Mark Gibson Solution Specialist Microsoft. Microsoft Trustworthy Computing Addressing Security Threats with Microsoft Next Steps.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
The System Center Family Microsoft. Mobile Device Manager 2008.
Microsoft Forefront Client Security
Ovidiu Pismac Account Technology Specialist MCSE Security, CISSP Microsoft Corporation.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Unified. Simplified. Unified Communications Launch 2007.
Secure Platform Data Protection Secure Access Malware Protection
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Module 3 Windows Server 2008 Branch Office Scenario.
Understanding Active Directory
Security and Policy Enforcement Mark Gibson Dave Northey
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Optimizing Business Operations Business Priorities Presentation.
Windows Optimized Desktop: Enhance Security & Control.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Srinivas L Technology Specialist – Security | Microsoft
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Wally Mead Senior Program Manager Microsoft Corporation.
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Clinic Security and Policy Enforcement in Windows Server 2008.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Välkommen till Forefront Tour 2008!. Forefront Partners här idag.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Steven Adler Enterprise Technology Strategist Microsoft EMEA.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Microsoft Forefront and System Center Driving to Dynamic IT with System Center and Forefront Eric Berg Director of Product Management Server & Tools.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Forefront Security ISA
Threat Management Gateway
Rights Management Services (RMS)
SharePoint Online Management and Control
Access and Information Protection Product Overview October 2013
TechEd /2/2018 5:42 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Microsoft Virtual Academy
Enabling the hybrid cloud with remote access appliances
2/27/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Virtual Academy
Microsoft Data Insights Summit
Using Software Restriction Policies
Microsoft Virtual Academy
Presentation transcript:

Mark Gibson Solution Specialist Microsoft

Microsoft Trustworthy Computing Addressing Security Threats with Microsoft Next Steps

Security Tools Education and Training Security Readiness

Design Threat Modeling Standards, best practices, and tools Security PushFinal Security Review RTM and Deployment Signoff Security Response Product Inception

Secure Platform Secure Access Data Protection Rights Management Services (RMS) SharePoint, Exchange, Windows Mobile integration Encrypting File System (EFS) Bitlocker Malware Protection User Account Control Network Access Protection (NAP) IPv6 IPsec Windows CardSpace Native smart card support GINA Re-architecture Certificate Services Credential roaming Security Development Lifecycle (SDL) Kernel Patch Protection Kernel-mode Driver Signing Secure Startup Windows Service Hardening Windows Defender IE Protected Mode Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP) Bi-directional Firewall Windows Security Center

Security Development Lifecycle (SDL) Windows Server Virtualization (Hypervisor) Role Management Tool OS File Integrity Secure Platform Network Protection Identity Access Data Protection Read-only Domain Controller (RODC) Active Directory Federation Srvcs. (ADFS) Administrative Role Separation PKI Management Console Online Certificate Status Protocol Network Access Protection (NAP) Server and Domain Isolation with IPsec End-to-end Network Authentication Windows Firewall With Advanced Security On By Default Rights Management Services (RMS) Full volume encryption (Bitlocker) USB Device-connection rules with Group Policy Improved Auditing Windows Server Backup

Technology Process People IT is a strategic asset Users look to IT as a valued partner to enable new business initiatives IT Staff manages an efficient, controlled environment Users have the right tools, availability, and access to info IT Staff trained in best practices such as MOF, ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their own IT solutions Self-assessing and continuous improvement Easy, secure access to info from anywhere on Internet SLAs are linked to business objectives Clearly defined and enforced images, security, best practices Central Admin and configuration of security Standard desktop images defined, not adopted by all IT processes undefined Complexity due to localized processes and minimal central control Self provisioning and quarantine capable systems ensure compliance and high availability Automate identity and access management Automated system management Multiple directories for authentication Limited automated software distribution Patch status of desktops is unknown No unified directory for access mgmt BasicStandardizedRationalizedDynamic Improve IT Maturity while Gaining ROI $1320/PC Cost$580/PC Cost $230/PC Cost < $100/PC Cost

Isolated Trusted Remediation Server Web Server Remote Access Gateway Infrastructure Servers Unmanaged Devices Malicious Users Trusted Home New Customer Unhealthy PC Secure Anywhere Access End-to-end security with IPv6 and IPsec Access driven by policy not topology Certificate based multi-factor authentication Health checks and remediation prior to access Policy-driven network access solutions Windows Firewall with advanced filtering Server and Domain Isolation Network Access Protection (NAP) ISA Server 2006 Intelligent Application Gateway (2007) Windows Filtering Platform

Authorization Manager RMS MIIS ADFS Domain/Directory Services Certificate Services Secure collaboration Easily managing multiple identities Government sponsored identities (eID) Hardware supported trust platform Disparate directories synchronization Centralized ID controls and mgmt. Embedded identity into applications Policy Governance / Compliance Role Based Permissions Identity and Data Privacy

Consumer/ Small Business Corporate Client Protection Server ProtectionEdge Protection Simple PC maintenance Anti-Virus Anti-Spyware Anti-Phishing Firewall Performance Tuning Backup and Restore Edge, server and client protection “Point to Point” Solutions Security of data at rest and in transit Mobile workforce Manageability

Optimized access for employees, partners, and customers from virtually any device or location Secure Remote Access Enhanced connectivity and security for remote sites and applications Branch Office Security Increased resiliency for IT infrastructure from Internet-based threats Internet Access Protection

Multiple scan engines at multiple layers throughout the corporate infrastructure provide maximum protection against and collaboration threats Advanced Protection Tight integration with Microsoft Exchange, Windows-based SMTP, SharePoint and Office Communications Servers maximizes availability and management control Availability and Control Ensures organizations can eliminate inappropriate language and dangerous attachments from internal and external communications Secure Content

Unified malware protection for business desktops, laptops, and server operating systems that is easy to manage and control One spyware and virus protection solution Built on protection technology based Effective threat response Unified Protection One simplified security administration console Define one policy to manage client protection agent settings Integrates with your existing infrastructure Simplified Adminis- tration One dashboard for visibility into threats and vulnerabilities View insightful reports Stay informed with state assessment scans and security alerts Visibility and Control

Client and Server Operating System Server Applications Edge Microsoft Forefront provides greater protection and control over the security of your business’ network infrastructure

Management System System Center, Active Directory GPO Forefront Edge and Server Security, NAP Perimeter Network Access Protection, IPSec Internal Network Forefront Client Security, Exchange MSFP Device SDL process, IIS, Visual Studio, and.NET Application BitLocker, EFS, RMS, SharePoint, SQL Data User Active Directory and Identity Lifecycle Mgr Poor integration across the platform “Point to Point” Solutions Standards Adoption Compliance Reporting Manageability

Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Services Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge

ISA Server SP1 planned for 1 st half 2008 Forefront “Unified Access Gateway” planned for 1 st half CY2009 Forefront “Threat Management Gateway” planned for 1 st half CY2009 A subset of “Threat Management Gateway” features will ship as part of “Centro” Subset of “TMG” shipped in Windows Server Code Name “Centro”Subset of “TMG” shipped in Windows Server Code Name “Centro” Forefront “Unified Access Gateway” ISA Server 2006 SP1 Forefront “Threat Management Gateway” Forefront Code Name “Stirling”

Partner with your Microsoft Account Team to create or review your Security Action Plan Talk about Infrastructure Optimization and the value it could bring to your organization Implement a Defense-in-Depth security architecture using our advanced security technologies Leverage Microsoft prescriptive security guidance and online security training Stay informed through Microsoft Security Bulletins, Security Newsletters and Security Events

Microsoft Security Home Page: Microsoft Trustworthy Computing: Microsoft Forefront: Infrastructure Optimization: Microsoft Security Assessment Tool: General Information: Microsoft Live Safety Center: safety.live.comsafety.live.com Microsoft Security Response Center: Security Development Lifecycle: msdn.microsoft.com/security/sdlmsdn.microsoft.com/security/sdl Get the Facts on Windows and Linux: Anti-Malware: Microsoft OneCare Live: beta.windowsonecare.combeta.windowsonecare.com Microsoft Defender: Spyware Criteria: Guidance Centers: Security Guidance Centers: Security Guidance for IT Professionals: The Microsoft Security Developer Center: msdn.microsoft.com/securitymsdn.microsoft.com/security The Security at Home Consumer Site:

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.