Secure Messaging Nick Hall & James Clifford Microsoft.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Unified. Simplified. Unified Communications Launch 2007.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Unified. Simplified. Unified Communications Launch 2007.
Module 5: Configuring Access for Remote Clients and Networks.
Headquarters Enterprise Messaging Initiative (HEMI)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Securing your data Security with Microsoft Infrastructure and Internet Explorer Matt Kestian Strategic Security Advisor | National Security Team | Microsoft.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Protection Through Software and Services James Hamilton General Manager Microsoft Corporation.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Srinivas L Technology Specialist – Security | Microsoft
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Introduction to Microsoft Forefront
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Module 6 Planning and Deploying Messaging Security.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Manuel Maina Product Marketing Manager - Microsoft Italia Milano, 11 febbraio 2010.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
User Experience Search in context; actionable results; user tax from multiple search interfaces, and logons; no unified search results; People and Information.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Module 11: Designing Security for Network Perimeters.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Unified. Simplified. Unified Communications Launch 2007.
Implementing Microsoft Exchange Online with Microsoft Office 365
Securing Against Malware Nick Hall and Fred Baumhardt Security Technology Architects Microsoft EMEA.
To, ENTERPRISE COMMUNICATION PROPOSAL Business communication over and mobile SUSSU Submitted by, netCORE Solutions Pvt Ltd 8th floor, Peninsula Towers,
Service Pack 2 System Center Configuration Manager 2007.
Microsoft IT Team & Enterprise Collaboration Kimberly Malone Group Program Manager Microsoft IT Collaboration Services.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Jane Dickson PacWest SMS&P General Manager Microsoft Corporation Washington Society of Association Executives.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing environment.
Office 365 is cloud-based productivity, hosted by Microsoft.
Secure Hyperconnectivity with TeamViewer and Windows technologies
Forefront Security ISA
Threat Management Gateway
Deriving more value from your Windows investment
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Cybersecurity Strategy
Re-defining the global workforce at Dion Global Pvt. Ltd.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Implementing Client Security on Windows 2000 and Windows XP Level 150
Using Software Restriction Policies
Security Insights: Secure Messaging
Presentation transcript:

Secure Messaging Nick Hall & James Clifford Microsoft

Our Story Begins….. Once upon a time there was a man name Bill Z…..

The Company 1000 Users 3 Locations 8Mb Internet Pipe from HQ, 2 Smaller Branches Windows 2003 Infrastructure Exchange 2003 LCS 2005 SharePoint 2003 Mainly Web based activity for Sales

Setup of IT Infrastructure - HQ Live Communications Server SharePoint Server Exchange & BES Servers Cisco Firewall SendMail VirusesWorms IM and Documents

Branch Offices Connection via WAN Link Exchange Server in each Branch BES Server Locally Unmanaged Clients

Users LaptopsBlackberries Tablet PC’s Desktops Internet Access (including Office Communicator) OWA

Threats / Issues Viruses & Worms Spam Performance of Internet Connection Management of Products Branches Machines Expensive WAN links

Viruses & Worms Receiving viruses but cannot review them Recently got hit by a virus through IM AV updates once a day

Spam Marketing teams being targeted Sales guys having problem IT guys get some but just delete Used to be 3 or 4 a day, now 12 to 20 a day Getting charged for Spam being sent to the Blackberries

Performance of Internet Connection Users say times to access common everyday websites is getting slower s taking a long time to be delivered Cannot increase the size of the pipe to the internet as have no money in networking budget

Management of Products Have too many products to manage, can’t do from one console. Complicates the update process of the scan engines

Branches Machines Poor WAN links, no local WSUS or SUS servers so updated manually AV updates not happening because taking too long to download across the links Slow performance for users

Expensive WAN Links Have old slow links which are expensive Have no money in networking budget to increase bandwidth

So What Can Microsoft Do ? Exchange Hosted Services (EHS) ISA Server Antigen

Exchange Hosted Services Internet Continuity Filtering Encryption Mail Flow Archiving Firewall End Users Server No onsite IT management Fastest response to threats Centralized control SMTP platform-agnostic

Remember…

caching Content filtering applicatio n publishing advanced application layer firewall caching content filtering application publishing advanced application layer firewall / vpn ISA Server

Antigen Solutions Live Communications Server SharePoint Server Exchange Servers ISA Server Windows SMTP Server VirusesWorms IM and Documents Antigen Antigen Antigen Antigen Antigen

Defence In Depth Multiple Scan Engines (up to 9) Multiple Scan Engines (up to 9) Eliminates single point of failure Eliminates single point of failure Reduces the window of opportunity Reduces the window of opportunity Scan Engine 1 Scan Engine 4 Scan Engine 2 Scan Engine 3 Quarantine

Remember…

Microsoft Proposed Setup Live Communications Server SharePoint Server Exchange & BES Servers ISA Server Exchange Front End Servers IM and Documents Antigen Antigen Antigen Antigen Exchange Hosted Services EHS

So What Did EHS Do ? Reduced viruses in environment by scanning “In The Cloud” Reduced Spam to almost zero Increased bandwidth on internet pipe Increased productivity of users Visibility of whose receiving what, when and how often

So What Did ISA Do ? Reduced number of potential viruses by implementing packet filtering at the gateway Secured Exchange by publishing OWA Implemented VPN’s from Main to Branch offices Implement BITS caching for software updates to Branch offices Internet experience improved through caching of websites Quarantine machines to a separate webserver for updates

So What Did Antigen Do ? Protected the LCS, Exchange and SharePoint products from viruses Consolidation of AV products and managed centrally Increased the number of scan engines used and therefore protection levels Produced reports on entire LCS, Exchange & SharePoint threats and mailed to management everyday Improved performance of all the servers due to the In Memory Scanning

Defense in Depth

Technical Summary Mail flow Firewall Internet Exchange Client MCP EHSISA

Important Dates Q1 06 Antigen V 9.0 for Exchange/SMTP & AEM – Beta Q2 06 EHS Launched Antigen V 9.0 for Exchange/SMTP & AEM Antigen for E12 – Beta Q3 06 Antigen V 9.0 for IM/SharePoint ISA 2006 Q4 06 Antigen for E12

Summary EHS can remove the majority of the threats in the cloud ISA can secure OWA with one domain login Antigen In-Memory Scanning can improve the performance & give defence in depth in one solution

Resources

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.