SlideShare una empresa de Scribd logo
1 de 130
Platform Security Briefing Ramnish Singh PMP, CISSP, Microsoft Certified Architect (Infrastructure) MCITP (Windows 2008),MCTS (Windows Server,Vista, Exchange), MCSE (Windows 2003, 2000, NT), MCT Cisco Certified Design Professional, Cisco Certified Network Professional, Sun CSA IT Advisor |  Microsoft Corporation Blog Address (optional) | Email (optional)
Security Versus Access Demand for access Escalating threats 23 million branch offices WW(IDC, 2006) 3.6 billion mobile users WW by 2010 (Infonetics, 2007) 85% of companies will have WLANs by 2010 (Infonetics, 2006) 8x increase in phishing sites in past year (AWG, 2006) One message-based Trojan attack per day in 2006 vs. one per week in 2005 (Message Labs, 2006) Strong indication of increase in profit-motivated attacks (Multiple sources)
Evolving Threat Landscape Local Area Networks First PC virus Boot sector viruses Create notorietyor cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notorietyor cause havoc Faster propagation 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows Broadbandprevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows 1986–1995 1995–2000 2000–2005 2007
National Interest Personal Gain Personal Fame Curiosity Largest segment by $ spent on defense Spy Largest area by $ lost Fastest  growing  segment Thief Largest area by volume Trespasser Author Vandal Undergraduate Script-Kiddy Expert Specialist Evolving Threats
1st known hack... The need for security in communication networks is not new. In the late nineteenth century an American undertaker named AlmonStrowger discovered that he was losing business to his rivals because telephone operators, responsible for the manual connection of call requests, were unfairly diverting calls from the newly bereaved to his competitors. Strowger developed switching systems that led to the introduction of the first automated telephone exchanges in 1897. This enabled users to make their own connections using rotary dialling to signal the required destination. AlmonStrowger
Addressing Security Threats Helps turn IT into a business asset not a cost center  Supports your day to day security processes  Is the Enabler to running your business successfully Technology Data privacy processes to manage data effectively IT security processes to implement, manage, and govern security Financial reporting processes that include security of the business Process Company understands the importance of security in the workplace Individuals know their role with security governance and compliance IT staff has the security skills and knowledge to support your business  People
Microsoft’s Promises To You Manage Complexity, Achieve Agility Amplifythe Impactof YourPeople ProtectInformation,ControlAccess Advance the Businesswith IT Solutions
Delivering On The Promise:Infrastructure Optimization *Source: Microsoft CSO Summit 2007 Registration Survey
Core Infrastructure Optimization More Efficient Cost Center Cost Center  Strategic Asset Business Enabler Basic No centralized enterprise directory No automated patch management Anti-malwarenot centrally managed Message security for e-mail only No secure coding practices in place Standardized Using enterprise directory for authentication Automated patch management tools deployed Anti-malwareis managed centrally Unified message security in place Rationalized Integrated directory services, PKIin place Formal patch management process Defense in depth threat protection Security extended to remote and mobile workforce Dynamic Full identity lifecycle management.ID Federation,Rights Mgt Services in use Metrics driven update process Client quarantine and access policy enforcement $1320/PC Cost $580/PC Cost $230/PC Cost Source:GCR and IDC data analyzed by Microsoft, 2006
Core Infrastructure Optimization Model:  Security Basic Standardized Rationalized Dynamic Technology Self provisioning and quarantine capable systems ensure compliance and high availability  Automate identity and access management Automatedsystem management  Multiple directories for authentication Limited automated software distribution Patch statusof desktopsis unknown No unified directory for access mgmt Self-assessing and continuous improvement Easy, secure access to info from anywhereon Internet SLAs are linkedto business objectives Clearly defined and enforced images, security, best practices CentralAdmin and configurationof security Standard desktop images defined,not adopted by all IT processes undefined Complexity dueto localized processesand minimal central control Process Improve IT Maturity while Gaining ROI IT is astrategic asset Users look to ITas a valued partner to enable new business initiatives IT Staff manages an efficient,controlled environment Users have the right tools,availability, and access to info IT Staff trained in best practices such as MOF,ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their ownIT solutions People
SC information system  = {(confidentiality, impact), (integrity, impact), (availability, impact)} where the acceptable values for potential impact are low, moderate, or high.
Trustworthy Computing
Microsoft Security Strategy
LawEnforcement Public Policy VIA GIAIS Microsoft Security Strategy IndustryPartnerships ConsumerAwareness
Microsoft SecurityAssessment Toolkit SecurityTools Microsoft Windows VistaSecurity Whitepapers SecurityReadiness Educationand Training Microsoft SecurityIntelligence Report Learning Paths forSecurity Professionals www.microsoft.com/technet/security Microsoft Security Strategy
Security Development Lifecycle Design Threat Modeling Standards, best practices, and tools Security Push Final Security Review  RTM and Deployment Signoff Security Response Product Inception
Priority #1 - Platform Security Security Development Lifecycle Security Response Center Better Updates And Tools
Comprehensive Security Portfolio Services Edge Encrypting File System (EFS) Server Applications BitLocker™ Information  Protection Network Access Protection (NAP) Client and Server OS IdentityManagement Windows CardSpace SystemsManagement Active Directory Federation Services (ADFS) Guidance Developer Tools
Security Development Lifecycle (SDL) Kernel Patch Protection Kernel-mode Driver Signing Secure Startup Windows Service Hardening Secure  Platform Rights Management Services (RMS)  SharePoint, Exchange, Windows Mobile integration Encrypting File System (EFS) Bitlocker Secure  Access User Account Control Network Access Protection (NAP) IPv6 IPsec Windows CardSpace Native smart card support GINA Re-architecture Certificate Services Credential roaming Windows Defender IE Protected Mode Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP)  Bi-directional Firewall Windows Security Center Data  Protection Malware Protection
Windows Vista SP1 includes Additional Kernel Patch Protection APIs Enhanced Windows Security Center reporting Expanded BitLocker Drive Encryption (BDE)  Additional multifactor authentication methods
Security Development Lifecycle (SDL) Windows Server Virtualization (Hypervisor) Role Management Tool OS File Integrity Secure  Platform Network  Protection Network Access Protection (NAP) Server and Domain Isolation with IPsec End-to-end Network Authentication Windows Firewall With Advanced Security  On By Default Identity Access Rights Management Services (RMS)  Full volume encryption (Bitlocker) USB Device-connection rules with Group Policy Improved Auditing Windows Server Backup Data  Protection Read-only Domain Controller (RODC) Active Directory Federation Srvcs. (ADFS) Administrative Role Separation PKI Management Console Online CertificateStatus Protocol
Secure  Platform Surface Area Configuration tool Password Policy Enforcement; Granular Roles Built in Encryption;Key Mgmt. Auditing – Data Definition Language (DDL) Advanced Spam and Virus Defenses Compliance Business Continuity Trust Center New Document Security Model Open XML File Formats Rich Authentication GranularAccess Control Complianceand Auditing  Hierarchical Encryption Document Inspector Information Rights Management Strong Encryption,Digital Signatures Suite-B:  For U.S. Government  Data  Protection Platform Security Progress Essential Security and Mobile Device Mgmt Built-in Protection with Business Continuity Compliance Support EnhancedMessage Filtering
Security Threat Landscape Evolution Microsoft Security Strategy Engineering Excellence Security Development Lifecycle Engineering Excellence Security Development Lifecycle
Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers Network Security Secure Anywhere Access End-to-end security with IPv6 and IPsec Access driven by policy not topology Certificate based multi-factor authentication Health checks and remediation prior to access Policy-driven network access solutions Windows Firewall with advanced filtering Server and Domain Isolation Network Access Protection (NAP) ISA Server 2006 Intelligent Application Gateway (2007) Windows Filtering Platform
Identity and Access Management Your COMPANYandyour EMPLOYEES Secure and seamlesscross-organizational collaboration Easily managing multiple identities Government sponsored identities (eID) Hardware supported trust platform Disparate directories synchronization Centralized ID controls and mgmt. Embedded identity into applications Policy Governance / Compliance Role Based Permissions Identity and Data Privacy Identity Lifecycle Manager 2007 Active Directory Federation Services Active Directory Lightweight Directory Services Windows Certificate Services  Windows CardSpace™
Edge, server and client protection “Point to Point” Solutions Security of data at rest and in transit Mobile workforce Manageability Corporate Client Protection Server Protection  Consumer/ Small Business Simple PC maintenance Anti-Virus  Anti-Spyware Anti-Phishing Firewall Performance Tuning Backup and Restore Edge Protection  Protection
Interoperability Industry Standards Web Services (WS-*) Open document format (XPS) OpenID Partner Products Network Access Protection EV Certificate support in IE7  Windows CardSpace Windows Security Center Industry Partnerships SecureIT Alliance Microsoft SecurityResponse Alliance  Interop Vendor Alliance
Security Stack Interoperability Integrated security eases defense in depth architecture deployment Adoption of open standards allows cross platform integration Management System System Center, Active Directory GPO Data BitLocker, EFS, RMS, SharePoint, SQL User Active Directory and Identity Lifecycle Mgr Application SDL process, IIS, Visual Studio, and .NET Device Forefront Client Security, Exchange MSFP Internal Network Network Access Protection, IPSec Perimeter Forefront Edge and Server Security, NAP
Management Systems Integration
Engineering Excellence Security Development Lifecycle Microsoft Security Strategy
Some hard questions… Who Why What When Where How
The lighter side
And the press is doing its bit...
User Experience Application Platform Optimization Model Development BASIC ADVANCED DYNAMIC STANDARDIZED Infrastructure Optimization SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process Enterprise Content Management BASIC RATIONALIZED DYNAMIC STANDARDIZED Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC RATIONALIZED DYNAMIC STANDARDIZED Security and Networking Data Protection and Recovery
Infrastructure OptimizationBuilding a People-Ready Business Model-Based Approach User Experience ,[object Object]
Establishes a foundation based on industry analyst, academic, and consortium research
Provides guidance and best practices for step-by-step implementation
Drives cost reduction, security and efficiency gains
Enables agilityApplication Platform Optimization Model STANDARDIZED BASIC ADVANCED DYNAMIC Development SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process STANDARDIZED BASIC DYNAMIC RATIONALIZED Enterprise Content Management Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC STANDARDIZED DYNAMIC RATIONALIZED Security and Networking Data Protection and Recovery
Core Infrastructure Optimization Policy and Compliance Risk Assessment User Awareness Basic Standardized Rationalized Dynamic Identity and Access Management Patch Management Threat and Vulnerability Mitigation Secure Messaging and Collaboration Secure Application Architecture Legacy Platform Migration
Solutions Benefits Costs Challenges Two Factor Authentication Secure Remote User Basic to Standardized Enforce Strong Passwords Secure Wireless Access Network Intrusion Detection Optimizing SecurityMoving from Basic to Standardized Developer-focused environment Sophisticated and targeted threats Executive sponsorship Awareness campaign Cultural shift to awareness Able to mitigate current high priority risk Labor intensive to maintain Defense in Depth
Solutions Benefits Costs Challenges Standardized to Rationalized Network Segmentation Identity & Access Mgmt 2FA: Elevated Access Accts Security Event Monitoring Certificate Provisioning & Renewals Vulnerability Assessments SDL IT Optimizing SecurityMoving from Standardized to Rationalized Evolving and faster threats Ownership largely resided with Security Risk management framework Service manager accountability Accountability closer to business Environmental awareness Improved response Lack of integration between service managers and business Defense in Depth Automate
Solutions Benefits Costs Challenges Network Access Protection Rationalized to Dynamic Strong User Authentication User Account Control Bitlocker Drive Encryption Optimizing SecurityMoving from Rationalized to Dynamic Security viewed as a tax to the business Information security governance Information security becomes a strategic asset Culture shift may cause friction Defense in Depth
Application Security Authentication Intrusion Detection/Prevention Identity & Access Management Network Firewalls NAC Wireless Email Unified Threat Management Secure Remote Access Antimalware SIMs Mobile Data Security Vulnerability Management Web Security Gateways
People Mobile Mobile Office Task Office Contract Task Home Contract Offshore Home
Separation Creates Flexibility Data, User Settings Applications OS Hardware Dependencies Create Complexity
Mobile
Microsoft Enterprise Desktop  Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues Mobile Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
Mobile Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Mobile Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Group Policy and AGPM  Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Mobile Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM  Data Backup OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Mobile Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM  Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Office
Microsoft Enterprise Desktop  Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues Office Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
Office Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Office Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Office Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM  Data Backup OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Office Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM  Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Task
Microsoft Enterprise Desktop  Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues Task Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
Task Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Task Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Group Policy and AGPM  Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Task Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM  Data Backup OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Task Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM  Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Contract / Offshore
Microsoft Enterprise Desktop  Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues Contract / Offshore Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
Bi-Directional Firewall, Defender, Malicious Software Removal Tool Network Location Protection Bitlocker Drive Encryption Security Center & UAC OS Microsoft Enterprise Desktop  Virtualization (MED-V) Contract / Offshore Worker OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Contract / Offshore Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Contract / Offshore Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM  Data Backup OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Contract / Offshore Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM  Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Home
Microsoft Enterprise Desktop  Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues Home Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
Home Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Home Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Home Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM  Data Backup OS Application (APP-V) & Enterprise Desktop    (MED-V) Virtualization  Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Home Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM  Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
7 Tips for Secure Client Computing Protect your personal information. It’s valuable Know who you’re dealing with Use anti-virus and firewall and update both regularly Setup your OS and Web Browser properly and update both regularly Protect your password Backup important files Learn who to contact if something goes wrong
Technology Internet Intranet Web Server Exchange External Web Server User BRANCH OFFICE DMZ CSS Internal Network Internet SharePoint Active Directory HEAD QUARTERS User Customer
Technology – Another View Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers
OSI Model Application Presentation Session Transport Network Media layers Host layers Data Link Physical
Head Office
Head Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL Application (APP-V) Virtualization  Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS         Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Head Office (Host Layer) Application Presentation Session Transport Web         Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office
Branch Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL Application (APP-V) Virtualization  Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS         Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Branch Office (Host Layer) Application Presentation Session Transport Web         Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
IntranetExtranet
Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM  CTRL + ALT + DEL Application (APP-V) Virtualization  Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS         Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Intranet/Extranet (Host Layer) Application Presentation Session Transport Web         Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop  Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience  IT Benefits  Protection of the local data Easy to migrate user Mitigation of application compatibility issues
Remote Access
Wired Access ADSL / Cable Power Line Dial-in / ISDN  Fiber Optic
Wireless Access WiFi GPRS / UMTS / HSPA / LTE Wireless USB Bluetooth WiMAX Satellite
Securing Wireless… Internet Wired Enterprise Network
VPN security models
Direct Access Microsoft  Solution Situation Today Direct Access Office Home Home Office ,[object Object]
Seamless access to network resources increases productivity of mobile users
Infrastructure investments also make it easier to service mobile PCs and distribute updates and polices
Difficult for users to access corporate resources from outside the office
Challenging for IT to manage, update, patch mobile PCs while disconnected from company network,[object Object]
Process Application Security  Cryptography Access Control  Business Continuity & Disaster Recovery Information Security and Risk Management  Operations Security  Physical (Environmental) Security  Security Architecture and Design  Telecommunications and Network Security  Legal, Regulations, Compliance & Investigations
Access Control
Application Security
Business Continuity Business Continuity Planning Lifecycle
Disaster Recovery
Cryptography Symmetric-key  Asymmetric-key
Information Security Administrative  Logical  Physical
Risk Management Risk avoidance Risk reduction Risk retention Risk transfer

Más contenido relacionado

La actualidad más candente

Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data securitySaranSwathi1
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicNetmagic Solutions Pvt. Ltd.
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterMicrosoft Österreich
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information SecurityHatem ElSahhar
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsMicrosoft Österreich
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
The_CNPITH_STORY_V1.2(draft)
The_CNPITH_STORY_V1.2(draft)The_CNPITH_STORY_V1.2(draft)
The_CNPITH_STORY_V1.2(draft)David Simpson
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 

La actualidad más candente (20)

Content Aware SIEM™ defined
Content Aware SIEM™ definedContent Aware SIEM™ defined
Content Aware SIEM™ defined
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information Security
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
The_CNPITH_STORY_V1.2(draft)
The_CNPITH_STORY_V1.2(draft)The_CNPITH_STORY_V1.2(draft)
The_CNPITH_STORY_V1.2(draft)
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 

Destacado

Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...
Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...
Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...Thiago Pinto
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingIJTET Journal
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 

Destacado (6)

Event security brief
Event security briefEvent security brief
Event security brief
 
Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...
Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...
Security Briefing & Emergency Response for RIO's Olympics Games 2016 - Linked...
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud Computing
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Theme Park
Theme ParkTheme Park
Theme Park
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 

Similar a Ramnish Singh Platform Security Briefing

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...David J Rosenthal
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxInfosectrain3
 

Similar a Ramnish Singh Platform Security Briefing (20)

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Information Security
Information SecurityInformation Security
Information Security
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 

Último

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Ramnish Singh Platform Security Briefing

  • 1. Platform Security Briefing Ramnish Singh PMP, CISSP, Microsoft Certified Architect (Infrastructure) MCITP (Windows 2008),MCTS (Windows Server,Vista, Exchange), MCSE (Windows 2003, 2000, NT), MCT Cisco Certified Design Professional, Cisco Certified Network Professional, Sun CSA IT Advisor | Microsoft Corporation Blog Address (optional) | Email (optional)
  • 2.
  • 3.
  • 4. Security Versus Access Demand for access Escalating threats 23 million branch offices WW(IDC, 2006) 3.6 billion mobile users WW by 2010 (Infonetics, 2007) 85% of companies will have WLANs by 2010 (Infonetics, 2006) 8x increase in phishing sites in past year (AWG, 2006) One message-based Trojan attack per day in 2006 vs. one per week in 2005 (Message Labs, 2006) Strong indication of increase in profit-motivated attacks (Multiple sources)
  • 5. Evolving Threat Landscape Local Area Networks First PC virus Boot sector viruses Create notorietyor cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notorietyor cause havoc Faster propagation 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows Broadbandprevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows 1986–1995 1995–2000 2000–2005 2007
  • 6. National Interest Personal Gain Personal Fame Curiosity Largest segment by $ spent on defense Spy Largest area by $ lost Fastest growing segment Thief Largest area by volume Trespasser Author Vandal Undergraduate Script-Kiddy Expert Specialist Evolving Threats
  • 7. 1st known hack... The need for security in communication networks is not new. In the late nineteenth century an American undertaker named AlmonStrowger discovered that he was losing business to his rivals because telephone operators, responsible for the manual connection of call requests, were unfairly diverting calls from the newly bereaved to his competitors. Strowger developed switching systems that led to the introduction of the first automated telephone exchanges in 1897. This enabled users to make their own connections using rotary dialling to signal the required destination. AlmonStrowger
  • 8. Addressing Security Threats Helps turn IT into a business asset not a cost center Supports your day to day security processes Is the Enabler to running your business successfully Technology Data privacy processes to manage data effectively IT security processes to implement, manage, and govern security Financial reporting processes that include security of the business Process Company understands the importance of security in the workplace Individuals know their role with security governance and compliance IT staff has the security skills and knowledge to support your business People
  • 9. Microsoft’s Promises To You Manage Complexity, Achieve Agility Amplifythe Impactof YourPeople ProtectInformation,ControlAccess Advance the Businesswith IT Solutions
  • 10. Delivering On The Promise:Infrastructure Optimization *Source: Microsoft CSO Summit 2007 Registration Survey
  • 11. Core Infrastructure Optimization More Efficient Cost Center Cost Center Strategic Asset Business Enabler Basic No centralized enterprise directory No automated patch management Anti-malwarenot centrally managed Message security for e-mail only No secure coding practices in place Standardized Using enterprise directory for authentication Automated patch management tools deployed Anti-malwareis managed centrally Unified message security in place Rationalized Integrated directory services, PKIin place Formal patch management process Defense in depth threat protection Security extended to remote and mobile workforce Dynamic Full identity lifecycle management.ID Federation,Rights Mgt Services in use Metrics driven update process Client quarantine and access policy enforcement $1320/PC Cost $580/PC Cost $230/PC Cost Source:GCR and IDC data analyzed by Microsoft, 2006
  • 12. Core Infrastructure Optimization Model: Security Basic Standardized Rationalized Dynamic Technology Self provisioning and quarantine capable systems ensure compliance and high availability Automate identity and access management Automatedsystem management Multiple directories for authentication Limited automated software distribution Patch statusof desktopsis unknown No unified directory for access mgmt Self-assessing and continuous improvement Easy, secure access to info from anywhereon Internet SLAs are linkedto business objectives Clearly defined and enforced images, security, best practices CentralAdmin and configurationof security Standard desktop images defined,not adopted by all IT processes undefined Complexity dueto localized processesand minimal central control Process Improve IT Maturity while Gaining ROI IT is astrategic asset Users look to ITas a valued partner to enable new business initiatives IT Staff manages an efficient,controlled environment Users have the right tools,availability, and access to info IT Staff trained in best practices such as MOF,ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their ownIT solutions People
  • 13. SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)} where the acceptable values for potential impact are low, moderate, or high.
  • 16. LawEnforcement Public Policy VIA GIAIS Microsoft Security Strategy IndustryPartnerships ConsumerAwareness
  • 17. Microsoft SecurityAssessment Toolkit SecurityTools Microsoft Windows VistaSecurity Whitepapers SecurityReadiness Educationand Training Microsoft SecurityIntelligence Report Learning Paths forSecurity Professionals www.microsoft.com/technet/security Microsoft Security Strategy
  • 18. Security Development Lifecycle Design Threat Modeling Standards, best practices, and tools Security Push Final Security Review RTM and Deployment Signoff Security Response Product Inception
  • 19. Priority #1 - Platform Security Security Development Lifecycle Security Response Center Better Updates And Tools
  • 20. Comprehensive Security Portfolio Services Edge Encrypting File System (EFS) Server Applications BitLocker™ Information Protection Network Access Protection (NAP) Client and Server OS IdentityManagement Windows CardSpace SystemsManagement Active Directory Federation Services (ADFS) Guidance Developer Tools
  • 21. Security Development Lifecycle (SDL) Kernel Patch Protection Kernel-mode Driver Signing Secure Startup Windows Service Hardening Secure Platform Rights Management Services (RMS) SharePoint, Exchange, Windows Mobile integration Encrypting File System (EFS) Bitlocker Secure Access User Account Control Network Access Protection (NAP) IPv6 IPsec Windows CardSpace Native smart card support GINA Re-architecture Certificate Services Credential roaming Windows Defender IE Protected Mode Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP) Bi-directional Firewall Windows Security Center Data Protection Malware Protection
  • 22. Windows Vista SP1 includes Additional Kernel Patch Protection APIs Enhanced Windows Security Center reporting Expanded BitLocker Drive Encryption (BDE) Additional multifactor authentication methods
  • 23. Security Development Lifecycle (SDL) Windows Server Virtualization (Hypervisor) Role Management Tool OS File Integrity Secure Platform Network Protection Network Access Protection (NAP) Server and Domain Isolation with IPsec End-to-end Network Authentication Windows Firewall With Advanced Security On By Default Identity Access Rights Management Services (RMS) Full volume encryption (Bitlocker) USB Device-connection rules with Group Policy Improved Auditing Windows Server Backup Data Protection Read-only Domain Controller (RODC) Active Directory Federation Srvcs. (ADFS) Administrative Role Separation PKI Management Console Online CertificateStatus Protocol
  • 24. Secure Platform Surface Area Configuration tool Password Policy Enforcement; Granular Roles Built in Encryption;Key Mgmt. Auditing – Data Definition Language (DDL) Advanced Spam and Virus Defenses Compliance Business Continuity Trust Center New Document Security Model Open XML File Formats Rich Authentication GranularAccess Control Complianceand Auditing Hierarchical Encryption Document Inspector Information Rights Management Strong Encryption,Digital Signatures Suite-B: For U.S. Government Data Protection Platform Security Progress Essential Security and Mobile Device Mgmt Built-in Protection with Business Continuity Compliance Support EnhancedMessage Filtering
  • 25. Security Threat Landscape Evolution Microsoft Security Strategy Engineering Excellence Security Development Lifecycle Engineering Excellence Security Development Lifecycle
  • 26. Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers Network Security Secure Anywhere Access End-to-end security with IPv6 and IPsec Access driven by policy not topology Certificate based multi-factor authentication Health checks and remediation prior to access Policy-driven network access solutions Windows Firewall with advanced filtering Server and Domain Isolation Network Access Protection (NAP) ISA Server 2006 Intelligent Application Gateway (2007) Windows Filtering Platform
  • 27. Identity and Access Management Your COMPANYandyour EMPLOYEES Secure and seamlesscross-organizational collaboration Easily managing multiple identities Government sponsored identities (eID) Hardware supported trust platform Disparate directories synchronization Centralized ID controls and mgmt. Embedded identity into applications Policy Governance / Compliance Role Based Permissions Identity and Data Privacy Identity Lifecycle Manager 2007 Active Directory Federation Services Active Directory Lightweight Directory Services Windows Certificate Services Windows CardSpace™
  • 28. Edge, server and client protection “Point to Point” Solutions Security of data at rest and in transit Mobile workforce Manageability Corporate Client Protection Server Protection Consumer/ Small Business Simple PC maintenance Anti-Virus Anti-Spyware Anti-Phishing Firewall Performance Tuning Backup and Restore Edge Protection Protection
  • 29. Interoperability Industry Standards Web Services (WS-*) Open document format (XPS) OpenID Partner Products Network Access Protection EV Certificate support in IE7 Windows CardSpace Windows Security Center Industry Partnerships SecureIT Alliance Microsoft SecurityResponse Alliance Interop Vendor Alliance
  • 30. Security Stack Interoperability Integrated security eases defense in depth architecture deployment Adoption of open standards allows cross platform integration Management System System Center, Active Directory GPO Data BitLocker, EFS, RMS, SharePoint, SQL User Active Directory and Identity Lifecycle Mgr Application SDL process, IIS, Visual Studio, and .NET Device Forefront Client Security, Exchange MSFP Internal Network Network Access Protection, IPSec Perimeter Forefront Edge and Server Security, NAP
  • 32. Engineering Excellence Security Development Lifecycle Microsoft Security Strategy
  • 33. Some hard questions… Who Why What When Where How
  • 35. And the press is doing its bit...
  • 36. User Experience Application Platform Optimization Model Development BASIC ADVANCED DYNAMIC STANDARDIZED Infrastructure Optimization SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process Enterprise Content Management BASIC RATIONALIZED DYNAMIC STANDARDIZED Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC RATIONALIZED DYNAMIC STANDARDIZED Security and Networking Data Protection and Recovery
  • 37.
  • 38. Establishes a foundation based on industry analyst, academic, and consortium research
  • 39. Provides guidance and best practices for step-by-step implementation
  • 40. Drives cost reduction, security and efficiency gains
  • 41. Enables agilityApplication Platform Optimization Model STANDARDIZED BASIC ADVANCED DYNAMIC Development SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process STANDARDIZED BASIC DYNAMIC RATIONALIZED Enterprise Content Management Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC STANDARDIZED DYNAMIC RATIONALIZED Security and Networking Data Protection and Recovery
  • 42. Core Infrastructure Optimization Policy and Compliance Risk Assessment User Awareness Basic Standardized Rationalized Dynamic Identity and Access Management Patch Management Threat and Vulnerability Mitigation Secure Messaging and Collaboration Secure Application Architecture Legacy Platform Migration
  • 43. Solutions Benefits Costs Challenges Two Factor Authentication Secure Remote User Basic to Standardized Enforce Strong Passwords Secure Wireless Access Network Intrusion Detection Optimizing SecurityMoving from Basic to Standardized Developer-focused environment Sophisticated and targeted threats Executive sponsorship Awareness campaign Cultural shift to awareness Able to mitigate current high priority risk Labor intensive to maintain Defense in Depth
  • 44. Solutions Benefits Costs Challenges Standardized to Rationalized Network Segmentation Identity & Access Mgmt 2FA: Elevated Access Accts Security Event Monitoring Certificate Provisioning & Renewals Vulnerability Assessments SDL IT Optimizing SecurityMoving from Standardized to Rationalized Evolving and faster threats Ownership largely resided with Security Risk management framework Service manager accountability Accountability closer to business Environmental awareness Improved response Lack of integration between service managers and business Defense in Depth Automate
  • 45. Solutions Benefits Costs Challenges Network Access Protection Rationalized to Dynamic Strong User Authentication User Account Control Bitlocker Drive Encryption Optimizing SecurityMoving from Rationalized to Dynamic Security viewed as a tax to the business Information security governance Information security becomes a strategic asset Culture shift may cause friction Defense in Depth
  • 46. Application Security Authentication Intrusion Detection/Prevention Identity & Access Management Network Firewalls NAC Wireless Email Unified Threat Management Secure Remote Access Antimalware SIMs Mobile Data Security Vulnerability Management Web Security Gateways
  • 47. People Mobile Mobile Office Task Office Contract Task Home Contract Offshore Home
  • 48. Separation Creates Flexibility Data, User Settings Applications OS Hardware Dependencies Create Complexity
  • 50. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Mobile Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
  • 51. Mobile Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 52. Mobile Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Group Policy and AGPM Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 53. Mobile Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 54. Mobile Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 56. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Office Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
  • 57. Office Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 58. Office Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 59. Office Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 60. Office Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 61. Task
  • 62. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Task Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
  • 63. Task Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 64. Task Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Group Policy and AGPM Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 65. Task Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 66. Task Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 68. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Contract / Offshore Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
  • 69. Bi-Directional Firewall, Defender, Malicious Software Removal Tool Network Location Protection Bitlocker Drive Encryption Security Center & UAC OS Microsoft Enterprise Desktop Virtualization (MED-V) Contract / Offshore Worker OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 70. Contract / Offshore Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 71. Contract / Offshore Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 72. Contract / Offshore Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 73. Home
  • 74. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Home Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
  • 75. Home Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 76. Home Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 77. Home Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 78. Home Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 79. 7 Tips for Secure Client Computing Protect your personal information. It’s valuable Know who you’re dealing with Use anti-virus and firewall and update both regularly Setup your OS and Web Browser properly and update both regularly Protect your password Backup important files Learn who to contact if something goes wrong
  • 80. Technology Internet Intranet Web Server Exchange External Web Server User BRANCH OFFICE DMZ CSS Internal Network Internet SharePoint Active Directory HEAD QUARTERS User Customer
  • 81. Technology – Another View Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers
  • 82. OSI Model Application Presentation Session Transport Network Media layers Host layers Data Link Physical
  • 84. Head Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 85. Head Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 86. Head Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 87. Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 88. Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 89. Head Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 90. Head Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 91. Head Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 92. Head Office (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 94. Branch Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 95. Branch Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 96. Branch Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 97. Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 98. Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 99. Branch Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 100. Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 101. Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 102. Branch Office (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 104. Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 105. Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 106. Intranet/Extranet (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 107. Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 108. Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 109. Intranet/Extranet (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 110. Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 111. Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 112. Intranet/Extranet (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
  • 114. Wired Access ADSL / Cable Power Line Dial-in / ISDN Fiber Optic
  • 115. Wireless Access WiFi GPRS / UMTS / HSPA / LTE Wireless USB Bluetooth WiMAX Satellite
  • 116. Securing Wireless… Internet Wired Enterprise Network
  • 118.
  • 119. Seamless access to network resources increases productivity of mobile users
  • 120. Infrastructure investments also make it easier to service mobile PCs and distribute updates and polices
  • 121. Difficult for users to access corporate resources from outside the office
  • 122.
  • 123. Process Application Security Cryptography Access Control Business Continuity & Disaster Recovery Information Security and Risk Management Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security Legal, Regulations, Compliance & Investigations
  • 126. Business Continuity Business Continuity Planning Lifecycle
  • 128. Cryptography Symmetric-key Asymmetric-key
  • 130. Risk Management Risk avoidance Risk reduction Risk retention Risk transfer
  • 131. Operations Security World War II-era poster promoting OPSEC
  • 133. Legal, Regulations, Compliance & Investigations
  • 135. Physical Security Key Elements Key Features
  • 136. Security Guidance and Resources Microsoft Security Home Page: www.microsoft.com/security Microsoft Forefront: http://www.microsoft.com/forefront/default.mspx General Information: Microsoft Live Safety Center: http://safety.live.com Microsoft Security Response Center: www.microsoft.com/security/msrc Security Development Lifecycle: http://msdn.microsoft.com/security/sdl Get the Facts on Windows and Linux: www.microsoft.com/getthefacts Anti-Malware: Microsoft OneCare Live: https://beta.windowsonecare.com Microsoft Defender: www.microsoft.com/athome/security/spyware/software Spyware Criteria: www.microsoft.com/athome/security/spyware/software/isv Guidance Centers: Security Guidance Centers: www.microsoft.com/security/guidance Security Guidance for IT Professionals: www.microsoft.com/technet/security The Microsoft Security Developer Center: msdn.microsoft.com/security The Security at Home Consumer Site: www.microsoft.com/athome/security
  • 137. આભાર ধন্যবাদ நன்றி धन्यवाद ಧನ್ಯವಾದಗಳು ధన్యవాదాలు ଧନ୍ୟବାଦ നിങ്ങള്‍‌ക്ക് നന്ദി ਧੰਨਵਾਦ
  • 138. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notas del editor

  1. LEAD: Who is responsible for driving the evolution of the threats that impact your business?It started with those that were curious and wanted personal fame in hacking into different systems and networks.Then, the motivation moved to those that found a sport in CyberTrespassing and those that look at financial gains from CyberThief. As more individuals made money, the group began to grow larger and larger.Now we are finding experts and specialist that focus on large hacking efforts gaining access to sensitive data that they can sell on the black market. We are also seeing CyberSpy Specialist with national interests at stake.<CLICK>Vandals are the largest group.<CLICK>We see Theives driving the largest area where money is lost<CLICK>The largest segment of spend is focused defending national interests.<CLICK>The fastest growing segment are the experts that are in the business of stealing your business assets.????? Customer QuestionsAre you seeing security threats evolve before the attacked technology is mainstreamed?Why do you think this is happening?
  2. LEAD: Engineering Excellence is focused upon providing fundamentally secure platforms for our customers. They should be secure by design, secure by default, and remain secure after deployment.???? Customer QuestionsWhat kind of security configuration management do you utilize to deploy servers? Desktops?Are you using Group Policy to keep your platforms secure after they are deployed?What is your platform patching strategy?