Presentation is loading. Please wait.

Presentation is loading. Please wait.

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.

Similar presentations


Presentation on theme: "2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience."— Presentation transcript:

1

2 2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience anywhere  Enhanced data security and compliance  Summary  Get started

3 3 Beyond virtualization Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services Every app, any cloud Build on an open and scalable web platform that supports applications across premises Modern workstyle, enabled Support a mobile and flexible work style The power of many servers, the simplicity of one Efficiently manage infrastructure while maximizing uptime and minimizing failures and downtime

4 4 Work | life blur Tech savvy Digital generation Multiple devices Fast paced More mobile

5

6 ENHANCED DATA SECURITY AND COMPLIANCE Better information protection and governance Improved device security and encryption FULL WINDOWS EXPERIENCE ANYWHERE Improved graphics experience across devices with RemoteFX User state virtualization Complete Virtual Desktop Infrastructure (VDI) tool set DirectAccess ACCESS FROM VIRTUALLY ANYWHERE, ANY DEVICE 6 6

7 Remote Desktop Services Use this complete VDI tool set to fit your virtualization needs 7 Improved administrative efficiency Central console that gives one point of control for virtual machines and session host servers Easier deployment and updating Simplified rollout of pooled and personal virtual desktops Intelligent patching Easier single sign-on administration Lower storage costs High-performance remote server message block (SMB)-based file storage on mainstream hardware Local virtual machine caching of pooled desktops using direct attached storage

8 8 1 platform | 1 experience | 3 deployment choices Pooled virtual machines Desktop sessions Personal virtual machines

9 Reduced deployment requirements Inbox support for IPv4 and IPv6 Deployment wizard to decrease complexity Improved performance and scalability More simultaneous connections with lower CPU use Better throughput on virtualized servers One management experience DirectAccess and Routing and Remote Access service (RRAS) configured together with a single set of wizards Simplified DirectAccess deployment model; focus on Active Directory DirectAccess Maintain corporate network connectivity without requiring a VPN connection 9

10 10 Microsoft Exchange Microsoft SharePoint Data Servers Firewall VPN DirectAccess

11

12  Quick and easy setup with QuickDeploy  Simplified administration of sessions and VMs from a single console  Intelligent patching and scanning thru task randomization  High scalability with Hyper-V and higher system performance with FairShare  Deploy lower cost desktops with User Disks  Support for lower cost storage such as SMB file shares and DAS  RemoteFX can leverage hardware and software GPUs  Rich Multimedia and 3D graphics even on low bandwidth WAN  Support for USB redirection and multi-touch remoting Rich experience everywhere Efficient management Best value for virtual desktops Operating system

13 Easily resolve end-user permission issues Centrally manage access control from Active Directory Pre-stage and simulate the effect of changes to access policy Automatically identify and classify data based on content DYNAMIC ACCESS CONTROL Central access policies File access audit Integration with Active Directory Rights Management Services File Classification Infrastructure 13

14 ClassificationAccess controlAuditing Rights Management Services protection Files inherit classification tags from parent folder File owners tag files manually Files are tagged automatically Files are tagged by applications Central access policies are based on classification Access conditions for user claims, device claims, and file tags are based on expressions Assistance is available for denial of access Central audit policies can be applied across multiple file servers Audits for user claims, device claims, and file tags are based on expressions Audits can be staged to simulate policy changes in a real environment Automatic Rights Management Services (RMS) protection is available for Microsoft Office documents Protection is in near-real– time when a file is tagged RMS protection extends to files not created in Microsoft Office DYNAMIC ACCESS CONTROL 14

15 ClassificationAccess controlAuditing Rights Management Services protection Identifies data Classifies files automatically and manually Controls access to files Provides central access policies for an organization-wide safety net Audits access to files Provides central audit policies for compliance reporting and forensic analysis Applies RMS encryption Reduces information leaks DYNAMIC ACCESS CONTROL 15

16 Extended information protection Automatic Active Directory Rights Management Services encryption for sensitive Microsoft Office documents and email—can be applied directly as files are classified Enhanced data governance Automatic and manual classification of files for identifying data Central access policies for controlling access to files Audit access for compliance reporting and forensic analysis 16 Dynamic Access Control and Active Directory Rights Management Services Control access with identity- based usage policies and file classification

17 17 Microsoft Exchange Microsoft SharePoint Windows Server 2012 Active Directory Rights Management Services Persistent, identity-centric use policies and encryption embedded with the data Windows Server 2012 Dynamic Access Control Data governance across file servers Control who can access information Audit who has accessed information

18 High-performance encryption Minimize impact of BitLocker deployment on productivity Offload cryptographic operations to hardware Enable auto-encryption based on file attributes Device-specific security Associate user with a primary device for accessing corporate data If user logs on from another device, clear data left behind 18 User device affinity and BitLocker Drive Encryption Protect data from loss or theft

19 19 Secure environment for both corporate and personal data Freedom to work where, when, and how I want Consistent, device-optimized experiences Full Windows experience anywhere Access from virtually anywhere, any device Enhanced data security and compliance

20 20 Download Windows Server 2012 Learn more about Windows Server 2012, Microsoft Private Cloud solutions, and Microsoft System Center 2012 Work with a Microsoft representative for proof of concept and current and future licensing needs Please complete your evaluation form

21 21


Download ppt "2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience."

Similar presentations


Ads by Google