SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Security Technologies
Sebastian Vîjeu
Technology Evangelist
Microsoft România
Microsoft   10 nov 2010
Microsoft   10 nov 2010
•
•
•
•
Microsoft   10 nov 2010
Integrated Security
Platform : Active Directory, User Account Control (UAC), Direct
Access, Network Access Protection (NAP)
Information Protection
AD Rights Management Services (RMS),
Platform : EFS, Bitlocker
Identity and Access Management
Forefront Identity Manager 2010,
Threat Management Gateway(TMG), Unified Access Gateway (UAG)
Secure Messaging
Forefront Protection 2010 for
Exchange Server
Secure Endpoint
Forefront Client Security
Forefront Endpoint Protection,
Platform : Direct Access, NAP
Secure Collaboration
Forefront Protection 2010
for Sharepoint/OCS Server
• Simple interface
− Keep user
interactions
minimal and
high-level
− Provide necessary
interactions
• Admin-managed
options
− Control user
configurability
− Enforce central
policy
• Uses existing Configuration
Manager 2007
infrastructure
− No new servers
− Integrated console
− Supports SP2/R2 and later
• Simple install process
− Installs on root site, deploys
to hierarchy
− Discover Configuration
Manager roles and attach
FEP roles and context (or
allow separate installs)
− Automatically creates
additional components (FEP
distribution packages, DCM
baselines)
CentralSite
PrimarySite
PrimarySite
PrimarySite
FEP
Microsoft   10 nov 2010
•
•
•
•
•
•
•
•
•
•
•
•
•
Microsoft   10 nov 2010
Microsoft   10 nov 2010
18
Try the solutions at
www.Microsoft.com/forefront/
trial
Speak with a Microsoft
representative about
your needs
Deploy solutions
that empower your
business needs
http://www.microsoft.com/forefront/en/us/business-ready-security.aspx
http://www.microsoft.com/forefront/en/us/deployment.aspx
http://www.microsoft.com/forefront/en/us/case-studies.aspx
http://www.microsoft.com/services
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Más contenido relacionado

La actualidad más candente

Uniface Anywhere version 5
Uniface Anywhere version 5Uniface Anywhere version 5
Uniface Anywhere version 5Arjen van Vliet
 
Calling Connections, setting up Sametime (SUT Light) calls from Connections
Calling Connections, setting up Sametime (SUT Light) calls from ConnectionsCalling Connections, setting up Sametime (SUT Light) calls from Connections
Calling Connections, setting up Sametime (SUT Light) calls from ConnectionsLetsConnect
 
Calling Sametime, adding telephony to IBM Connections
Calling Sametime, adding telephony to IBM ConnectionsCalling Sametime, adding telephony to IBM Connections
Calling Sametime, adding telephony to IBM ConnectionsGert van Kempen
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8home
 
Milsoft dds overview
Milsoft dds overviewMilsoft dds overview
Milsoft dds overviewmilsoftSDC
 

La actualidad más candente (7)

Uniface Anywhere version 5
Uniface Anywhere version 5Uniface Anywhere version 5
Uniface Anywhere version 5
 
Calling Connections, setting up Sametime (SUT Light) calls from Connections
Calling Connections, setting up Sametime (SUT Light) calls from ConnectionsCalling Connections, setting up Sametime (SUT Light) calls from Connections
Calling Connections, setting up Sametime (SUT Light) calls from Connections
 
Calling Sametime, adding telephony to IBM Connections
Calling Sametime, adding telephony to IBM ConnectionsCalling Sametime, adding telephony to IBM Connections
Calling Sametime, adding telephony to IBM Connections
 
MinaSamirCV
MinaSamirCVMinaSamirCV
MinaSamirCV
 
Highlights
HighlightsHighlights
Highlights
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8
 
Milsoft dds overview
Milsoft dds overviewMilsoft dds overview
Milsoft dds overview
 

Destacado

Corghenci Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...
Corghenci  Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...Corghenci  Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...
Corghenci Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...DIB ULIM
 
PNDR - 31mart2011
PNDR - 31mart2011PNDR - 31mart2011
PNDR - 31mart2011Agora Group
 
Cec Bank_1 - 31mart2011
Cec Bank_1 - 31mart2011Cec Bank_1 - 31mart2011
Cec Bank_1 - 31mart2011Agora Group
 
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010Agora Group
 
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...DIB ULIM
 
"Cat costa PR-ul online?", by Bogdan Theodor Olteanu
"Cat costa PR-ul online?", by Bogdan Theodor Olteanu"Cat costa PR-ul online?", by Bogdan Theodor Olteanu
"Cat costa PR-ul online?", by Bogdan Theodor OlteanuBogdan Theodor Olteanu
 
Paperless Education 2010
Paperless Education 2010Paperless Education 2010
Paperless Education 2010Blanca Herrera
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 

Destacado (9)

Corghenci Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...
Corghenci  Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...Corghenci  Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...
Corghenci Ludmial - Servicii informaţionale-suport în sprijinul cercetării u...
 
PNDR - 31mart2011
PNDR - 31mart2011PNDR - 31mart2011
PNDR - 31mart2011
 
Cec Bank_1 - 31mart2011
Cec Bank_1 - 31mart2011Cec Bank_1 - 31mart2011
Cec Bank_1 - 31mart2011
 
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010
Noile tehnologii INTEL pentru infrastructuri IT eficiente-19mar2010
 
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...
Mosneaga Victoria - Instrumente Internet-marketing pentru atragerea utilizato...
 
"Cat costa PR-ul online?", by Bogdan Theodor Olteanu
"Cat costa PR-ul online?", by Bogdan Theodor Olteanu"Cat costa PR-ul online?", by Bogdan Theodor Olteanu
"Cat costa PR-ul online?", by Bogdan Theodor Olteanu
 
Paperless Education 2010
Paperless Education 2010Paperless Education 2010
Paperless Education 2010
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 

Similar a Microsoft 10 nov 2010

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesSam Bowne
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
Going Live: Live@EDU AT UGA
Going Live: Live@EDU AT UGAGoing Live: Live@EDU AT UGA
Going Live: Live@EDU AT UGALewis Noles
 
Muhammad Waqas - New cv-12-10-2016
Muhammad Waqas - New cv-12-10-2016Muhammad Waqas - New cv-12-10-2016
Muhammad Waqas - New cv-12-10-2016Muhammad Waqas
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Apache Knox - Hadoop Security Swiss Army Knife
Apache Knox - Hadoop Security Swiss Army KnifeApache Knox - Hadoop Security Swiss Army Knife
Apache Knox - Hadoop Security Swiss Army KnifeDataWorks Summit
 
Santosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?Tobias Koprowski
 
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3Marco Gralike
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and IdentityAPIsecure_ Official
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...WSO2
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiMustafa
 
New_Resume_Biswajit_Paul
New_Resume_Biswajit_PaulNew_Resume_Biswajit_Paul
New_Resume_Biswajit_PaulBiswajit Paul
 

Similar a Microsoft 10 nov 2010 (20)

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Going Live: Live@EDU AT UGA
Going Live: Live@EDU AT UGAGoing Live: Live@EDU AT UGA
Going Live: Live@EDU AT UGA
 
Muhammad Waqas - New cv-12-10-2016
Muhammad Waqas - New cv-12-10-2016Muhammad Waqas - New cv-12-10-2016
Muhammad Waqas - New cv-12-10-2016
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Résumé of sivakumar dravidamani
Résumé of sivakumar dravidamaniRésumé of sivakumar dravidamani
Résumé of sivakumar dravidamani
 
Apache Knox - Hadoop Security Swiss Army Knife
Apache Knox - Hadoop Security Swiss Army KnifeApache Knox - Hadoop Security Swiss Army Knife
Apache Knox - Hadoop Security Swiss Army Knife
 
Santosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - Resume
 
shan2016_ot_cv
shan2016_ot_cvshan2016_ot_cv
shan2016_ot_cv
 
Arif-Resume 8+
Arif-Resume 8+Arif-Resume 8+
Arif-Resume 8+
 
Gulf finance JD
Gulf finance JDGulf finance JD
Gulf finance JD
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
 
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
DeepakTaneja_SE
DeepakTaneja_SEDeepakTaneja_SE
DeepakTaneja_SE
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün Ailesi
 
New_Resume_Biswajit_Paul
New_Resume_Biswajit_PaulNew_Resume_Biswajit_Paul
New_Resume_Biswajit_Paul
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 
Raportul Cisco de securitate pentru anul 2014
Raportul Cisco de securitate pentru anul 2014Raportul Cisco de securitate pentru anul 2014
Raportul Cisco de securitate pentru anul 2014Agora Group
 
Sprint backlog specified by example
Sprint backlog specified by exampleSprint backlog specified by example
Sprint backlog specified by exampleAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 
Raportul Cisco de securitate pentru anul 2014
Raportul Cisco de securitate pentru anul 2014Raportul Cisco de securitate pentru anul 2014
Raportul Cisco de securitate pentru anul 2014
 
Sprint backlog specified by example
Sprint backlog specified by exampleSprint backlog specified by example
Sprint backlog specified by example
 

Microsoft 10 nov 2010

  • 6. Integrated Security Platform : Active Directory, User Account Control (UAC), Direct Access, Network Access Protection (NAP) Information Protection AD Rights Management Services (RMS), Platform : EFS, Bitlocker Identity and Access Management Forefront Identity Manager 2010, Threat Management Gateway(TMG), Unified Access Gateway (UAG) Secure Messaging Forefront Protection 2010 for Exchange Server Secure Endpoint Forefront Client Security Forefront Endpoint Protection, Platform : Direct Access, NAP Secure Collaboration Forefront Protection 2010 for Sharepoint/OCS Server
  • 7. • Simple interface − Keep user interactions minimal and high-level − Provide necessary interactions • Admin-managed options − Control user configurability − Enforce central policy
  • 8. • Uses existing Configuration Manager 2007 infrastructure − No new servers − Integrated console − Supports SP2/R2 and later • Simple install process − Installs on root site, deploys to hierarchy − Discover Configuration Manager roles and attach FEP roles and context (or allow separate installs) − Automatically creates additional components (FEP distribution packages, DCM baselines) CentralSite PrimarySite PrimarySite PrimarySite FEP
  • 16. 18
  • 17. Try the solutions at www.Microsoft.com/forefront/ trial Speak with a Microsoft representative about your needs Deploy solutions that empower your business needs http://www.microsoft.com/forefront/en/us/business-ready-security.aspx http://www.microsoft.com/forefront/en/us/deployment.aspx http://www.microsoft.com/forefront/en/us/case-studies.aspx http://www.microsoft.com/services
  • 18. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notas del editor

  1. 1/27/2015 6:30 PM