Välkommen till Forefront Tour 2008!. Forefront Partners här idag.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

What is Infrastructure Optimisation and Why should you care?
Building an Optimized Infrastructure
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Microsoft’s Security Positioning towards Service
Microsoft Forefront Client Security
The Big Picture on Security Frank O’Keeffe Regional Information Security Manager Microsoft Corporation.
The future of Desktops Transform Your Desktop with Virtualization.
Bernhard van der Feen Product Solution Manager Security Microsoft.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
Mark Gibson Solution Specialist Microsoft. Microsoft Trustworthy Computing Addressing Security Threats with Microsoft Next Steps.
Information Security in Real Business
4/17/2017 7:22 AM ©2005 Microsoft Corporation. All rights reserved.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Norman Endpoint Protection Advanced security made easy.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security and Infrastructure Optimisation Security Considerations NameBarry Hughes TitleSenior Consultant - MCS Microsoft Corporation.
Patch Management Strategy
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
What is Infrastructure Optimization and Why do I Care?
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Unify and Simplify: Security Management
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
Market reaction to consumerization ““…pressure from users to support non IT-procured, or individual liable devices whilst still providing convenient.
Dell Connected Security Solutions Simplify & unify.
Optimising Desktop Deployment Windows Vista & 2007 Office System Jeff Alexander | Technology Advisor | Microsoft Australia.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Cliff Evans Security and Privacy Lead Microsoft Ltd.
Gary Gruba Dougald MacNaughton
Secure management of Infrastructure. IT Complexity And Cost.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Microsoft Management Seminar Series SMS 2003 Change Management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
The Infrastructure Optimization Journey NameTitleCompany.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Jeff Wettlaufer Sr. Technical Product Manager System Center SESSION CODE: MGT308 B T jeffwettlaufer E
LANDESK Competitive Update Andrew Brickell, Regional Sales Manager.
Nick Umney Lead Technology Specialist (Health & Education) Microsoft Ltd Infrastructure Optimisation in the NHS.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Self-service enrollment for Windows desktops
Cloud-First, Modern Windows Management and Security
Forefront Security ISA
Microsoft’s Security Strategy
Check Point Connectra NGX R60
Identity & Access Management
Building an Optimized Infrastructure
System Center Marketing
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

Välkommen till Forefront Tour 2008!

Forefront Partners här idag

Gartner gillar IAG2007! Magic Quadrant for SSL VPN 3Q07

Magic Quadrant for Endpoint Protection Platforms, 2007 * * Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook. Publication Date: 21 December 2007 / ID Number: G Gartner gillar Forefront Client Security

Michael Anderberg, CISSP Acting Chief Security Advisor Blog: Microsoft Sweden

Local Area Networks First PC virus Boot sector viruses Create notoriety or cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notoriety or cause havoc Faster propagation 32-bit Windows Broadband prevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows

Technology Process People IT is a strategic asset Users look to IT as a valued partner to enable new business initiatives IT Staff manages an efficient, controlled environment Users have the right tools, availability, and access to info IT Staff trained in best practices such as MOF, ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their own IT solutions Self-assessing and continuous improvement Easy, secure access to info from anywhere on Internet SLAs are linked to business objectives Clearly defined and enforced images, security, best practices Central Admin and configuration of security Standard desktop images defined, not adopted by all IT processes undefined Complexity due to localized processes and minimal central control Self provisioning and quarantine capable systems ensure compliance and high availability Automate identity and access management Automated system management Multiple directories for authentication Limited automated software distribution Patch status of desktops is unknown No unified directory for access mgmt BasicStandardizedRationalizedDynamic Improve IT Maturity while Gaining ROI $1320/PC Cost$580/PC Cost $230/PC Cost < $100/PC Cost

Public Policy Industry Partnerships Consumer Awareness Law Enforcement

Security Tools Education and Training Security Readiness

void function(char *p) {... char buff[16]; strcpy(buff,p);... } void func(char *b1, size_t c1, char *b2, size_t c2) { const size_t MAX = 48; if (c1 + c2 > MAX) return; char * pBuff = new char[MAX]; memcpy(pBuff,b1,c1); memcpy(pBuff+c1,b2,c2); } Does the code run by default? Does that code run with elevated rights? Does have a network socket? Is it written in C/C++? Is the code in any way related to Privacy? Is the code openly available for security researchers?

Design Threat Modeling Standards, best practices, and tools Security PushFinal Security Review RTM and Deployment Signoff Security Response Product Inception