microsoft security best practices

20

21 At Microsoft, our strategy is to consistently set a high bar around privacy practices that support global standards for data handling and transfer No Advertising Data Portability No Mingling

22

23 We are the first and only major cloud based productivity to offer the following ISO27001 ISO27001 is one of the best security benchmarks available across the world. Office 365 first major business productivity public cloud service to implement rigorous ISO security controls on physical, logical, process and management EU Model Clauses Office 365 is the first major business productivity public cloud service provider willing to sign EU Model Clauses with all customers. EU Model Clauses a set of stringent European Union wide data protection requirements Data Processing Agreement Address privacy, security and handling of Customer Data. Going above and beyond the EU Model Clauses to address additional requirements from individual EU member states Enables customers to comply with their local regulations.

24 Comply with additional industry leading standards US Health Insurance Portability and Accountability Act HIPAA is a U.S. law that requires HIPAA covered entities to meet certain privacy and security standards with respect to individually identifiable health information Microsoft is offering to sign the Business Associate Agreement (BAA) for any Microsoft Enterprise Agreement customer. The BAA helps enables our customers to comply with HIPAA concerning protected health information. EU Safe Harbor EU generally prohibits personal data from crossing borders into other countries except under circumstances in which the transfer has been legitimated by a recognized mechanism, such as the "Safe Harbor" certification Microsoft was first certified under the Safe Harbor program in 2001, and we recertify compliance with the Safe Harbor Principles every twelve months

25

26 At Microsoft, our strategy is to consistently set a high bar around privacy practices that support global standards for data handling and transfer Where is Data stored? Clear Data Maps and Geographic boundary information provided Ship To address determines Data Center Location Who accesses and What is accessed? Core Customer Data accessed only for troubleshooting and malware prevention purposes Core Customer Data access limited to key personnel on an exception basis. How to get notified? Microsoft notifies you of changes in data center locations.

27

28 I need to know Microsoft is doing the right thing We adopt and align with industry standards to help protect your sensitive data Multiple third-party in-depth audits of Microsoft security, privacy, and continuity controls help ensure compliance Reduce audit costs and get assurance from independent third-party verification

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products? Privacy Transparency What does privacy at Microsoft mean? Are you using my data to build advertising products? Where is my data? Who has access to my data? Compliance What certifications and capabilities

More information

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas Cloud e-mail services: Security, Compliance and Privacy Nasos Kladakis Solutions Specialist Microsoft Hellas Risk Management Program Overview Information Security Policy Security Privacy & Regulatory Service

More information

The Webcast will begin at 1:00pm EST. www.gig-werks.com

The Webcast will begin at 1:00pm EST. www.gig-werks.com SharePoint 2013 & SharePoint Online Security, Compliance & ediscovery The Webcast will begin at 1:00pm EST Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with SharePoint Office

More information

SHAREPOINT HYBRID AND IMPLICATIONS OF 2016

SHAREPOINT HYBRID AND IMPLICATIONS OF 2016 SHAREPOINT HYBRID AND IMPLICATIONS OF 2016 Dan Charlton Senior Consultant MCSE, MCSA, MCP COMPANY OVERVIEW TOTAL SOLUTIONS OVERVIEW SharePoint Consulting & Development Organization Design Development Administration

More information

HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 and Microsoft Dynamics CRM Online

HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 and Microsoft Dynamics CRM Online HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 and Microsoft Dynamics CRM Online HIPAA 1 and the HITECH Act 2 are U.S. laws that govern the security and privacy of personally identifiable

More information

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy

More information

Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries.

Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

DEMYSTIFYING THE SHAREPOINT HYBRID ENVIRONMENT. Dan Charlton Senior Consultant MCSE, MCSA, MCP

DEMYSTIFYING THE SHAREPOINT HYBRID ENVIRONMENT. Dan Charlton Senior Consultant MCSE, MCSA, MCP DEMYSTIFYING THE SHAREPOINT HYBRID ENVIRONMENT Dan Charlton Senior Consultant MCSE, MCSA, MCP COMPANY OVERVIEW TOTAL SOLUTIONS OVERVIEW SharePoint Consulting & Development Organization Design Development

More information

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Microsoft Azure. White Paper Security, Privacy, and Compliance in White Paper Security, Privacy, and Compliance in Security, Privacy, and Compliance in Executive Summary The adoption of cloud services worldwide continues to accelerate, yet many organizations are wary

More information

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Course Description This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part

More information

Course 20346: Managing Office 365 Identities and Services

Course 20346: Managing Office 365 Identities and Services Course 20346: Managing Office 365 Identities and Services Overview About this course This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating,

More information

Managing Office 365 Identities and Services

Managing Office 365 Identities and Services Course 20346B: Managing Office 365 Identities and Services Page 1 of 7 Managing Office 365 Identities and Services Course 20346B: 4 days; Instructor-Led Introduction This is a 4-day Instructor Led Training

More information

Managing Office 365 Identities and Services

Managing Office 365 Identities and Services Course 20346B: Managing Office 365 Identities and Services Course Details Course Outline Module 1: Preparing for Office 365 This module reviews the features of Office 365 and identifies recent improvements

More information

Data safety at UXprobe. White Paper Copyright 2015 UXprobe bvba

Data safety at UXprobe. White Paper Copyright 2015 UXprobe bvba Data safety at UXprobe White Paper Copyright 2015 UXprobe bvba Table of contents Executive summary.... 3 1. Google App Engine... 4 2. Security at Google... 4 2.1. Data Access and identity... 4 2.2. Storage...

More information

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage Dean Bank Primary and Nursery School Secure Storage of Data and Cloud Storage January 2015 All school e-mail is disclosable under Freedom of Information and Data Protection legislation. Be aware that anything

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

WORKDAY CONCEPT: EMPLOYEE SELF SERVICE

WORKDAY CONCEPT: EMPLOYEE SELF SERVICE WORKDAY CONCEPT: EMPLOYEE SELF SERVICE What is Employee Self Service? Employee Self Service (ESS) is the functionality allowing employees to initiate actions such as: Managing personal information Setting-up

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren

More information

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

SECURITY AND REGULATORY COMPLIANCE OVERVIEW Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for

More information

The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company

The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company The Hidden Risks: Managing Risks in Outsourcing Relationships Brian O Connor Chief Security & Privacy Officer Eastman Kodak Company Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager

Managing Enterprise Devices and Apps using System Center Configuration Manager Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains

More information

Hybrid for SharePoint Server 2013. Search Reference Architecture

Hybrid for SharePoint Server 2013. Search Reference Architecture Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including

More information

Look Before You Leap into Google Apps. WORLDWIDE PUBLIC SECTOR SUPPLEMENT microsoft.com/realimpact

Look Before You Leap into Google Apps. WORLDWIDE PUBLIC SECTOR SUPPLEMENT microsoft.com/realimpact Look Before You Leap into Google Apps WORLDWIDE PUBLIC SECTOR SUPPLEMENT microsoft.com/realimpact EXECUTIVE SUMMARY PUBLISHED FEBRUARY 2012 Public Sector organizations have specific requirements that must

More information

I believe. Satya Nadella CEO, Microsoft. History of making big bets

I believe. Satya Nadella CEO, Microsoft. History of making big bets I believe over the next decade computing will become even more ubiquitous and intelligence will become ambient. The coevolution of software and new hardware form factors will intermediate and digitize

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

- Procedures for Administrative Access

- Procedures for Administrative Access HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 from GoDaddy HIPAA 1 and the HITECH 2 Act are U.S. laws that govern the security and privacy of personally identifiable health information

More information

Myths About Moving to the Cloud. What small and medium-sized businesses really need to know about moving to Microsoft Office 365

Myths About Moving to the Cloud. What small and medium-sized businesses really need to know about moving to Microsoft Office 365 Myths About Moving to the Cloud What small and medium-sized businesses really need to know about moving to Microsoft Office 365 Most companies have decided they need the business agility and want the cost

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information.

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information. Course Name Start Date End Date Start Time End Time Active Directory Services with Windows Server 8/31/2015 9/4/2015 9:00 AM 5:00 PM Active Directory Services with Windows Server 9/28/2015 10/2/2015 9:00

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based

More information

Ten myths about moving to Office in the cloud. What you really need to know when considering moving to Microsoft Office 365

Ten myths about moving to Office in the cloud. What you really need to know when considering moving to Microsoft Office 365 Ten myths about moving to Office in the cloud What you really need to know when considering moving to Microsoft Office 365 Most companies have decided they need the business agility and want the cost savings

More information

Office 365 Professional Onboarding Services

Office 365 Professional Onboarding Services Office 365 Professional Onboarding Services Office 365 Standard Email Onboarding Standard onboarding is designed to train one user so they can manage the administrative and end user functionalities of

More information

MICROSOFT 70-346 EXAM QUESTIONS & ANSWERS

MICROSOFT 70-346 EXAM QUESTIONS & ANSWERS MICROSOFT 70-346 EXAM QUESTIONS & ANSWERS Number: 70-346 Passing Score: 800 Time Limit: 120 min File Version: 58.5 http://www.gratisexam.com/ MICROSOFT 70-346 EXAM QUESTIONS & ANSWERS Exam Name:Managing

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Protecting Data and Privacy in the Cloud

Protecting Data and Privacy in the Cloud Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering

More information

DentalTek Privacy Statement

DentalTek Privacy Statement DentalTek Privacy Statement DentalTek (the Company ) is committed to protecting the privacy of individuals who visit the Sites ( Visitors ), individuals who register to use the Services (as defined below)

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Security Whitepaper. NetTec NSI Philosophy. Best Practices Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive

More information

Centricity 360 Case Exchange

Centricity 360 Case Exchange GE Healthcare Centricity 360 Case Exchange Helping distributed teams collaborate on patient cases, through a professional social network Introduction Centricity 360 with Case Exchange helps hospital administrators

More information

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Office 365. Migrating and Managing Your. Business in the Cloud. Matthew Katzer. Don Crawford

Office 365. Migrating and Managing Your. Business in the Cloud. Matthew Katzer. Don Crawford Office 365 Migrating and Managing Your Business in the Cloud Matthew Katzer Don Crawford Contents About the Authors About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter

More information

Client Requirement. Why SharePoint

Client Requirement. Why SharePoint Client Requirement Client wanted a sharepoint system that could meet their document and record management needs. It should also improve client s information management systems. To support existing and

More information

How To Get A Cloud Security System To Work For You

How To Get A Cloud Security System To Work For You Trust in the Cloud Ovidiu Pismac MCSE Security, CISSP, MCSE Private Cloud / Server & Desktop infrastructure, MCTS Forefront Microsoft Romania ovidiup@microsoft.com Technology trends: driving cloud adoption

More information

F, G I, J, K. Line of Business Applications (LOB), 10 Lync, 107 Lync administration conferencing add-on configuration, 419 functions, 371 set up, 419

F, G I, J, K. Line of Business Applications (LOB), 10 Lync, 107 Lync administration conferencing add-on configuration, 419 functions, 371 set up, 419 Index A Active Directory Federation services (ADFS) compliance, 591 592 Exchange Server 2010 implementation account configuration, 601 adding Exchange Management Forest, 593 adding hybrid domain for Federation,

More information

Implementing a Microsoft Windows 2000 Network Infrastructure

Implementing a Microsoft Windows 2000 Network Infrastructure Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration

More information

Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud

Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud Tony Bradley Microsoft MVP, CISSP-ISSAP Principal Analyst, Bradley Strategy Group The connected, mobile

More information

Utilizing LDAP for User Profile and Corporate Structure Integration

Utilizing LDAP for User Profile and Corporate Structure Integration ISI SOLUTIONS WHITE PAPER Utilizing LDAP for User Profile and Corporate Structure Integration By: Mitchell Weiss Director of Product Strategy ISI Telemanagement Solutions, Inc. At A Glance: In cases where

More information

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs

More information

Type of Personal Data We Collect and How We Use It

Type of Personal Data We Collect and How We Use It Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the

More information

Healthcare Organizational Needs

Healthcare Organizational Needs Healthcare Organizational Needs My company wants to improve the quality of our care, maximize our financial position and explore new market opportunities Health IT projects need to facilitate clinical

More information

Windows Phone 8 Security Overview

Windows Phone 8 Security Overview Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.

More information

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance ADVANCED INTERNET TECHNOLOGIES, INC. https://www.ait.com Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance Table of Contents Introduction... 2 Encryption and Protection

More information

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Building Secure Cloud Applications. On the Microsoft Windows Azure platform Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside

More information

Council Communication April 7, 2015, Business Meeting

Council Communication April 7, 2015, Business Meeting Council Communication April 7, 2015, Business Meeting Contract with SHI, Inc. for Microsoft Office 365 FROM Mark Holden, director of information technology and electric department, holdenm@ashland.or.us

More information

Hybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow

Hybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow Hybrid Deployment Hybrid Architecture Provisioned via DirSync Exchange 2010 (HUB/CAS) Exchange 2013 CAS & MBX Secure Mail flow Exchange Federation (Free/Busy, Mail Tips, Archive, etc.) Mailbox data via

More information

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary This Summary was prepared March 2009 by Ian Huggins prior to HSC adoption of the most recent

More information

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Presented by Microsoft and Foley Hoag LLP s Privacy and Data Security Practice Group May 14, 2015 Proposal or event name (optional)

More information

Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia

Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia NonSoloSecurity Blog: http://blogs.technet.com/feliciano_intini Twitter: @felicianointini Trustworthy Computing Cloud:

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Aurora Hosted Services Hosted AD, Identity Management & ADFS 22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to

More information

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design A Sumo Logic White Paper Sumo Logic Security Model Secure by Design Entrusting your data to a third-party service provider requires rigorous security measures. At Sumo Logic, the security and integrity

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT

Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT Overview Cloud computing offers great opportunities for organizations, including schools, hospitals and businesses

More information

Addressing Cloud Computing Security Considerations

Addressing Cloud Computing Security Considerations Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft

More information

Presented by: Matt Tinkler CIO mtinkler@b2btech.com. B2B Technologies SharePoint 2013 Decision Tree

Presented by: Matt Tinkler CIO mtinkler@b2btech.com. B2B Technologies SharePoint 2013 Decision Tree Presented by: Matt Tinkler CIO mtinkler@b2btech.com B2B Technologies SharePoint 2013 Decision Tree AGENDA Introduction Decision Tree O365 SPO OR SharePoint 2013 On- Premises OR Hybrid O365 SPO + On-Premises

More information

Executive s Guide to Cloud Access Security Brokers

Executive s Guide to Cloud Access Security Brokers Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve

More information

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

Office 365 for small businesses

Office 365 for small businesses Office 365 for small businesses Businessclass email Online document storage & file sharing Online meetings Plus - Office Desktop Apps - Office Mobile - Office Online Financiallybacked SLA Technical support

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

F5 and Microsoft Exchange Security Solutions

F5 and Microsoft Exchange Security Solutions F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Secure and control how your business shares files using Hightail

Secure and control how your business shares files using Hightail HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files

More information

Contact Center on Demand

Contact Center on Demand Contact Center on Demand Benefits Contact Center on Demand is a comprehensive, next-generation virtual contact center that allows you to: Manage end-to-end customer support and outreach services Interact

More information

Department of Software Engineering

Department of Software Engineering University of Engineering and Technology, Taxila Department of Software Engineering Software Technologies Incubation Center (STIC) Microsoft Certified System Engineer (MCSE) Workshop (Windows Server 2003)

More information

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06. Securing the Microsoft Cloud Infrastructure Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.2015 1 Certification & Security Reliance Microsoft s cloud environment Application

More information

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals

More information

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information