SlideShare una empresa de Scribd logo
1 de 17
•
•
•
•




    Worldwide PC Market: 4Q11 Review,”












I want to
connect to
people and be
productive
anywhere,
anytime


                How can IT
                support and
                manage all
                those devices?
Choice of Windows PCs,           System Center manages desktops &            Exchange Active Sync for mobile          Best practices for LOB apps
Slates, Phones                   mobile                                      management
                                                                                                                      Microsoft IT “Garage”
TPM Chip on hardware             Direct Access saved $300,000 per facility   Unified Communications saved more than
                                 per year                                    U.S. $215 million annually
1 million+ devices on Corp Net
                                 Unified Access Gateway eases secure         5,000+ employees on My Site
                                 remote access
Data
Protection
The hub for identity across
cloud and on-premise
Microsoft Desktop Virtualization
The right solution for each business scenario
Data
Protection
Effective Access
                       Device                    Identity              Policy Applied              Policy Compliant

                 Services: Full Application Access, User-Centric
                                                  User Name
                                                                          Domain Join, Group
                 Where:Known
                         Anywhere with internet seamlessly OR Offline BitLocker and DirectAccess
                                        Physical Windows PC with TPM,
                                                   Password
                                                                          Policy, SCCM client
                                                                                                    SCCM, SCEP, NAP   Full Access
                 Data: HBI, MBI, LBI              CertificateVirtualation machine (VDI)
                                                    Desktop



                 Services: Limited local, Remoteconnected device
                                            EAS options
                                                  User Name
                 Where: Offline & Online
                                 Non-domain joined PC with Windows Intune Domain Join,
                                                                      EAS,
                        Known                      Password
                 Data: EAS – LBI or MBI/HBI with AD RMS of compliance Group Policy
                                     Domain joined PC out                                           Partial Access
                                             Certificate (Optional)
                 PCs – LBI-HBI with bitlocker & manage to compliance
         Trust




                 Services: Remote Desktop, Remote Apps, Web
                 Apps, Modern Gateway Phone, Android, iPad,
                    Windows, Windows          User Name
                       Unknown
                 Where: Online only iPhone     Password
                                                                       Remote Access
                 Data: Remote only, No local



                    Services: none                                                                                     Services and
                     Any Device
                    Where: CORP
                     Any Device
                      Unknown                  No Access                                                                  Device
                                                                                                                       Data Access
                    Data: none                                                                                           Examples
                                                                                                                        Examples


                                                                Access
MGT309 – Microsoft System Center 2012 Configuration Manager Overview
SIA206 – Keep Your Data Safe!
SIA207 – Windows Server 2012 Dynamic Access Control Overview
       –
       –

        –
        –
        –
        –



MGT11-HOL Introduction to Microsoft System Center 2012 Configuration Manager
SIA21-HOL Using Dynamic Access Control to Automatically and Centrally Secure Data in Windows Server 2012
http://edge.technet.com

http://www.Microsoft.com/consumerization
http://aka.ms/consumerIT
Enable consumerization-of-it

Más contenido relacionado

La actualidad más candente

Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 
A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaMicrosoft Singapore
 
Ms discovery days the new exchange - overview_dpa_juris smits
Ms discovery days the new exchange - overview_dpa_juris smitsMs discovery days the new exchange - overview_dpa_juris smits
Ms discovery days the new exchange - overview_dpa_juris smitsebuc
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Ericsson Labs
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...edirin aphunu
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0Peter de Haas
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...SocialBiz UserGroup
 

La actualidad más candente (12)

Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panorama
 
Ms discovery days the new exchange - overview_dpa_juris smits
Ms discovery days the new exchange - overview_dpa_juris smitsMs discovery days the new exchange - overview_dpa_juris smits
Ms discovery days the new exchange - overview_dpa_juris smits
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Web conferancing
Web conferancingWeb conferancing
Web conferancing
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
 
Designing Mobile Applications
Designing Mobile ApplicationsDesigning Mobile Applications
Designing Mobile Applications
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road ahead
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
 

Destacado

3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs GameDavid Tesar
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWDavid Tesar
 
building microservices
building microservicesbuilding microservices
building microservicesCisco DevNet
 
Microsoft & Internet of Things
Microsoft & Internet of ThingsMicrosoft & Internet of Things
Microsoft & Internet of ThingsMarlon Luz
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with AzureVinoth Rajagopalan
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTIlyas F ☁☁☁
 
DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDavid Tesar
 

Destacado (8)

3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTW
 
building microservices
building microservicesbuilding microservices
building microservices
 
Microsoft & Internet of Things
Microsoft & Internet of ThingsMicrosoft & Internet of Things
Microsoft & Internet of Things
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoT
 
DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container Service
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 

Similar a Enable consumerization-of-it

Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentMicrosoft Technet France
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec ConundrumVirtualTal
 
Machine Builders and InduSoft Webinar
Machine Builders and InduSoft WebinarMachine Builders and InduSoft Webinar
Machine Builders and InduSoft WebinarAVEVA
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarAVEVA
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinarSentri
 
InduSoft and Dream Report
InduSoft and Dream ReportInduSoft and Dream Report
InduSoft and Dream ReportAVEVA
 
VMware world news
VMware world newsVMware world news
VMware world newsASBIS SK
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarAVEVA
 
Food and Beverage Automation with InduSoft Web Studio
Food and Beverage Automation with InduSoft Web StudioFood and Beverage Automation with InduSoft Web Studio
Food and Beverage Automation with InduSoft Web StudioAVEVA
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 

Similar a Enable consumerization-of-it (20)

Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Machine Builders and InduSoft Webinar
Machine Builders and InduSoft WebinarMachine Builders and InduSoft Webinar
Machine Builders and InduSoft Webinar
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration Webinar
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinar
 
InduSoft and Dream Report
InduSoft and Dream ReportInduSoft and Dream Report
InduSoft and Dream Report
 
VMware world news
VMware world newsVMware world news
VMware world news
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring Webinar
 
Food and Beverage Automation with InduSoft Web Studio
Food and Beverage Automation with InduSoft Web StudioFood and Beverage Automation with InduSoft Web Studio
Food and Beverage Automation with InduSoft Web Studio
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Enable consumerization-of-it

  • 1.
  • 2. • • • • Worldwide PC Market: 4Q11 Review,”      
  • 3. I want to connect to people and be productive anywhere, anytime How can IT support and manage all those devices?
  • 4. Choice of Windows PCs, System Center manages desktops & Exchange Active Sync for mobile Best practices for LOB apps Slates, Phones mobile management Microsoft IT “Garage” TPM Chip on hardware Direct Access saved $300,000 per facility Unified Communications saved more than per year U.S. $215 million annually 1 million+ devices on Corp Net Unified Access Gateway eases secure 5,000+ employees on My Site remote access
  • 5.
  • 7. The hub for identity across cloud and on-premise
  • 8.
  • 9.
  • 10. Microsoft Desktop Virtualization The right solution for each business scenario
  • 11.
  • 13.
  • 14. Effective Access Device Identity Policy Applied Policy Compliant Services: Full Application Access, User-Centric User Name Domain Join, Group Where:Known Anywhere with internet seamlessly OR Offline BitLocker and DirectAccess Physical Windows PC with TPM, Password Policy, SCCM client SCCM, SCEP, NAP Full Access Data: HBI, MBI, LBI CertificateVirtualation machine (VDI) Desktop Services: Limited local, Remoteconnected device EAS options User Name Where: Offline & Online Non-domain joined PC with Windows Intune Domain Join, EAS, Known Password Data: EAS – LBI or MBI/HBI with AD RMS of compliance Group Policy Domain joined PC out Partial Access Certificate (Optional) PCs – LBI-HBI with bitlocker & manage to compliance Trust Services: Remote Desktop, Remote Apps, Web Apps, Modern Gateway Phone, Android, iPad, Windows, Windows User Name Unknown Where: Online only iPhone Password Remote Access Data: Remote only, No local Services: none Services and Any Device Where: CORP Any Device Unknown No Access Device Data Access Data: none Examples Examples Access
  • 15. MGT309 – Microsoft System Center 2012 Configuration Manager Overview SIA206 – Keep Your Data Safe! SIA207 – Windows Server 2012 Dynamic Access Control Overview – – – – – – MGT11-HOL Introduction to Microsoft System Center 2012 Configuration Manager SIA21-HOL Using Dynamic Access Control to Automatically and Centrally Secure Data in Windows Server 2012

Notas del editor

  1. Timing: 5 minutes Key Points:Technology is playing an increasingly important role in people’s personal lives, and these consumer technology experiences are spilling over into their professional lives: People expect to be able to use the same technology at work as they use at home. The enterprise can realize a number of benefits from the consumerization of IT trend with the right approach. The key is to strike a balance between user expectations and enterprise requirements for security, privacy, control, and compliance.There are four key areas where Microsoft can help you to embrace and make the most of the consumerization trend: Windows-based devices; Security and management; Productivity; Application development. Script:As technology plays an increasingly important role in people’s personal lives, it is having a profound effect on their expectations for and use of technology in their work lives. People have access to powerful and affordable PCs and laptops, they are using mobile devices more and more, they expect “always on” connectivity, and they’re connecting with each other in new ways using social networks. Ultimately, they have more choice, more options, and more flexibility in the technology they use every day, and as that technology spills over into their professional lives, the line between personal and professional is blurring. People want to be able to choose what technology they use at work, and they increasingly want to use that same technology in all aspects of their lives, not just at work. In fact, according to a study by Unisys (conducted by IDC), a full 95 percent of information workers use at least one self-purchased device at work. The study also found that information workers “report using an average of four consumer devices and multiple third-party applications, such as social networking sites, in the course of their day.” Somewhat worryingly, the Unisys-IDC study further revealed a discrepancy between what technology employees report using at work and what their employers believe they are using: for example, “69 percent of [information workers] say they can access non-work-related websites, while only 44 percent of their employers report this to be the case.”For IT, it’s about striking a balance between user expectations and enterprise requirements. Consumer technology without a doubt poses some risks to the business—such as to security, privacy, and compliance. However, there are also many benefits to the consumerization of IT trend that businesses can capitalize on with the right approach. People love their consumer technology because it makes it easier for them to connect with each other, access and share information, and collaborate. Those same benefits are there for the taking for businesses. To achieve the right balance—to minimize the risks and maximize the benefits—in some cases could mean embracing certain consumer technologies into the workplace and in others it could mean providing enterprise alternatives that will keep both users and regulators happy.I’d like to break today’s discussion down into four areas where Microsoft can help you make the most of the consumerization trend:Windows-based devices. As the devices continue to evolve and change so does the way that individuals interact with those devices. New scenarios are created at home and at work. The challenge for IT is to have the flexibility to evolve their scenarios to meet the needs of the way people interact with devices without compromising control and security. With a diverse range of devices based on the Windows platform, you can meet your enterprise requirements while delivering an experience that your people will love. Security and management. Our philosophy for our security and management platform is to help you manage this proliferation of devices with a single pane of glass, whether from management tools in your own infrastructure or from cloud services. Today we’ll look at the investments that we’re making to expand our management capabilities beyond Windows to the other platforms in use in your business to help you protect your enterprise.Productivity. We’re continually evolving our productivity platform to deliver the kinds of experiences that people want and to make it easier and more fun to work and collaborate from any location, on any device. The success of Microsoft® Office 2010 speaks for itself: it is the fastest-selling version of Office ever. Nearly 50 million people worldwide now use Office Web Apps. With the system of Office 2010 server products and cloud-based Office 365, we’re providing the best productivity experience on Windows and a best-in-class productivity experience on other devices, enabling the kind of social and connected experiences that people want based on their consumer experiences while delivering the security and privacy that you require in the enterprise.Application development. Application development is as important as ever. And as the industry moves to address this with next-generation applications, we are investing in tools that will simplify and enrich the developer experience within their familiar development environment. Additional Information:“Unisys Consumerization of IT Benchmark Study: Summary Survey Results,” Unisys, 2010, http://www.unisys.com/unisys/ri/pub/bl/detail.jsp?id=1120000970004010071“A history of Windows,” http://windows.microsoft.com/en-US/windows/history“IDC Forecasts Worldwide Smartphone Market to Grow by Nearly 50% in 2011,” IDC, March 29, 2011,http://www.idc.com/getdoc.jsp?containerId=prUS22762811“Office 2010: A record-breaking first year,” Office Blogs, June 15, 2011, http://blogs.office.com/b/office-exec/archive/2011/06/15/office-2010-record-breaking-first-year.aspx