Microsoft en la empresa y el Gobierno



Similar documents
How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Trustworthy Computing

Windows Phone 8 Security Overview

Estrategias para la Reducción de Riesgos y Ciber Ataques

DriveLock and Windows 7

Protecting Your Organisation from Targeted Cyber Intrusion

Operating System Security

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

The Education Fellowship Finance Centralisation IT Security Strategy

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

Implicaciones para. CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC

AULA EUROPEA DE EMPRESA

DriveLock and Windows 8

SERENA SOFTWARE Serena Service Manager Security

Anirudh Singh Rautela Security & Privacy Initiative Lead & Product Marketing Manager Security Microsoft

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Session ID: Session Classification:

Making Data Security The Foundation Of Your Virtualization Infrastructure

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Addressing Cloud Computing Security Considerations

Managing BitLocker Encryption

How To Manage A Privileged Account Management

Navigating Endpoint Encryption Technologies

Kevin Dean Technology Strategist Education Southeast Microsoft Corporation

How To Get A Cloud Security System To Work For You

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

White Paper How Noah Mobile uses Microsoft Azure Core Services

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

Did you know your security solution can help with PCI compliance too?

John Essner, CISO Office of Information Technology State of New Jersey

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Implementing Microsoft Azure Infrastructure Solutions

F5 and Microsoft Exchange Security Solutions

Hands on, field experiences with BYOD. BYOD Seminar

Cloud Computing Security Considerations

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Information Security for the Rest of Us

Windows 7 Overview. M arkus Erlacher. Technical Solution Professional

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Hosted SharePoint: Questions every provider should answer

Filling the Threat Management Gateway Void with F5

Securing the Cloud Infrastructure

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

How To Teach A Security Manager

Windows XP Support stops on 8. April 2014

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Payment Card Industry Data Security Standard

SharePoint Operational Governance. al 1

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

custom hosting for how you do business

PCI DSS and the A10 Solution

Windows Embedded Security and Surveillance Solutions

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Security & privacy in the cloud; an easy road?

Data-Centric Security vs. Database-Level Security

Microsoft s cybersecurity commitment

HotSpot Enterprise Mobile Printing Solution. Security Whitepaper

HIPAA/HITECH Act Implementation Guidance for Microsoft Office 365 and Microsoft Dynamics CRM Online

Effective End-to-End Cloud Security

Course Active Directory Services with Windows Server

SECURITY IN A HOSTED EXCHANGE ENVIRONMENT

Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Trend Micro Cloud Security for Citrix CloudPlatform

ICT Professional Optional Programmes

Transcription:

Microsoft en la empresa y el Gobierno

El cambio de rol de TI Microsoft es el único habilitado para ayudarlo a balancear las expectativas de los usuarios con los requerimientos institucionales. Dispositivos Windows-based Cuatro Pilares de nuestra estrategia: Seguridad y Administración Productividad Desarrollo de Aplicaciones Windows Next que las personas gustan de utilizar herramientas que ayudan a IT a proteger las organizaciones herramientas que trabajan como y con servicios para consumidores herramientas que simplifican y enriquecen experiencia desarrolladores

Windows 7 Impleméntelo hoy! Windows 8 es Windows reinventado 7.5

Interfaz optimizada para pantalla táctil y lápiz digital Soporte sin paralelos para seguridad empresaria Entorno de desarrollo unificado Más resistente/a prueba de agua/saneada Lectora de código de barras y tarjetas de crédito Integración de aplicaciones comerciales Sincronización on- y offline

Administre los permisos de acceso a las aplicaciones para cada usuario, no para cada dispositivo individual Administrado No administrado, basado en Windows No administrado, sin base en Windows Tradicional App-V Citrix XenApp

Windows Server 2008 R2 Active Directory

Security Strategy Briefing Marco A. Zúñiga Public Sector Manager Julio 2012 Microsoft Confidential

Microsoft Confidential

Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, Transparent Microsoft Confidential

Microsoft Confidential

Sony Finds More Cases of Hacking of Its Servers By NICK BILTON, May 2, 2011 Sony said Monday that it had discovered that more credit card information and customer profiles had been compromised during an attack on its servers last week. Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's latest Security Intelligence Report focuses on the expanding threat posed by bots and botnets. Microsoft this week unveiled the ninth volume of its Security Intelligence Report (SIR). The semi-annual Microsoft Confidential

Malware Protection Center Microsoft Security Response Center (MSRC) Global Foundation Services (GFS) Microsoft Confidential

SECURITY FUNDAMENTALS TECHNOLOGY INNOVATIONS INDUSTRY LEADERSHIP Microsoft Confidential

Education Process Accountability Ongoing Process Improvements 12 month cycle Microsoft Confidential

Private Cloud APPS Public Cloud On-Premises Online INFORMATION PROTECTION ACCESS CONTROL ANTI- MALWARE POLICY MANAGEMENT RESEARCH & RESPONSE SECURE DEVELOPMENT DEVICES Microsoft Confidential

Private Cloud Public Cloud On-Premises Online INFORMATION PROTECTION ACCESS CONTROL ANTI- MALWARE POLICY MANAGEMENT RESEARCH & RESPONSE SECURE DEVELOPMENT DEVICES Microsoft Confidential

Protect Against and Manage Threats Protect Sensitive Data Secure Access to Resources Universal Extensible Firmware Interface (UEFI) Trusted Platform Model (TPM) Maintain software with a patch management solution Deliver software that is secure by design Operate a malware resistant platform and applications Secure data that is at rest with encryption Protect data that is in motion with encryption Protect data that is in use with access controls Manage the full identity lifecycle Validate user identity with strong authentication Secured and always connected remote access Protect resources as environment changes Secured Boot Measured Boot Protected View IE Smart Screen Windows Standard User Accounts User Account Control, and AppLocker Modern Applications Security Development Lifecycle (SDL) Windows 7 BitLocker MDOP -BitLocker Administration and Monitoring Office Information Rights Management (IRM) Office Encrypted File System Active Directory Rights Management Services z Active Directory Direct Access Network Access Protection Dynamic Access Control Microsoft Confidential

Microsoft Confidential

Cloud Services Cloud Platform Services Cloud Infrastructure Infrastructure Security Global Delivery Sustainability Global Foundation Services Microsoft Confidential

Cloud Services Cloud Infrastructure Cloud Platform Services Cloud Services Users Cloud Platform Data Services Application Cloud Consumer Host Network Cloud Infrastructure Physical Cloud Provider Microsoft Confidential

Secure at the Foundation Windows Server Core File Classification Infrastructure Direct Access Bitlocker Server and Domain Isolation Network Access Protection Kernel Mode Code Signing Server Virtualization and Private Cloud Micro-Kernel Based Architecture Restricted-Access Hypervisor Full Guest Isolation Monitoring and Policy Enforced via Parent Partition System Center Manageability Identity and Policy Management Active Directory Read-Only Domain Controller Federation Services Rights Management Services Certificate Authority Services Cloud Service Integration Forefront Identity Manager Microsoft Confidential

Helping to making it easy for organizations to meet compliance policies Protect Data Control Access Ensure Compliance Help protect your data with a database solution that is historically known for the lowest vulnerabilities across the major DBMS vendors Transparent Data Encryption Backup Encryption Extensible Key Management Crypto enhancements Control access to your data by managing authentication and authorization effectively and by providing access to only users who need it Kerberos authentication User-Defined Server Roles Default Schema for Groups Contained Database Authentication Ensure compliance with company policies and/or government regulations like HIPAA, PCI, and Common Criteria Policy-Based Management User-Defined Audit, Filtering, and Resilience SQL Server Audit in all SKUs Change Data Capture Whitepaper SQL Server Delivers Industry-Leading Security by ITIC, a leading analyst firm Whitepaper Supporting HIPAA Compliance with SQL Server, by Information Security Center of Expertise at Jefferson Wells International, Inc, a leading Risk Advisory and Security Compliance services organization. Whitepaper Deploying SQL Server Based on Payment Card Industry Data Security Standards (PCI DSS 2.0), by certified audit firm, Parente Randolph (now ParenteBeard). KB Support Article How to use SQL Server in FIPS 140-2 compliant mode Microsoft Confidential

Communicate and collaborate more securely using Exchange, SharePoint, Lync, and Office Comprehensive Protection Information Security Visibility and Control Multi-layered protection against spam and malware Effectiveness guaranteed by 5 financially-backed SLAs In-product controls that help protect users from threats Policy rules that inspect emails in transit Integration with AD RMS to safeguard sensitive data End-to-end encryption of communications Integrated administration, reporting, and auditing Granular control over user access and permissions Mobile security policies and remote device wipe Microsoft Confidential

Security Response Center Security Intelligence Report Security Development Lifecycle Security TechCenter Microsoft Security Update Guide www.microsoft.com /security/msrc www.microsoft.com /security/sir www.microsoft.com /sdl technet.microsoft.com /security www.microsoft.com /securityupdateguide Security Development Center Trustworthy Computing End to End Trust Malware Protection Center Security Blog msdn.microsoft.com /security www.microsoft.com /twc www.microsoft.com /endtoendtrust www.microsoft.com /security/portal www.microsoft.com /about/twc/en/us/blogs.aspx Microsoft Confidential

2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Microsoft Confidential