Microsoft en la empresa y el Gobierno
El cambio de rol de TI Microsoft es el único habilitado para ayudarlo a balancear las expectativas de los usuarios con los requerimientos institucionales. Dispositivos Windows-based Cuatro Pilares de nuestra estrategia: Seguridad y Administración Productividad Desarrollo de Aplicaciones Windows Next que las personas gustan de utilizar herramientas que ayudan a IT a proteger las organizaciones herramientas que trabajan como y con servicios para consumidores herramientas que simplifican y enriquecen experiencia desarrolladores
Windows 7 Impleméntelo hoy! Windows 8 es Windows reinventado 7.5
Interfaz optimizada para pantalla táctil y lápiz digital Soporte sin paralelos para seguridad empresaria Entorno de desarrollo unificado Más resistente/a prueba de agua/saneada Lectora de código de barras y tarjetas de crédito Integración de aplicaciones comerciales Sincronización on- y offline
Administre los permisos de acceso a las aplicaciones para cada usuario, no para cada dispositivo individual Administrado No administrado, basado en Windows No administrado, sin base en Windows Tradicional App-V Citrix XenApp
Windows Server 2008 R2 Active Directory
Security Strategy Briefing Marco A. Zúñiga Public Sector Manager Julio 2012 Microsoft Confidential
Microsoft Confidential
Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, Transparent Microsoft Confidential
Microsoft Confidential
Sony Finds More Cases of Hacking of Its Servers By NICK BILTON, May 2, 2011 Sony said Monday that it had discovered that more credit card information and customer profiles had been compromised during an attack on its servers last week. Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's latest Security Intelligence Report focuses on the expanding threat posed by bots and botnets. Microsoft this week unveiled the ninth volume of its Security Intelligence Report (SIR). The semi-annual Microsoft Confidential
Malware Protection Center Microsoft Security Response Center (MSRC) Global Foundation Services (GFS) Microsoft Confidential
SECURITY FUNDAMENTALS TECHNOLOGY INNOVATIONS INDUSTRY LEADERSHIP Microsoft Confidential
Education Process Accountability Ongoing Process Improvements 12 month cycle Microsoft Confidential
Private Cloud APPS Public Cloud On-Premises Online INFORMATION PROTECTION ACCESS CONTROL ANTI- MALWARE POLICY MANAGEMENT RESEARCH & RESPONSE SECURE DEVELOPMENT DEVICES Microsoft Confidential
Private Cloud Public Cloud On-Premises Online INFORMATION PROTECTION ACCESS CONTROL ANTI- MALWARE POLICY MANAGEMENT RESEARCH & RESPONSE SECURE DEVELOPMENT DEVICES Microsoft Confidential
Protect Against and Manage Threats Protect Sensitive Data Secure Access to Resources Universal Extensible Firmware Interface (UEFI) Trusted Platform Model (TPM) Maintain software with a patch management solution Deliver software that is secure by design Operate a malware resistant platform and applications Secure data that is at rest with encryption Protect data that is in motion with encryption Protect data that is in use with access controls Manage the full identity lifecycle Validate user identity with strong authentication Secured and always connected remote access Protect resources as environment changes Secured Boot Measured Boot Protected View IE Smart Screen Windows Standard User Accounts User Account Control, and AppLocker Modern Applications Security Development Lifecycle (SDL) Windows 7 BitLocker MDOP -BitLocker Administration and Monitoring Office Information Rights Management (IRM) Office Encrypted File System Active Directory Rights Management Services z Active Directory Direct Access Network Access Protection Dynamic Access Control Microsoft Confidential
Microsoft Confidential
Cloud Services Cloud Platform Services Cloud Infrastructure Infrastructure Security Global Delivery Sustainability Global Foundation Services Microsoft Confidential
Cloud Services Cloud Infrastructure Cloud Platform Services Cloud Services Users Cloud Platform Data Services Application Cloud Consumer Host Network Cloud Infrastructure Physical Cloud Provider Microsoft Confidential
Secure at the Foundation Windows Server Core File Classification Infrastructure Direct Access Bitlocker Server and Domain Isolation Network Access Protection Kernel Mode Code Signing Server Virtualization and Private Cloud Micro-Kernel Based Architecture Restricted-Access Hypervisor Full Guest Isolation Monitoring and Policy Enforced via Parent Partition System Center Manageability Identity and Policy Management Active Directory Read-Only Domain Controller Federation Services Rights Management Services Certificate Authority Services Cloud Service Integration Forefront Identity Manager Microsoft Confidential
Helping to making it easy for organizations to meet compliance policies Protect Data Control Access Ensure Compliance Help protect your data with a database solution that is historically known for the lowest vulnerabilities across the major DBMS vendors Transparent Data Encryption Backup Encryption Extensible Key Management Crypto enhancements Control access to your data by managing authentication and authorization effectively and by providing access to only users who need it Kerberos authentication User-Defined Server Roles Default Schema for Groups Contained Database Authentication Ensure compliance with company policies and/or government regulations like HIPAA, PCI, and Common Criteria Policy-Based Management User-Defined Audit, Filtering, and Resilience SQL Server Audit in all SKUs Change Data Capture Whitepaper SQL Server Delivers Industry-Leading Security by ITIC, a leading analyst firm Whitepaper Supporting HIPAA Compliance with SQL Server, by Information Security Center of Expertise at Jefferson Wells International, Inc, a leading Risk Advisory and Security Compliance services organization. Whitepaper Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0), by certified audit firm, Parente Randolph (now ParenteBeard). KB Support Article How to use SQL Server in FIPS 140-2 compliant mode Microsoft Confidential
Communicate and collaborate more securely using Exchange, SharePoint, Lync, and Office Comprehensive Protection Information Security Visibility and Control Multi-layered protection against spam and malware Effectiveness guaranteed by 5 financially-backed SLAs In-product controls that help protect users from threats Policy rules that inspect emails in transit Integration with AD RMS to safeguard sensitive data End-to-end encryption of communications Integrated administration, reporting, and auditing Granular control over user access and permissions Mobile security policies and remote device wipe Microsoft Confidential
Security Response Center Security Intelligence Report Security Development Lifecycle Security TechCenter Microsoft Security Update Guide www.microsoft.com /security/msrc www.microsoft.com /security/sir www.microsoft.com /sdl technet.microsoft.com /security www.microsoft.com /securityupdateguide Security Development Center Trustworthy Computing End to End Trust Malware Protection Center Security Blog msdn.microsoft.com /security www.microsoft.com /twc www.microsoft.com /endtoendtrust www.microsoft.com /security/portal www.microsoft.com /about/twc/en/us/blogs.aspx Microsoft Confidential
2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Microsoft Confidential