2. Agenda
• Business and IT Challenges
• Business Ready Security
• Secure Endpoint
• Customer Testimonial
• The Road Ahead
• Solution Resources and Tools
• Summary
3. Business Needs And IT Challenges
Protect endpoints from Financially motivated
advanced threats evolving threats
Enable secure access to Wide range of users
resources from anywhere and devices
Protect sensitive data Easily accessible sensitive
on endpoints data on multiple devices
Reduce security Multiple vendors and
management costs complex management
BUSINESS Needs IT Needs
Agility and Flexibility Control
4. Business Ready Security
Help securely enable business by managing risk and empowering people
Protect everywhere, Identity
Simplify the security
access anywhere experience,
manage compliance
Highly Secure & Interoperable Platform
Integrate and extend
security across the
enterprise
from: to:
Block Enable
Cost Value
Siloed Seamless
5. Business Ready Security Solutions
Secure Messaging Secure Collaboration Secure Endpoint
Information Protection
Identity and Access Management
6. Secure Endpoint
Protect client and server operating systems from emerging threats and information
loss, while enabling more secure access from virtually anywhere
PROTECT everywhere, INTEGRATE and SIMPLIFY security,
ACCESS anywhere EXTEND security MANAGE compliance
• Advanced malware • Integrated with • Simplified
protection OS security management
• Protect sensitive • Leverages existing • Enterprise-wide
information infrastructure visibility
• Secure, always-on
access
7. Advanced Protection Against Web-based Exploits
• Advanced URL filtering for safe
web browsing
• Reputation services for enhanced accuracy
• Integrated Anti-Malware protection at
the edge
• Inspects encrypted and unencrypted
web traffic
• Prevents exploits against browser-based
vulnerabilities
“
8. Comprehensive Malware Protection For Endpoints
• Integrated anti-virus/anti-spyware agent
Malicious Threats
for real-time protection
• Advanced detection technologies for
complex malware
• Unique vulnerability assessments
• Rapid response through global threat
research team
Management
Console
9. Provide More Secure, Anywhere Access
• Seamless, always-on connectivity
• Policy-based network access
• Consolidated secure portal for
easy remote access to resources
• Simplified sign-on
“
10. Secure Sensitive Information
Access policy for Reduce information loss Classify and protect
removable media risk through integrated information with
drive encryption built-in AD RMS
Device Control BitLocker
“
Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
12. Simplify Security Management
• Easy-to-use wizards for security
and policy configuration
• Enterprise-wide client
state visibility
• Insightful reports to
ensure compliance
Security Summary
“
13. Current Situation
Increased risk from evolving threats
Reactive Security
Susceptible to vulnerabilities
No compliance checks
Multiple Vendors
Complex Tools
Limited Access to resources
Threats
from Unmanaged Endpoints
Lack of comprehensive
data protection
No policy for removable device
15. Customer Testimonial
Allina Hospitals & Clinics
Healthcare Company Simplifies Management, Boosts Protection
with New Security Solution
BUSINESS SITUATION SOLUTION BENEFITS PROVIDED
• Improving protection of • Simplified and centralized
critical systems management
• Improved integration
• Integrating a security with the existing IT
solution with the IT environment
environment
• Increased IT visibility
• Improving reporting • Improved and
capabilities Management Consoles
unified protection
“
Source: Secure Collaboration for Aerospace and Defense Firms. Microsoft case study, April 2009. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000003996
16. The Road Ahead
Management Consoles
DirectAccess
Subject to Change
17. Solution Resources & Tools
Hands-on Labs and VMs Architecture, Planning and
Design Guides
Evaluation Guides
Infrastructure Planning
Guide
Proof of Concepts
Information Protection Using
Rights Management Services
Operations Guides
Forefront Endpoint
Protection Deployment
Administrator Guides
Troubleshooting Guides Secure Web Access
18. Secure Endpoint
Protect client and server operating systems from emerging threats and information
loss, while enabling more secure access from virtually anywhere
PROTECT everywhere, INTEGRATE and SIMPLIFY security,
ACCESS anywhere EXTEND security MANAGE compliance
• Advanced malware • Integrated with OS • Simplified
protection security management
• Protect sensitive • Leverages existing • Enterprise-wide
information infrastructure visibility
• Secure, always-on
access
Learn more at: www.microsoft.com/forefront