Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?

Slides:



Advertisements
Similar presentations
Consumer / personal data Individual work data Team / group work data Personal devices Data location SkyDrive Public cloud SkyDrive Pro SharePoint.
Advertisements

People Centric IT Unified Device Management with SCCM + Windows Intune
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
2 Agenda Introductions – Kathleen Wetherell Introduction of the Enterprise Mobility Suite– Kathleen Wetherell Overview of Microsoft’s Intune with Product.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Mobility is the new normal 52% of information workers across 17 countries report using three or more devices for work* 52% 90% of enterprises will have.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Empowering people-centric IT Mobile Device Management Access and information protection Desktop Virtualization Hybrid Identity.
Resource App Resource App Resource authorization server authorization endpoint token endpoint A A R.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Howard A. Carter III Senior Consultant Microsoft Consulting Services
Business Needs and IT Challenges How can IT maintain user productivity and protect against evolving threats How can IT reduce complexity and scale.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Microsoft Windows 8.1 Enterprise: A brief overview of Microsoft Windows 8 Enhancements. Welcome!
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Empowering people-centric IT Mobile Device Management Access and information protection Desktop Virtualization Hybrid Identity.
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is.
Windows Intune. The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Empowering people-centric IT Patrick Rogers May 29, 2014.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
Access resources in a federation partner organization.
Configuration Manager and InTune Gemeinsam oder einsam?
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ.
User and Device Management
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Windows Intune Cloud Based Management Speaker: Neil Phillips 13th August 2014.
Craig Pringle & Derek Moir
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Managing modern devices with System Center 2012 R2 Configuration Manager Niall Brady.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Today’s challenges Data Users Apps Devices
People-Centric Management
Microsoft Virtual Academy
Azure AD for the client management guy (or gal!)
Module 7: Access & Information Protection with Windows Server 2012 R2
Protect your OneDrive and SharePoint files on mobile devices
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
TechEd /9/2018 1:09 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
System Center Marketing
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Microsoft Virtual Academy
PCIT-B314 BYOD and WS2012R2 Adam Hall
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Presentation transcript:

Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?

Turn off your mobile. Thank you.

3 Today’s Challenges Deploying and managing applications across platforms is difficult. Apps Data Users need to be productive while maintaining compliance and reducing risk. Users expect to be able to work in any location and have access to all their work resources. Users The explosion of devices is eroding the standards-based approach to corporate IT. Devices

4 People-centric IT Apps Users Empower users Allow users to work on the devices of their choice and provide consistent access to corporate resources. Unify your environment Deliver a unified application and device management on- premises and in the cloud. Protect your data Help protect corporate information and manage risk. Management. Access. Protection. Data Devices

5 Consistent Company Portal experiences across devices Simplified registration and enrollment Automatic connection to internal resources Enable consumerization of IT without compromising compliance Empower Users

6 Empower Users Allow users to work the device of their choice and provide consistent access to corporate resources Users can work from anywhere on their devices with access to their corporate resources. Users can register devices for single sign-on and access to corporate data with Workplace Join. IT can publish access to resources with the web application proxy based on device awareness and the users identity. IT can provide seamless corporate access. Users can enroll devices for access to the company portal for easy access to corporate applications. IT can publish desktop virtualization resources for access to centralized resources. Firewall

7 Registering and Enrolling Devices IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the user’s identity.; multi-factor authentication can be used through Windows Azure Active Authentication (formerly PhoneFactor) Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud

8 Not JoinedWorkplace JoinedDomain Joined User provided devices are “unknown” and IT has no control. Partial access may be provided to corporate information. Registered devices are “known” and device authentication allows IT to provide conditional access to corporate information Domain joined computers are under the full control of IT and can be provided with complete access to corporate information Browser session single sign-on Seamless 2-Factor Auth for web apps Enterprise apps single sign-on Desktop Single Sign-On Expanded domain join capabilities

9 Users can sync their work data to their devices. Users can register their devices to be able to sync data when IT enforces conditional access IT can publish access directly through a reverse proxy, or conditional access can be enforced via device registration through the Web Application Proxy IT can configure a File Server to provide Work Folder sync shares for each user to store data that syncs to their devices, including integration with Rights Management IT can selectively wipe the corporate data from Windows 8.1 clients Active Directory discoverability provides users Work Folders location Devices Apps & Data User exclusive access Automated classification RMS protection Reporting on sensitive information Anti Virus protection Make corporate data available to users with Work Folders

10 Market-leading client management extended with cloud- based MDM Simplified, user-centric application management Comprehensive settings management across platforms Common identity across on-premises and in the cloud Enable consumerization of IT without compromising compliance Unify Your Environment

11 Unify Your Environment Deliver comprehensive application and device management Single admin console IT can manage the device and application lifecycle Unified infrastructure enables IT to manage devices “where they live” Comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles Users

12 Windows Intune integrated with System Center 2012 R2 Configuration Manager Mac OS X Windows PCs (x86/64, Intel SoC), Windows to Go Windows Embedded Windows RT, Windows Phone 8 iOS, Android

13 Mobile Device Settings in ConfigMgr 2012 R2 CategoryWin 8.1 PC & RTWP8iOSAndroid VPN Wi-Fi Certificates Password (*) (*) Device restrictions (*) (*) Store access Browsers (*) Content Rating Cloud Synch (*) Encryption (*) Security (*) Roaming (*) Windows Server Work Folders * Subset of settings Note: Table applicable to direct MDM and not EAS

14 Policy-based access control to corporate applications and data Increased security through multi-factor authentication Selective wipe of corporate apps and data to protect information Protect data Enable consumerization of IT without compromising compliance Protect Your Data

15 Protect Your Data Help protect corporate information and manage risk IT can publish resources using the web application proxy and create business-driven access policies with multi-factor authentication based on the content being accessed. IT can audit user access to information based on central audit policies. IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies. Centralized Data Users can access corporate data regardless of device or location with Work Folders for data sync and desktop virtualization for centralized applications. Desktop Virtualization Distributed Data Devices

16 Centrally manage access control and audit polices from Windows Server Active Directory. Automatically identify and classify data based on content. Classification applies as files are created or modified. Integration with Active Directory Rights Management Services provides automated encryption of documents. Central access and audit policies can be applied across multiple file servers, with near real-time classification and processing of new and modified documents. File classification, access policies and automated Rights Management works against client distributed data through Work Folders. Protect data with Dynamic Access Control

Dan’s Laws of Information Protection Data exists to be consumed Data will flow across data stores, devices, and orgs; it will flow from on-premise to the cloud and back. If data does is not let to flow, it is not being sufficiently used! Protection = Encryption + Policy Encryption alone is uninteresting and quite plentiful already. Policy, when associated with data, offers an extended reach not offered by the traditional perimeter. Protected data is consumed by more than humans It should be possible for protected data to be reasoned over by ‘authorized compute nodes’. Protection should exist in two measurable tiers Encryption is dissolved before anything useful is done. This is inevitable. PRE AUTHORIZATION protection must offer very robust protection against adversaries. POST AUTHORIZATION protection is need be as ‘transparent’ as possible in everyday use

Approaches to Protecting Information

What is new in Rights Management Services I can protect any file type I can consume protected files on important devices I can share with anyone and they can sign up for free I can share with any business user I can share with any individual (LiveID/GMAIL ID) I can keep my data on-premise (if the cloud scares me) I can control my RMS ‘tenant key’ from on-premise I am aware of what is going on with my protected data I can rely on MSFT + Partners for complete solutions

20 Consistent Company Portal experiences across devices Simplified registration and enrollment Automatic connection to internal resources Market-leading client management extended with cloud-based MDM Simplified, user-centric application management Comprehensive settings management across platforms Common identity across on-premises and in the cloud Policy-based access control to corporate applications and data Increased security through multi-factor authentication Selective wipe of corporate apps and data to protect information Protect data empower users unify your environment protect your data Enable consumerization of IT without compromising compliance People-centric IT Solution

Q&A.

22