Free Forefront Protection? An investigation into hidden costs.

Size: px
Start display at page:

Download "Free Forefront Protection? An investigation into hidden costs."

Transcription

1 Free Forefront Protection? An investigation into hidden costs. Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1

2 Free Forefront Protection? An investigation into hidden costs. Key Findings This white paper investigates Microsoft s recent updates to ecal pricing and changes to Forefront Security Suite in its Enterprise Client Access License (ECAL). Four primary arguments are presented to demonstrate that the total cost of ownership of Microsoft Forefront Security Suite is higher than using best of breed products from a third party vendor. 1. That there are additional investments in supporting Microsoft services that are not included in ECAL 2. That deployment, management and maintenance of ForeFront requires additional investment in Microsoft infrastructure 3. Microsoft s lack of protection for non-microsoft products means continued investment in security for Unix platforms and does not address the consumerization of IT. 4. Signature updates for Forefront requires Microsoft Software Assurance. Introduction Since it s acquisition of Whale and Antigen, Microsoft has been slowly enhancing the ForeFront Security Suite for endpoint protection and gateway filtering. It s most dramatic enhancement in 2011 was to incorporate endpoint protection management into the SCCMS console. Further enhancements to the management console are expected in the December, 2011 release. Microsoft s message to current customers with Enterprise Client Access Licenses (ecal) is that ForeFront Endpoint Protection is FREE. Is it truly free or are there hidden costs? This white paper evaluates that free claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions. Direct costs include the additional licenses for server products, very high costs for support, and the hidden cost of Software Assurance licenses. We also look at the holes in Microsoft s protection strategy represented by the proliferation of devices (consumerization of IT), multiple OS platforms in most data centers, and the lack of cloud leverage for just-in-time protection. Microsoft has successfully leveraged its near monopoly in the enterprise desktop operating system and productivity tools to make deeper gains in the data center through its server offerings including: Windows Server, Forefront Threat Management Gateway 2010 Server, MSQL, Exchange, Certificate Server, and SharePoint Server. One aspect of computing infrastructures that can be decoupled from network, desktop and server platforms is security. Ironically, the argument has been well made that the very security 2011 IT-Harvest 2

3 problems plaguing most organizations - rapid spread of malware, targeted attacks, and driveby downloads from malicious web sites, is attributable to Microsoft s domination of so many computers worldwide. This mono-culture of computing platforms means that malware created to infect home users with Trojans meant to steal their banking credentials also infects enterprise desktops, servers, and infrastructure. In other words, in their quest to dominate as much of corporate computing budgets as possible, Microsoft has created a world wide security problem that entails investment, lost time, management, compliance and reporting requirements to control. Microsoft s Forefront product suite was acquired in an attempt to address these security issues and protect their dominant position in the enterprise. Enterprise Client Access Licensing Microsoft s Client Access License (CAL) is a blanket end user license agreement that is purchased on a per-server/per-end user basis. It is separate from desktop licensing for Windows, Office or other applications. The Core CAL agreement grants access to Windows Server 2008, Exchange Server 2010, Office SharePoint Server 2010 and Systems Center Configuration (formerly Systems Management Server). Access to additional services is available piecemeal, for either an ala carte pricing or bundled in the Enterprise CAL license (ECAL). These additional services are: Server CAL Core CAL Suite Enterprise CAL Suite Windows Server Exchange Server SharePoint Server Lync Server System Center Forefront Windows Server Standard Active Directory Rights Management Services Exchange server Standard Exchange Server Enterprise SharePoint Server Standard SharePoint Server Enterprise Lync Server Standard Lync Server Enterprise System Center Configuration Manager System Center Client Management Suite Forefront Protection Suite Forefront Endpoint Protection Forefront Unified Access Gateway 2011 IT-Harvest 3

4 These Enterprise additions to the Core CAL if purchased separately can cost $256.00/year (System Center Operations Manager Client OML is $32 per license for instance) but if purchased as an ECAL bundle cost $86 on top of the Core CAL pricing. Many Microsoft customers purchase the ECAL bundle to get the additional functionality of one or two services but do not use the full suite. Note that ECAL does not include MSQL or Terminal Services CAL, and that this would be an additional purchase if the customer is not currently licensed for these at a cost ranging from $ $187 per user license. This gives rise to the question: Should an enterprise that has the full ECAL licensing drop their use of a third party anti-virus product because the ECAL suite incorporates Forefront security? Enterprises considering this question should be aware that there are three reasons that using the marginally free Forefront security products entails additional costs. Sometimes free is not free. 1) Direct costs in additional Microsoft licensing requirements and support fees. The list pricing for Forefront Security Suite starts at $12.72 per user or device, per year, for the security agent Microsoft Forefront Endpoint Protection uses Microsoft System Center Configuration Manager (SCCM) which could require additional server acquisitions for most large enterprises. The management console is supposed to support up to 10,000 clients. A large installment would involve multiple licenses for the management consoles along with the costs associated with maintaining the additional Microsoft servers. Forefront Endpoint Protection uses Microsoft SQL Server 2005 (Standard Edition or Enterprise Edition) for detailed report and log generation. SQL Server 2005 Enterprise Edition is needed to support more than 2,000 clients and can be purchased with the Server Subscription License (SSL) for Forefront Security. Microsoft customers interviewed for our research reported that getting premium support for the Forefront security solutions to resolve issues on a timely basis required them to upgrade their support contract for all of the products bundled in ECAL, it could not be broken out separately. This could be extremely expensive as Microsoft s top level of support, Premier Mission Critical, can cost between $200K and $1 million based on the complexity of the deployment. Other levels of support; and Premier Plus, are available in hourly blocks whereas Premier Ultimate is a 24X7 service. A decision to switch to Forefront client and server security based on Microsoft claims that it is free should not be made until the support service costs have been accounted for as well as the server license costs for a large deployment. An anti-malware solution from a non- Microsoft source will have dedicated support options at lower total costs IT-Harvest 4

5 2) Hidden costs in expanding the Microsoft monoculture. Every business has to evaluate risks associated with vendor lock-in. Not only are there risks that the vendor could discontinue support for a particular offering but it also creates a cycle of increased lock-in as the vendor continues to offer more and more products inducing the customer to move to those new products, consolidate support contracts and billing, and ultimately lose the flexibility to choose optimal products or negotiate the best prices. In the particular case of buying security products from Microsoft some consideration is due the concept of diversification. Every Microsoft server product is a member of a community of end points that suffer from continuous cycles of attacks. Microsoft issues software fixes on a monthly schedule with emergency updates announced frequently outside that schedule. Not only do the desktops, web servers, file servers, communication servers, and data base servers have to be patched but the systems hosting the security products themselves have to be patched. This lends additional cost to the overall system maintenance task as well as introduces security issues because the security products are exposed to the same types of attacks that they are deployed to protect against. One IT security manager that we interviewed pointed out that Microsoft Forefront Security Suite had too many moving parts that required more resources to manage. Different skill sets and different people were involved in managing Forefront. Staff from security would handle the AV issues, a database specialist managed SQL Server, and another specialist was required for the server admin. Yet another group s services were required to administer WSUS on the Forefront Security Management server. Responsibility for managing a standalone security product resides with the AV team alone and is therefore less expensive. Note that Microsoft Forefront Client Security Management Console (FCSMC) is no longer needed as its function has been incorporated into SCCMS. However, Forefront Server Security Management Console (FSSMC) is still required to manage Forefront for Exchange, Forefront for SharePoint, and Microsoft Antigen, which entails more Windows servers with MSQL, and MOM instances. FSSMC is not included in ECAL. 3) Costs associated with not having a best of breed security solution. Microsoft has yet to demonstrate that Forefront Security is a best of breed product. While there may be a cost tradeoff between the best products and good enough, products in many areas, such as Certificate Servers, proxies, data base servers, and servers, that argument does not hold with security products where much of the value of those products resides in their ability to provide the best protection possible. For instance an anti-malware product that blocks 1% more malware than another provides more than 1% greater value. The additional costs of cleanup measured in lost productivity and direct IT support resources could be thousands of dollars a month for the typical midsize enterprise. A data breach 2011 IT-Harvest 5

6 resulting from a Trojan or Bot infection would lead to extraordinary costs from mandated disclosure and reparation requirements, damage to brand equity, and similar costs. According to the 5th Annual US Cost of a Data Breach Study from the Ponemon Institute the average cost of a data breach is over $6 million. The current best practices for malware defense is to leverage the cloud to reduce the time to detection from fi rst appearance of a new attack to when updated signatures are fully deployed. Trend Micro has consistently been the best performing malware solution by this measure. Microsoft ForeFront still relies on the old model of pushing new signatures to every endpoint and gateway. 4) ForeFront security is not a heterogeneous solution Many enterprises have multiple operating systems in their data centers, points of sale, or offi ces including fl avors of Unix from IBM and Sun(Oracle). If malware protection products are deployed to non-microsoft systems, such as Linux servers, or MacBooks, an enterprise has not eliminated the costs associated with maintaining licensing for those systems by going with the Free Forefront offer. Switching to Microsoft Forefront may not reduce the number of vendors or products an enterprise must manage. Microsoft world w/forefront protection BYOD IOS, OSX, Android, Blackberry Unix/Linux Servers Virtual data center and VDI One of the predominant trends in IT computing is the move to mobile devices. Executives and knowledge workers are introducing new devices to the enterprise at an uncontrolled rate. ipads, smart phones from Blackberry, Google, and Apple, predominate and will need additional management and security products to accommodate this consumerization of IT or Bring Your Own Device (BYOD) as it is being called. Much of the value derived from an enterprise class anti-malware product suite comes from its ability to analyze security incidents and create reports. In particular, generating data for compliance reports for government regulations and auditor requirements is not as mature in Microsoft Forefront as it is in established enterprise AV product suites that have been investing heavily in better and better reporting capabilities IT-Harvest 6

7 Software Assurance Licensing In 2005 Microsoft began offering Software Assurance. This extra licensing regime serves to protect customers from the unpredictable release cycle of major new versions of Microsoft products such as Office Productivity and Windows. Because the typical contract is for three years and Microsoft releases often exceed that, many customers opt out of Software Assurance. However, as of August 1, 2011 in order to get signature updates for ForeFront customers must have a paid up Software Assurance license. This could significantly add to the cost of using FEP. According to Forester a desktop Software Assurance License is 29% of the cost of the underlying software and for a server 25%. [14] Product use rights For Forefront Protection Suite are those in effect during the term of corresponding Enterprise CAL Suite Software Assurance coverage. A subscription to Forefront Protection Suite consists of the following online services: Forefront Endpoint Protection Forefront for Office Communications Server (formerly Antigen for Instant Messaging) Forefront Online Protection for Exchange (formerly Exchange Hosted Filtering) Forefront Protection 2010 for Exchange Server Forefront Threat Management Gateway Web Protection Service Forefront Protection 2010 for SharePoint Server In other words, a customer must enroll in Microsoft Software Assurance licensing to get the benefits from Forefront Protection Suite. It is an example of how Microsoft is using the immediacy and urgency of security updates to enhance their revenue stream IT-Harvest 7

8 Cost Model For this study we created two models to quantify the costs of switching to a Microsoft Forefront Security solution. The first is for an enterprise with a centrally managed Microsoft Exchange environment. The second is for a distributed enterprise with twenty locations around the world and a decentralized Microsoft Exchange environment. Model 1 Assumptions: 35,000 desktops with ECAL contracts 4 Forefront Server Security Management Consoles (Client security management is now through System Center Client Management Suite.) Customer already has Microsoft Software Assurance YEAR 1 YEAR 2 YEAR 3 3 YEAR TOTAL Additional staff to support components 156, , , ,750 Premium support for ECAL 240, , , ,000 Deployment 122, ,428 TOTAL COST $ 518,678 $396,250 $396,250 $1,311,178 Displaced vendor Premium Support savings 30,000 30,000 30,000 90,000 Displaced vendor license fees 210, , , ,000 TOTAL ADDITIONAL COSTS $ 278,678 $ 156,250 $ 156,250 $ 591,178 The costs associated with additional Microsoft server products to run ForeFront Security management consoles is not included because most enterprises would also use Microsoft servers to run competing products IT-Harvest 8

9 Model 2 Assumptions: Same as Model 1 but customer has to switch to Microsoft Software Assurance licensing ECAL purchased at 15% discount to $175 price YEAR 1 YEAR 2 YEAR 3 3 YEAR TOTAL Software Assurance premium (4%) 208, , , ,750 Additional staff to support components 156, , , ,750 Premium support for ECAL 240, , , ,000 Deployment 122, ,428 TOTAL COST $ 726,928 $ 604,500 $ 604,500 $ 1,935,928 Displaced vendor Premium Support savings 30,000 30,000 30,000 90,000 Displaced vendor license fees 210, , , ,000 TOTAL ADDITIONAL COSTS $ 486,928 $ 364,500 $ 364,500 $ 1,215,928 IT-Harvest estimates that a typical mid to large enterprise will face over $156K annual increases in the cost of providing anti-malware defense across the enterprise. And $364K in additional costs if the enterprise is forced to acquire Software Assurance licensing. This model does not take into account other drawbacks associated with Microsoft Forefront Suite such as lack of available training, poor reporting, costs assigned to increased risk due to the complicated relationship between Microsoft and the vendors that support Forefront s multiple AV engines and updates, or the increased costs of supporting (updating, patching, cleaning) additional Windows servers. It also does not include costs associated with potentially higher malware infection rates, which are hard to predict and may vary widely from customer to customer. Enterprises would do well to also factor in these and other potential costs when considering a move to Forefront IT-Harvest 9

10 Changes to Forefront in 2011 Forefront Client Security has been replaced by Forefront Endpoint Protection 2010 which is part of the Forefront Protection Suite ECAL. Forefront Endpoint Protection is now managed from Systems Center Configuration Manager (SCCM). This saves the costs associated with licensing and managing Forefront Client Management but Server Security Management Consoles will still be needed and organizations are required to upgrade from SMS (System Management Server) to SCCM to take advantage of the new architecture, an investment of $1,321 per server (including MSQL) and $430 for an enterprise Management License (ML.) Cost for core CAL has increased by 10% while ECAL pricing has remained the same. However the new components of ECAL as well as Forefront Protection cannot be enacted unless Software Assurance is purchased. Conclusion Microsoft Enterprise Client Access Licensing gives the enterprise the server and desktop protection products in the Forefront Security Suite, but additional Microsoft products, hardware and support must be purchased to manage Forefront today. Most organizations maintain servers and devices that are not from Microsoft. Abandoning a third party AV vendor completely will not be possible. Security should be treated as a separate layer in IT infrastructure. Basing malware defense on 100% Microsoft products decreases an enterprise s overall security posture because the management and control systems are subject to the same attacks that they are protecting against. The way Microsoft has made Software Assurance a requirement for signature updates to Forefront components is an abject example of the entanglement that can occur when enterprises single source a vendor. Enterprises should not switch to Microsoft Forefront Security Suite. Even though client and server licenses are included in the Enterprise Client Access License bundle, the additional costs could exceed $500,000 annually and the overall value delivered is less IT-Harvest 10

11 This white paper was produced with the sponsorship of Trend Micro. Its conclusions and opinions expressed are solely those of IT-Harvest and not necessarily those of our sponsors. References: 1. Microsoft CAL guide: 2. Dell Licensing Center CAL FAQ: s&cs=04&l=en&s=bsd&~page=5 3. Microsoft pricing for Forefront Client Security: 4. Microsoft Service Offering Plans: 5. Forefront Team blog: 6. System problems 7. Microsoft Premier Mission Critical Description: premier_mcs.mspx 8. New level of premium support 9. Microsoft Forefront TCO WhitePaper 9f38-7c40d /FCS%20TCO%20Whitepaper%20FINAL.docx 10. Miscrosoft Forefront Server Security Management Console Pricing US/ Planning and Deploying the Server Infrastructure for Configuration Manager en-us/library/bb aspx 12. Schedule and Strategy Update for Forefront Endpoint Protection. archive/2009/10/08/schedule-and-strategy-update-for-forefront-endpoint-protection.aspx Network World Magazine Microsoft customers sour on Software Assurance news/2007/ microsoft-customers-sour-on-software.html 15. Microsoft Premier Support page IT-Harvest 11

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Choosing an Email System for the Mid- Sized Business: A Comparison

Choosing an Email System for the Mid- Sized Business: A Comparison Whitepaper November 2010 Choosing an Email System for the Mid- Sized Business: A Comparison A J.Gold Associates White Paper Selecting a full featured, cost effective and secure email solution to enable

More information

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration

More information

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12) Nessus and Mobile Device Scanning November 7, 2014 (Revision 12) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 Scanning for Mobile Devices with Nessus... 4 Creating a

More information

Executive Brief on Enterprise Next-Generation Firewalls

Executive Brief on Enterprise Next-Generation Firewalls Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses

More information

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise) Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Today, we use more devices over more connections than ever before. Choosing when, where and how to work

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

INNOVATION & SUPPORT CENTER

INNOVATION & SUPPORT CENTER INNOVATION & SUPPORT CENTER About the Center The Innovation and Support Center is managed by highly trained and qualified professional Omanis; not only to keep pace with global development in the provision

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

ITSM & Enterprise Mobility Management

ITSM & Enterprise Mobility Management ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in this Brief?... 1 Introduction...

More information

1 System Center 2012 Licensing Changes In Plain English

1 System Center 2012 Licensing Changes In Plain English 1 System Center 2012 Licensing Changes In Plain English System Center 2012 Licensing Changes In Plain English Revision 1 5/30/2012 Windows Server and System Center portions applicable to all licensing

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

Comprehensive Resource for Licensing and Pricing

Comprehensive Resource for Licensing and Pricing 1 Comprehensive Resource for Licensing and Pricing Windows Server, System Center, and Forefront Licensing Guide Table of Contents What s New in This Guide 2 Windows Server 2008 R2 Offerings 2 Windows Server

More information

Intelligent End User Compute Strategy. Ted Smith Nigel Brown

Intelligent End User Compute Strategy. Ted Smith Nigel Brown Intelligent End User Compute Strategy Ted Smith Nigel Brown Introduction Microserve Technical Service Managed Services Professional Services BCNet provider of Desktops, notebooks, tablets, displays, print

More information

SOFTWARE LICENSING ADVISORS

SOFTWARE LICENSING ADVISORS SOFTWARE LICENSING ADVISORS SOFTWARE LICENSING ADVISORS LICENSING BRIEF LICENSING BRIEF WINDOWS SERVER EXTERNAL ACCESS AND AUTHENTICATION Changes in Windows Server 2012 permit External Users to access

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

Statement of Work Office 365 Migration. Gateway Unified School District

Statement of Work Office 365 Migration. Gateway Unified School District May 07, 2013 Statement of Work Office 365 Migration Gateway Unified School District Prepared by: Nicholas Vossburg Prepared for: Scott Sorrells Statement

More information

Network Access Protection (NAP)

Network Access Protection (NAP) Executive Summary Management and consistent availability of servers and endpoints in a business means higher productivity. Period. When employees no longer have to be concerned with the availability of

More information

70-671. Designing and Providing Microsoft Volume Licensing Solutions to. Small and Medium Organizations Exam. http://www.examskey.com/70-671.

70-671. Designing and Providing Microsoft Volume Licensing Solutions to. Small and Medium Organizations Exam. http://www.examskey.com/70-671. Microsoft 70-671 Designing and Providing Microsoft Volume Licensing Solutions to Small and Medium Organizations Exam TYPE: DEMO http://www.examskey.com/70-671.html Examskey Microsoft70-671 exam demo product

More information

Sophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5

Sophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5 Sophos Endpoint Security and Control on-premise installation best practice guide Endpoint Security and Control 10 Enterprise Console 5 Document date: May 2014 Contents 1 About this guide...3 2 What software

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

IT Agility that Drives Business Forward

IT Agility that Drives Business Forward IT Agility that Drives Business Forward Richard Stiennon Chief Research Analyst Introduction There are six factors that drive the ever changing information technology space: Growth in Users Bandwidth Processing

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Kaspersky Security for Business

Kaspersky Security for Business Kaspersky Security for Business Licensing Program Renewals and Upgrades: A Migration Guide Introducing Kaspersky s Security for Business software licensing program. Table 1: Renew and Upgrade to Increased

More information

KASPERSKY SECURITY FOR BUSINESS

KASPERSKY SECURITY FOR BUSINESS KASPERSKY SECURITY FOR BUSINESS Licensing Program RENEWALS AND UPGRADES: A Migration Guide INTRODUCING KASPERSKY S SECURITY FOR BUSINESS SOFTWARE LICENSING PROGRAM. Kaspersky s latest endpoint release

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

July 2015. Bytes are an Award Winning Microsoft Partner

July 2015. Bytes are an Award Winning Microsoft Partner July Bytes are an Award Winning Microsoft Partner Licensing changes Windows, MDOP, ECS and EMS 2 Licensing changes Bridge CAL, System Center, Azure 3 Licensing changes How to benefit your organisation

More information

IT Cost Reduction Strategies Report: Managed Environments and Virtual Desktops

IT Cost Reduction Strategies Report: Managed Environments and Virtual Desktops IT Cost Reduction Strategies Report: Managed Environments and Virtual Desktops Background: In April, V.C. Marc Hoit requested an investigation of potential savings across campus from the use of managed

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

BIGFIX. Free Software Is Not Free: A Quantitative TCO Analysis. Executive Summary

BIGFIX. Free Software Is Not Free: A Quantitative TCO Analysis. Executive Summary Free Software Is Not Free: A Quantitative TCO Analysis Executive Summary A famous catch phrase coined during the Great Depression of the 1920s and 1930s was There Ain t No Such Thing as a Free Lunch. The

More information

TCO for Application Servers: Comparing Linux with Windows and Solaris

TCO for Application Servers: Comparing Linux with Windows and Solaris TCO for Application Servers: Comparing Linux with Windows and Solaris Robert Frances Group August 2005 IBM sponsored this study and analysis. This document exclusively reflects the analysis and opinions

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

New possibilities in latest OfficeScan and OfficeScan plug-in architecture New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

GOOGLE APPS & MICROSOFT EXCHANGE SERVER 2007 TOTAL COST OF OWNERSHIP ANALYSIS

GOOGLE APPS & MICROSOFT EXCHANGE SERVER 2007 TOTAL COST OF OWNERSHIP ANALYSIS GOOGLE APPS & MICROSOFT EXCHANGE SERVER 2007 TOTAL COST OF OWNERSHIP ANALYSIS Sara Radicati, Ph.D. Principal Analyst THE RADICATI GROUP, INC. 595 Lytton Avenue Palo Alto, CA 94301 Tel: 650-322-8059 Fax:

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana 2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Datacenter Management Optimization with Microsoft System Center

Datacenter Management Optimization with Microsoft System Center Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

TOP 3. Reasons to Give Insiders a Unified Identity

TOP 3. Reasons to Give Insiders a Unified Identity TOP 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous,

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Easily integrate Mac into Microsoft System Center

Easily integrate Mac into Microsoft System Center Master your Macs in the Business Easily integrate Mac into Microsoft System Center Sascha Uhl Business Development Manager suhl@parallels.com Leader in Cloud Services Enablement and Desktop Virtualization

More information

Virtual Patching: a Compelling Cost Savings Strategy

Virtual Patching: a Compelling Cost Savings Strategy Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Licensing Guide. Published: March 2013

Licensing Guide. Published: March 2013 Licensing Guide Published: March 2013 Disclaimer: The Lync 2013 Licensing Guide is provided to customers and partners to assist in understanding the options for acquiring Lync Server 2013, Lync client

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the

More information

Client Access Licenses Suite Bridges Overview

Client Access Licenses Suite Bridges Overview Volume Licensing brief Client Access Licenses Suite Bridges Overview This brief applies to all Microsoft Volume Licensing programs. Table of Contents Summary... 1 What s New in this Brief... 1 Details...

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

Securing Your Business s Bank Account

Securing Your Business s Bank Account Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging

More information

Dedicated Hosted Exchange 2013

Dedicated Hosted Exchange 2013 About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

Closing the Antivirus Protection Gap

Closing the Antivirus Protection Gap A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

Comprehensive Resource for Licensing and Pricing

Comprehensive Resource for Licensing and Pricing 1 Comprehensive Resource for Licensing and Pricing Windows Server, System Center, and Forefront Licensing Guide Table of Contents What s New in This Guide 2 Windows Server 2008 R2 Offerings 2 Windows Server

More information

CAL UPDATE FAQ. Affected CALS:

CAL UPDATE FAQ. Affected CALS: CAL UPDATE FAQ Affected CALS: Bing Maps Server CAL Core CAL Suite Enterprise CAL Suite Exchange Server Standard and Enterprise CALs Lync Server Standard and Enterprise CALs Project Server CAL SharePoint

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013

More information