6 Addressing Security Threats Helps turn IT into a business asset not a cost centerSupports your day to day security processesIs the Enabler to running your business successfullyTechnologyData privacy processes to manage data effectivelyIT security processes to implement, manage, and govern securityFinancial reporting processes that include security of the businessProcessLEAD: Addressing Security Threats is not just about the products that you use. Corporate IT Security has to be addressed from several perspectives.Addressing security threats should be done in three focus areas:<CLICK>First and most important is your company, the people in which you provide IT services. Everyone in your company should understand their role in securing your company’s assets. Providing them with safe computing practices and guidance on how to deal with SPAM or malware helps you in your job in securing your organization. Policy awareness is key. We are now seeing many companies include security policies in their company’s business conduct training. Helping key individuals know their extended role with industry or government compliance is important to meet compliance requirements and assist you in effectively govern your security compliance processes. Your IT staff should have the security skills and knowledge to deal with critical security issues and drive business continuity through escalations. The ability to manage critical situations should be a core competency in your IT management staff.Processes to manage your data asset and enforce privacy policies are instrumental to your larger Corporate Security Policy. These processes and policies is the tie between effective business management, personnel and security solutions.And finally, Technology. Technology should be a business enabler, helping you company get your products or services out to market faster and to help you differentiate your company against your competitors. As we look at the current security situation that is happening in the industry, a solid IT Security architecture is now a necessity that should be considered as a business asset instead of a cost center.How do you get there? Based on a study that we did with IDC in 2006, assessing your IT maturity is core to an IT business asset transformation. We took this data and developed a maturity model that includes security as a core component. This model is called Infrastructure Optimization.????? Customer QuestionsWhat areas do you think you are doing the best at addressing security threats?What areas need the most improvement?Company understands the importance of security in the workplaceIndividuals know their role with security governance and complianceIT staff has the security skills and knowledge to support your businessPeople
11 Protection (Infrastructure & Data) Edge, server and client protection“Point to Point” SolutionsSecurity of data at rest and in transitMobile workforceManageabilityCorporateOS Protection“Edge” ProtectionServer ProtectionLEAD: Protection of your business assets is core to sustaining your business productivity.Many customers have different point to point solutions that protect their network edge, their critical business application and their clients. No integrations, hard to configure and consolidated reporting a nightmare. The mobile workforce has constantly been a challenge to manage and protect. For many customers, full integration and combined management is only a dream.???? Customer QuestionsAre you seeing some of these same issues?Microsoft’s vision is to provide our business customers with suite of security products that are comprehensive to address the toughest security threats, integrated to support the overall management and is simplified to ease configuration and use.<CLICK>Microsoft Forefront is Microsoft’s branded family of comprehensive security products aimed at business customers.Forefront products easily integrate with each other, with an organization’s IT infrastructure (such as Active Directory, Systems Management Server, SQL Server, etc.), and can be supplemented through interoperable third-party solutions, enabling end-to-end, defense-in-depth security solutions. Simplified management, reporting, analysis, and deployment enable customers to more efficiently protect an organization’s information resources and secure access to applications and servers.The Forefront brand may be new, however the technology has been available for some time:ISA technology was first launched in 1996Whale technology first shipped in 1998The new Forefront Server Security products (prev. Antigen) will be v10Forefront Client Security is built on the same highly successful Microsoft protection technology already used in products such as Windows Live™ OneCare™, Windows® Defender and Microsoft Forefront Security for Exchange Server.Our consumer and small business security solutions are provided through Windows Live OneCare, which delivers all-in-one PC care with powerful protection and simple PC maintenance. The subscription service is available in 16 countries and the US for an annual subscription of $49.95 for up to three PCs. Available for PCs running Windows XP or Windows Vista, the comprehensive service offers consumers the following benefits:Better PC protection through integrated anti-virus, firewall and anti-spyware technologiesOptimized computer performance through automatic tune-upsIncreased data protection through backup and restore featuresContinuous updates to help protect your system from the latest threats through automatic service updatesImmediate access to new Windows Live OneCare functionality as we expand the service to meet evolving customer needsWhat products or services are you using today for your Edge Protection?……..Critical Business Server Application Protection?……..Client Protection?Has your organization tried any of our Forefront products?If YES, Which ones?
12 Market RecognitionLeader in Gartner Security Boundary Magic QuadrantVisionary in Gartner SSL VPN Magic QuadrantLeader in Gartner Security Boundary Magic QuadrantLeader in Forrester SSL VPN WaveVisionary in Gartner SSL VPN Magic QuadrantLeader in Forrester SSL VPN Wave
13 +SoftwareServicesOur strategy – S+S beats Software or Services alone.
20 Anti-virus Approaches InternetPotential Single Point of FailureVirusesWormsSpamISA ServerASMTP ServerASingle Vendor Single EngineASome enterprises take a single-vendor approach to virus scanning. This means they will have one vendor scan engine throughout their entire environment – at the gateway, on their mail servers, on their desktop. This is not a best-practices approach and leads to potential vulnerabilities. If that one antivirus lab happens to miss a virus or react slowly to a new outbreak, there is no other protection in the entire enterprise. This means the virus can gain entry via the gateway, infect mailboxes via the mail server, and infect desktops via the mail client. In short order the virus can infect wide portions of the enterprise.AAExchangeExchangeSharePointAAA
21 The Multiple Engine Advantage Response Time (hours)Forefront Set 1Forefront Set 2Forefront Set 3Vendor AVendor BVendor C04061.51.03.19.9184.108.40.206.63.50406 Spybot!04C223.00.029.939.00406 Nugache.a34.112.948.10506 Numuen.F10.315.00506 Numuen.H103.8251.9114.80506 Numuen.G3.2151.8469.0050687.5116.773.0129.3050612.11.822.532.90506 Rbot!E9051,141.8217.60606 Bagle.EG7.3060618.4060626.506066.42.50706503.80706 Feebs.EU52.3173.20706 Virut.A1,317.0AV lab response times were tested for 82 “In the Wild” viruses and variants that appeared from April- July 2006.Tested sets of five randomly chosen Forefront engines vs three single-engine vendorsResults26 viruses were proactively detected by all labs39 more detected by most labs or engine setsResults for remaining 17 viruses demonstrated the following….AV lab response times were tested for 82 “In the Wild” viruses and variants that appeared from April-July 2006.Tested sets of five randomly chosen Forefront engines vs three single-engine vendorsResults26 viruses were proactively detected by all labs39 more detected by most labs or engine setsResults for remaining 17 viruses demonstrated the following….> 24 hrs4 to 24 hrs< 4 hrs1AVTest.org, 20062121
22 Harnessing the Strength of Multiple Engines Forefront Server Security products integrate and ship with industry-leading antivirus scan engines fromEach scan job in a Forefront Server Security product can run up to five engines simultaneouslyInternal Messaging and Collaboration ServersForefront Server Security products combine the efficacy of a multi-layered defense with the ease of use and cost efficiencies of a single vendor solution. It does this by integrating multiple antivirus engines from top worldwide virus labs into a single product, and provides all updates from a single source. This multiple engine approach is available across all Forefront Server Security products.ABCDE