69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on personal devices Information workers will have 3.3 connected devices in 2014 – up 18% from 2.8 in 2012 (3) 3.3 88% Employees are using their personal computing technologies for business purposes today (2) 88%
THIS IS CONSUMERIZATION BUT NOT CONSUMERIZATION OF IT
Virtual Desktop (Non-Persistent) Remote Desktop Services (RDS / Citrix) Virtual Desktop (Persistent) At what cost did you enable Agility ? How do we sustain TCO while enabling flexibility and provide compliance? Personas / Profiles, Access & Security, Data Rights Management, Application lifecycle Deploy OS / Apps, Standardize, Patch, Lockdown user x4
Synchronization Exchange Active Sync SkyDrive Pro User Experience Virtualization SharePoint Data Protection and Compliancy Group Policy Data classification Rights Management Data encryption BranchCache Application White Listing Virtualization Application Virtualization Remote Desktop Services Virtual Desktop Infrastructure Secure Access Server and domain isolation Network Access Protection Unified Access Gateway Direct Access Remote device management Provide Cost Effective World Class Continuous Services to Any Device x4 x1
mobile services Work on any PC anywhere Work on your own device Work on many devices ENABLE
Access to data depends on user, device and location If user, device and locations are trusted access is granted Direct Access RRAS VPN SSL VPN CORPORATE NETWORK Windows 7/8 Myriad mobile devices Down-level Windows clients and mobile devices.
Cost of data breach $204 per compromised record $6.75 million average total cost 40% of cases are people mistakes *Source: Ponemon Corp, January 2010 Public info Marketing info Email address IP address Fax number Social security # Credit card info. Aggregate Data Health info Username/PW Recommendations by International Accounting Standards Board US: SOX, PCI-DSS, GLBA, FISMA, Joint Commission and HIPAA EU: Basel Accord I, II, II UK: Data Protection Act, FSA, Freedom of Information Act 2000, Australia: ARPA, Canada: C- SOX, China: CCC Mark, Japan: J-SOX, and others HIGH Business Impact HBI MODERATE Business Impact MBI LOW Business Impact LBI Information classification wizard http://www.windowsphone.com/en- us/store/app/infoclasswiz/cca5583a-a3cc-4e89-a11b- 3d348d6b04ec Microsoft Data Classification Toolkit Solution Accelerator http://www.microsoft.com/en- s/download/details.aspx?id=27123
The incorrect perception that Microsoft programs still represent the primary attack vector, means that defenses based on this false assumption are as effective as locking the front door to your home while the back door remains wide open.
System Security & Compliance Encryption Deploy, provision, recover BitLocker encrypted systems. Deploy desktop OS pre- configured for BitLocker AV and Compliance Device policy control and compliance through enforced PINs or remote wipe All Windows AV and system configurations managed in a single interface Device discovery and inventory Hardware and Boot Windows and Drivers Anti-Virus ConfigMgr/SCEP and Windows Intune MDOP (MBAM, AppLocker) Data Encryption Windows 8 device DirectAccess/ Forefront UAG Applications & Data Server Network Device Start Devices & Platforms IT Windows Intune Single admin console Simplifying Management across Platforms
+ Information Protection Connected productivity: Share and edit Office documents directly using Windows Phone Use Lync on all major smartphone platforms Take notes with text, pictures and voice with OneNote Mobile for Windows Phone and iPhone Work online together with others on Office documents from anywhere with Office Web Apps Microsoft Exchange Microsoft SharePoint Windows Server 2012 Active Directory Rights Management Services Persistent, identity-centric use policies and encryption embedded with the data Windows Server 2012 Dynamic Access Control Data governance across file servers Control who can access information Audit who has accessed information Start without Compromising Security ConfigMgr Windows Intune On Premise & in the Cloud
Employee Purchased Company Purchased Employee ManagedCompany Managed Employee Indifference Company Influenced RISK Access
Secure and compliant environment LOB Applications Business value Collaboration needs Mobility Business value Collaboration needs LOB Applications Engagement with technology Mobility Proxi LOB applications Public Collaboration Mobility Enablement
Embrace Bring Your Own Device A variety of solutions that fits your organization * Any device certified for use with Windows 7 or Windows 8,. Software Assurance (SA) for Windows required
Gartner: Desktop Total Cost of Ownership: 2011 Update, Published: 16 November 2010, ID:G00208726 Notebook Total Cost of Ownership: 2011 Update, Published: 17 November 2010 ID:G00208793 Total Cost of Ownership of Mobile Devices: 2012 Update, Published: 20 March 2012, ID:G00229907 Client Computing Total Cost of Ownership, 2011: A Chart of Accounts, Published: 3 March 2011, ID:G00210895 Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update, Published: 14 December 2010, ID:G00209403 Total Cost of Ownership Comparison of PCs With Server-Based Computing, 2011 Update, Published: 14 December 2010, ID:G00209456 PQR VDI Smackdown v1 3 (ENG) (feb 2012).pdf PQR VDI Smackdown v1 3 (ENG) (feb 2012).pdf PQR Understanding how storage design has a big impact on your VDI (updated September 2011)
Low Mobility High Mobility Low Autonomy High Autonomy
Support Mobile Workforce No Compromise Business Tablet 1 New Possibilities in Mobile Productivity Enhanced End-to- End Security Management and Virtualization 1 Internet access required 2 Software Assurance (SA) for Windows required 3 Microsoft Desktop Optimization Pack (MDOP) required 4 Windows 8 Pro required
1.0 2.0 Follow Me Desktop Windows 8 (Tablet/OS) Assessment Enterprise Ready Windows 8 Voicemail in Email Follow Me Settings Follow Me Printing Video Phone Device Consolidation Follow Me Apps Automated App Request Office 2013 Follow Me Docs Outlook Offline Devices Apps Settings Docs Q1 Q2 Q3 Q42014 Q1 WorkSpace – Implementation Timeline Enable better decisions faster and enhance productivity by providing secure anytime, anywhere, access to MyApps, MySettings, and MyDocs from MyDevices Thin Clients Devices Enterprise Ready Window 8 UC Device Consolidation Settings Follow Me Printing Apps Follow Me Apps Office 2013, IE 10 Docs Outlook Offline Devices Follow Me Desktop Windows 8 (Tablet/OS) Assessment Thin Clients Settings Follow Me Settings Apps Voicemail in Email Docs No Change 2013 Internet Explorer 10 3.0 Devices No Change Settings Follow Me Printing Apps Automated App Request Docs Follow Me Docs
ProfileDevice(s)/ScenarioAppsData ExecutivesLaptop or Tablet running Windows 7/8 or Mac OS ARM Tablet running Windows RT or iOS Windows: Streamed (App-V) Mac: Local Install Windows RT: AZ App Store, Sideloaded, Windows Store iOS: iTunes AppStore, Citrix XenApp or XenDesktop Office 365 Skydrive Pro Folder Redirection CorporateLaptop or Desktop running Windows 7/8Streamed (App-V) Citrix XenApp (Remote App) Office 365 SkyDrive Pro Folder Redirection CommercialARM Tablet running Windows RT or iOS Windows-to-Go Windows RT: AZ App Store, Sideloaded, Windows Store iOS: iTunes AppStore, Citrix XenApp or XenDesktop Office 365 Skydrive or Skydrive Pro R&DLaptop or Desktop Transient between clean lab and office environment Windows: Streamed (App-V) Linux: Citrix XenApp Office 365 Skydrive Pro Folder Redirection ContractorsWindows-to-GoStreamed (App-V) Citrix XenApp (Remote App) Office 365 Kiosk Folder Redirection ManufacturingKiosk running Windows 7/8Streamed (App-V) Citrix XenApp (Remote App) Office 365 Kiosk
Public Cloud Services MANUFACTURING Kiosk Office 365 SkyDrive Pro On-Premise Services CORPORATE Windows 7/8 EXECUTIVE Windows 7/8 Laptop, Mac, or Tablet COMMERCIAL Win Rt or iOS Windows- to-Go CONTRACTOR BYOD device, Windows-to-Go R&D Transient among devices SkyDrive SCCM 2012
Assessment & Roadmap Tactical Solutions Strategic Solutions Support Risk Assesment Microsoft Assessment and Planning (MAP) Toolkit Microsoft Deployment Toolkit (MDT) Security Compliance Manager (SCM) Infrastructure Planning and Design (IPD) Microsoft Operations Framework (MOF) Governance, Risk, & Compliance (GRC) Online ResourcesResources
Microsoft Consumerization resources are located at: http://www.microsoft.com/consumerization http://www.microsoft.com/consumerization
Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at www.2013mms.com. Upon submission you will receive instant notification if you have won a prize. Prize pickup is at the Information Desk located in Attendee Services in the Mandalay Bay Foyer. Entry details can be found on the MMS website.