Presentation is loading. Please wait.

Presentation is loading. Please wait.

Notes to Presenter (Hidden Slide) This deck has been built in a modular fashion, allowing users to pull any of the sections on the customer focus areas.

Similar presentations


Presentation on theme: "Notes to Presenter (Hidden Slide) This deck has been built in a modular fashion, allowing users to pull any of the sections on the customer focus areas."— Presentation transcript:

1 Notes to Presenter (Hidden Slide) This deck has been built in a modular fashion, allowing users to pull any of the sections on the customer focus areas and drop those slides into a different presentation. The three sections are: Reducing Cost Security and Compliance Access

2 Secure and Well-managed Exchange Server [Presenter Name] [Date]

3 Agenda and Objectives Agenda Your Messaging Challenges Introduction to the Core IO Model Benefits of Optimizing the Exchange Environment Reducing Costs Protecting Messaging Systems Enabling Remote Access Resources Next Steps To show how you can reduce costs, improve protection and compliance, and enable anywhere access by optimizing your Microsoft ® Exchange Server environmentObjective

4 Microsoft Solutions for an Optimized Datacenter PlatformModernization Secure & Well Managed Exchange Secure & Well Managed SharePoint Server Virtualization Branch Modernization Datacenter Management

5 Today’s Messaging Challenges Pervasive Security Threats Most common entry path for viruses and malware is messaging systems Viruses, worms, spam, and other malware can cripple a messaging server Diverse Access Needs Mobile workforce Information leakage Challenge of managing user identities High costs associated with service complexity High costs associated with service complexity Slow economy increases need for cost cutting Slow economy increases need for cost cutting High costs associated with service complexity High costs associated with service complexity Slow economy increases need for cost cutting Slow economy increases need for cost cutting —IDC Worldwide Messaging Security 2008–2012 Forecast, August 2008 “In a survey of IT professionals, the top 3 threats are directly related to messaging, including spam and viruses.” Budget Pressure

6 Securing and Managing Messaging Systems BasicBasic Uncoordinated, manual infrastructure RationalizedRationalized Managed and consolidated IT infrastructure with maximum automation DynamicDynamic Fully automated management, dynamic resource usage, business linked SLAs StandardizedStandardized Managed IT infrastructure with limited automation Cost CenterBusiness Enabler Strategic Asset More Efficient Cost Center Identity and Access Management Desktop, Device, and Server Management Security and Networking Data Protection and Recovery Dynamic IT

7 Benefits of Infrastructure Optimization Drive efficiency through automation, optimization, and simplification Drive efficiency through automation, optimization, and simplification Reduce Costs Improve Protection and Compliance Protect with comprehensive, layered security and centralized management Guard against information leaks, no matter where content goes Improve control, reporting and management to help achieve server compliance Enable Anywhere Access Provide secure remote access Publish through a centralized, policy- driven framework, Simplify user identity information management

8 Reducing Costs Improve Protection and Compliance Protect with comprehensive, layered security and centralized management Guard against information leaks with access rights and usage policies, no matter where content goes Enable Anywhere Access Provide secure remote access Keep confidential information from leaking Enable unified identity management Drive efficiency through automation, optimization, and simplification Drive efficiency through automation, optimization, and simplification Reduce Costs

9 Server Environment Cost Challenges Enable New Business Scenarios Drive IT Efficiency Reduce Costs Extend Access

10 Delivering Efficiencies Through Management Lower costs through server and resource automation Automate deployment and management Ensure high availability of Exchange Server Meet compliance requirements Optimize through unified physical and virtual management Enhance service availability and business continuity Consolidate servers with virtualization Manage both physical and virtual resources Increased simplicity through integrated management Single view across resources Integrated human and system workflows Standardize on single set of solutions

11 Core Infrastructure Optimization Cost Benefits Workload 1 - From a Hansa/GCR study sponsored by Microsoft in Microsoft did not communicate with the companies included in the study, and respondents weren’t aware that Microsoft had commissioned the study. Currency is U.S. dollars.. BasicBasicStandardizedStandardizedRationalizedRationalized IT Labor Costs per User per Year $36.21 $22.67$9.06 Servers per IT Employee IT Labor Costs per Server per Year $15,045$10,950$6,285 Downtime per Server per Year (Hours)

12 Best Practices to Reduce Operational Costs Workload Adoption of Best Practice Reduction in IT Labor Cost per Server Standardized Practices Rationalized/Dynamic Practices

13 Comparison of Basic and Standardized environment costs Standardized Example 20,000 Users 1.62 ITE for Workload 15 Servers 9.29 Servers per ITE 7 Best Practices $11,872 Cost per Server $8.90 Cost per User Basic Example 4,500 Users 1.3 ITE for Workload 4 Servers 2.89 Servers per ITE 3 Best Practices $38,160 Cost per Server $33.92 Cost per User Some Differentiating Best Practices Standardized software imaging for new deployments Standardized imaging for operating-system maintenance Planned operating-system maintenance

14 Options to Address Capital Costs Licensing Server Management Suite Enterprise 11 core Microsoft business products Communication, security, and management Significant cost savings Obtain four System Center products Lower labor costs Drive server consolidation Planning Tools Microsoft Assessment and Planning Toolkit Automatically inventories assets Integrates portal with automated tools Payment Options Spread payments over time Finance 100 percent of eligible products Financing Microsoft Solution Accelerator

15 Helping Reduce Messaging Costs “By automating user provisioning and integrating with Active Directory ®, Avanade accelerated user access to resources, saving more than $1.2M in operating costs annually.” Regarding Hyper-V™ and System Center Virtual Machine Manager: “Integration with existing systems, especially Exchange Server and System Center Operations Manager—was a simple process. We now have a low hardware footprint, even higher performance, and high availability. Our expectations from the Rapid Deployment Program have been met.”

16 Protection and Compliance Enable Anywhere Access Provide secure remote access Keep confidential information from leaking Enable unified identity management Improve Protection and Compliance Protect with comprehensive, layered security and centralized management Guard against information leaks, no matter where content goes Improve control, reporting and management to help achieve server compliance Drive efficiency through automation, optimization, and simplification Reduce Costs

17 Security and Compliance Challenges Manual labor and human error High costs associated with compliance monitoring Compliance Unauthorized use of confidential information Siloed approaches to identity management Data Leakage Prevention New malware up 750 percent in 2008 $276 million in cybercrime in percent of breaches from insiders Security Threats Continue to Evolve “Data from various antispam sources indicates that in 2007, ~73% of all Internet was spam. While this number compares with that from 2006, the absolute volume of spam has risen significantly.” —Forrester, 2008 “42% of all content security inquiries fielded between October 2007 and September 2008 related to security.” —Forrester, 2009

18 Protection Provide effective protection from viruses and malware with content scanning at multiple points and application-level filtering —Roger Järnbrink, Project Leader, Exchange 2007 Implementation, Royal Institute of Technology “One of the best things about Forefront Security for Exchange Server is having multiple scanning engines and no single point of failure. This gives us a level of protection and reliability we’ve never had before.” Multiple scanning engines Automatic downloads of engine updates Layered approach to hosted filtering services Ensure no single point of failure Protect from the latest threats Deliver zero-day protection Effectively protect against spam Premium anti- spam services

19 Benefits of the Multi-engine Approach Hours until signature availability An AV-Test of consumer anti-virus products (that used a malware sample covering approximately the last three years) revealed: On average, Forefront engine sets provided a response in 3.1 hours or less. Single-engine vendors provided responses in 5 days, 4 days, and 6 days, respectively. Sources: AV-Test, West Coast Labs, ICSA, Virus Bulletin

20 Prevention Guard against sensitive information leaks in with access rights and usage policies, no matter where content goes “Active Directory Rights Management Services, Windows BitLocker™ Drive Encryption, Network Access Protection, and Group Policy reduce the risk of intellectual property and customer data loss. Caja Madrid’s use of these technologies saved it $100K annually.” Access policies embedded into Exchange Server integration Common usage rights and identity integration Authorized functionality permissions Share information more securely Eliminate redundant credential prompts Reduce compliancy risks Enable more secure remote access

21 Desired server configuration management Asset intelligence reporting Security vulnerability assessment Configuration Controls and Reporting Collection and consolidation of security events Reporting to meet audit requirements Default and custom reporting Centralized Security Auditing Holistic server and security management Visibility of health and security status of data center Automated deployment of security updates Identity And Access Management Improve control, reporting and management to help achieve server compliance Compliance

22 Supporting Technologies for Security and Compliance “I’ve used many security products over the years, and the reporting in Forefront products is light-years ahead of anything else I’ve seen.” —Will Wilson, Director of Information Systems, Guardian Management LLC

23 Remote Access Improve Protection and Compliance Protect with comprehensive, layered security and centralized management Guard against information leaks with access rights and usage policies, no matter where content goes Enable Anywhere Access Provide secure remote access Publish through a centralized, policy- driven framework, Simplify user identity information management Drive efficiency through automation, optimization, and simplification Reduce Costs

24 Policy-based Access Approach PROVISION PUBLISH POLICY Access to messaging system from unmanaged endpoints Non-IT assets seeking remote access Access to messaging system from managed IT endpoints IT assets seeking remote access Federated access to users outside the corporate network Balance anywhere access with security Providing remote access to employees, partners, and customers

25 Publishing Securely publish Exchange to make it accessible to remote employees and partners Pre- authentication of remote users Easy-to-use, wizard-driven interfaces Single sign-on capabilities SSL-encrypted VPN Improve Exchange publishing Protect data from unauthorized users Ensure security for accessing resources Provide consistent user experience “Using ISA Server 2006 allows us to access Web applications easily from home or, in the case of pilots and crews, from hotels. All they need is access to the Internet.” —Wendy Lou, IT Security Architect, Northwest Airlines

26 Policy Enhance Exchange publishing with a centralized, policy-driven framework, and allow access from both managed and unmanaged devices Policy-driven access framework Supports diverse sets of remote users Identity and endpoint access controls Enforces granular access to Exchange Endpoint security management/ verification Ensures endpoint health compliance Multi-factor authentication (smart cards) Enforces user profiles and privileges “Using Intelligent Application Gateway, employees can connect easily, which means that our important customer information is accessible for them wherever they are.” —Raymond Provily, Manager of Facilities and IT, ROI

27 Provision Simplify user identity information management for provisioning and de-provisioning of accounts Synchronizing user identity across systems Enterprise identity lifecycle management Integration with existing infrastructure Workflows to control user access Provides consistent access to Provides a single administration point Reduces identity lifecycle management costs Enables auto- provisioning/ de-provisioning “In the past, administrators spent around 10 minutes setting up each new user account. With the new system in place, user account creation is fully automated, so administrators need only monitor the process. As a result, the time spent on account creation has been reduced by around 90%.”

28 Supporting Technologies for Remote Access “It used to take months for us to add a new application, because we had to hire external expertise to assist us. Now it only takes a few weeks, because of IAG 2007.” —Edwin Strijland, IT Specialist, SVB

29 Microsoft Solution for Secure and Well-managed Exchange Drive efficiency through automation, optimization, and simplification Drive efficiency through automation, optimization, and simplification Reduce Costs Improve Protection and Compliance Protect with comprehensive, layered security and centralized management Guard against information leaks, no matter where content goes Improve control, reporting and management to help achieve server compliance Enable Anywhere Access Provide secure remote access Publish through a centralized, policy- driven framework, Simplify user identity information management

30 Next Steps Step 1 Complete an IO assessment Step 2 Find out more about Optimization solutions Step 3 Use the Solution Accelerators to plan for Optimization projects Step 4 Talk to a Microsoft partner about optimizing Exchange

31

32 Messaging Costs Economic factors place downward pressure on IT budgets Repetitive and manual maintenance Cost of downtime and data breaches Server sprawl with increased storage space Multiple and inconsistent user interfaces Cost Challenges for Messaging Systems

33 Rapid response to new threats Fail-safe protection through redundancy Diversity of antivirus engines and heuristics Response time 1 (in hours) WildList Number Malware Name Forefront Engines Vendor AVendor BVendor C 01/09autorun_itw542.ex_ /09buzus_itw3.ex_ /09conficker_itw5.dl_ /09koobface_itw18.ex_ /09momibot_itw2.ex_ /09pinit_itw2.ex_ /09zbot_itw30.ex_ /09zbot_itw31.ex_ /09zbot_itw39.ex_ /09agent_itw94.ex_ /09autorun_itw580.ex_ /09autorun_itw585.ex_ /09autorun_itw594.ex_ /09magania_itw21.ex_ /09onlinegames_itw624.ex_ /09onlinegames_itw627.ex_ /09onlinegames_itw643.ex_ /09zbot_itw42.ex_ /09autoit_itw90.ex_ /09autorun_itw597.ex_ /09autorun_itw598.ex_ /09autorun_itw601.ex_ /09autorun_itw616.ex_ /09ircbot_itw485.ex_ /09mariof_itw2.ex_ /09onlinegames_itw651.ex_ /09zbot_itw43.ex_ ** 0.00 denotes proactive detection 1 Source: AV-Test.org 2009 (www.av-test.org) Single-engine solutions Less than 5 hours The Multiple Engine Advantage 5 to 24 hours More than 24 hours


Download ppt "Notes to Presenter (Hidden Slide) This deck has been built in a modular fashion, allowing users to pull any of the sections on the customer focus areas."

Similar presentations


Ads by Google