CONFIDENTIAL TECHNOLOGY CENTRE IAPP FOR MICROSOFT EXCHANGE 2010 AND ANALYTICS.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
BIG-IP Link Controller
1© Copyright 2014 EMC Corporation. All rights reserved. Results Lower operating costs Expect savings of $500K over three years Foundation laid for Software-Defined.
We ensure collaboration through a unique Moneyball-style approach to team assembly Agile Team, Custom-Designed for You Works well together Fits seamlessly.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
<<replace with Customer Logo>>
F5 solution for Microsoft Exchange. 2 Exchange 2010 Architecture External SMTP servers Edge Transport Routing and AV/AS Phone system (PBX or VoIP) Client.
1 BIG-IP Global Traffic Manager Presented by: your name, your title.
F5 Solution for Microsoft Exchange 2010 James Hendergart Business Development Manager Helen Johnson Solution Engineer.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
F5 solution for Microsoft Exchange
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Unlock Your Data Rich connectivity Robust data integration Enterprise-class manageability Deliver Relevant Information Intuitive design environment.
Service Provisioning Service Provider Consulting Microsoft Consulting Services harvests the knowledge, experience, and tools established by designing and.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Net Optics Confidential and Proprietary Net Optics Launches Spyke Intelligent Access and Monitoring Architecture Solutions.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
TechNet Build’06 “The Secure Well Managed Infrastructure Tour”
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
By Isaac Parenteau. Agenda  What is the certification?  What are the courses required for it?  Future Careers  Cost?
Barracuda Load Balancer Server Availability and Scalability.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Everything the web administrator needs to know about MOM 2005 Chris Adams Program Manager IIS Product Unit Microsoft Corp.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Copyright 2014 Riverbed Inc. Confidential. 1 Kevin McGowan Principal Consultant September 10, 2015 Achieving Excellence in Managing the UC Lifecycle Riverbed.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web Application Firewall (WAF) RSA ® Conference 2013.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Zdenek Nejedly, Campus Services Rasim Duric, Lelio Fulgenzi, Deborah MacDougall, Networking Services Computing & Communications Services University of.
1 Microsoft Project Solution Offerings and the next chapter of EPM September 17th, 2003 Brendan Giles, PMP Systemgroup Management Services.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Jorke Odolphi Product Technology Specialist WebCentral Using Microsoft Operations Manager To Monitor And Maintain Your Farm.
SQL Server 2008 Analysis Services. END USER TOOLS & PERFORMANCE MANAGEMENT APPS Excel PerformancePoint Server BI PLATFORM SQL Server Reporting Services.
Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. For Internal Use Only SharePoint Insights (BETA)
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
F5’S INTELLIGENT SERVICES FRAMEWORK FOR MICROSOFT APPLICATIONS Gary Newe Field Engineering Manager - UKISA.
SIMPLIFY, SCALE, AND SECURE YOUR PCoIP ARCHITECTURE FOR VMWARE HORIZON VIEW WITH F5 Marc Chisinevski, F5 Solution Engineer, VMware Alliance.
FlexPod: Increasing Customer Value with Application Delivery Marcel Noyes Global Alliance Development
1 F5 BIG-IP and NetApp FlexPod F5 is a NetApp Advantage Alliace Partner with continuous engagement across teams in product management, product development,
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
FusionCube At-a-Glance. 1 Application Scenarios Enterprise Cloud Data Centers Desktop Cloud Database Application Acceleration Midrange Computer Substitution.
Barracuda Load Balancer
Hybrid Management and Security
Securing the Network Perimeter with ISA 2004
Simplified Development Toolkit
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Presentation transcript:

CONFIDENTIAL TECHNOLOGY CENTRE IAPP FOR MICROSOFT EXCHANGE 2010 AND ANALYTICS

2 CONFIDENTIAL © F5 Networks, Inc. Key Business Challenges for Application Delivery ComplexComplex Deployment timesDeployment times AvailabilityAvailability ComplianceCompliance VisibilityVisibility

3 CONFIDENTIAL © F5 Networks, Inc. V11: The iApp Revolution Optimizing the network for specific applications takes weeks … and can be frustratingOptimizing the network for specific applications takes weeks … and can be frustrating F5’s unique application deployment guides helped … now just daysF5’s unique application deployment guides helped … now just daysdeployment guidesdeployment guides F5’s new iApp capability reduces process to hours and minutes and it’s portable like virtual machinesF5’s new iApp capability reduces process to hours and minutes and it’s portable like virtual machines Framework to unify, simplify and control Application Delivery Services Application-centric Contextual view and advanced analytics Rapid and predictable deployment

4 CONFIDENTIAL © F5 Networks, Inc. Exchange 2010 iApp Includes: configuration worksheet, flow diagrams, troubleshooting guide Savings = 14 days to research (Exch) = days to research (F5) = 5 days to setup test environment (Exch) = 3 days to setup test environment (F5) = 30 days to test (Exch/F5) =2 days implementation (Exch/F5) Stats =75% reduction in documentation =96% reduction in steps =90% reduction in inputs Costs = 84% reduction in time to deploy = 90% reduction in misconfigurations

5 CONFIDENTIAL © F5 Networks, Inc. BIG-IP V10 Managing Objects & Services BIG-IP V11 Managing Application Services

6 CONFIDENTIAL © F5 Networks, Inc. Visibility - Analytics Stats Collected Server Latency Client-Side Latency Throughput Response Codes Methods URLs Client IPs Client Geographic User Agent User Sessions Views Virtual Server Pool Member Response Codes URL HTTP Methods Stats grouped by application Provides Business Intelligence ROI Reporting Capacity Planning Troubleshooting Performance v11

7 CONFIDENTIAL © F5 Networks, Inc. Demonstration Scenario - Service Provider Deploying Exchange for a new Customer Objectives: Use iApp to build Exchange Service in LondonUse iApp to build Exchange Service in London ‘ Test Outlook Web AccessTest Outlook Web Access Test Outlook clientTest Outlook clientAdditional AnalyticsAnalytics

8 CONFIDENTIAL © F5 Networks, Inc. Exchange 2010 Architecture

9 CONFIDENTIAL © F5 Networks, Inc. Client Access Server Array – F5 Benefits 50% High availability for all client services High availability for all client services Granular health monitors Granular health monitors Secures client communications Secures client communications Clientless proxy authentication Clientless proxy authentication Centralized mgmt of certificates Centralized mgmt of certificates Accelerates client communications Accelerates client communications Content compression Content compression TCP Express TCP Express Consolidated URL access Consolidated URL access iRules iRules iRules Resource offload (Memory, CPU & I/O) Resource offload (Memory, CPU & I/O)

10 CONFIDENTIAL © F5 Networks, Inc. London Exchange 2010 lon-owa.f5demo.local

11 CONFIDENTIAL © F5 Networks, Inc. Summary 50% iApp will reduce iApp will reduce Complexity and time to deploy Complexity and time to deploy Errors at deployment time Errors at deployment time Troubleshooting effort Troubleshooting effort Compliance Compliance Analytics Analytics Application performance Application performance and from the perspective of the customer and from the perspective of the customer Geography/latency/browser Geography/latency/browser Exchange server application is very popular deployment for F5 Exchange server application is very popular deployment for F5 F5 has solutions for more applications than competitors F5 has solutions for more applications than competitors

12 CONFIDENTIAL © F5 Networks, Inc. devcentral.f5.com facebook.com/f5networksinc linkedin.com/companies/f5-networks twitter.com/f5networks youtube.com/f5networksinc