• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Consumerization for the Enterprise:  Microsoft
 

Consumerization for the Enterprise: Microsoft

on

  • 805 views

Presented by Jeff Johnson, Sr. Enterprise Strategist-Desktop & Consumerization, Microsoft

Presented by Jeff Johnson, Sr. Enterprise Strategist-Desktop & Consumerization, Microsoft

Statistics

Views

Total Views
805
Views on SlideShare
804
Embed Views
1

Actions

Likes
1
Downloads
15
Comments
0

1 Embed 1

http://www.docshut.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Consumerization for the Enterprise:  Microsoft Consumerization for the Enterprise: Microsoft Presentation Transcript

    • Microsoft consumerization for theenterprise
    • ••• Use any device anytime any where•• Virtual• Desktop• DATA• SERVERS••• Enabling FIREWALL Consumerization Cloud Services•••
    • SPECIALIZEDPCs/SLATES PHONES DEVICES
    • SPECIALIZEDPCs/SLATES PHONES DEVICES
    • No longer about “work-life balance,” but work-life integration using many devices to collaborate and participate.
    • Consumer Cloud Messaging Rich Media SharingSocial Networking Consumer Endpoints
    • Browsers Total X of Vulnerabilities by severity High Medium Low Google Chrome 152 94 56 2 Apple Safari 122 79 41 2 Mozilla Firefox 103 61 41 1 Microsoft Internet Explorer 59 37 21 1 Applications Total X of Vulnerabilities by severity High Medium Low Apple Webkit 94 64 29 1 Mozilla Seamonkey 77 47 29 1 Adobe Acrobat Reader 60 55 5 0 Mozilla Thunderbird 60 39 21 0 Adobe Flash Player 59 53 6 0 Adobe Acrobat 57 52 5 0 Operating System X of Vulnerabilities by severity Microsoft Office 55 55 0 0 Total High Medium Low Java Runtime Environment 54 35 18 1 Microsoft Windows Server 2003 147 97 50 0 Adobe Shockwave Player 50 48 2 0 Linux Kernel 129 33 58 38 RealNetworks RealPlayer 44 40 4 0 Apple Mac OS X Server 103 22 76 5 Microsoft Windows XP 100 70 30 0 Apple Mac OS X 96 20 72 4 Microsoft Windows Server 2008 92 61 31 0 Microsoft Windows Vista 88 64 24 0Statistics from http://nvd.nist.gov/ Microsoft Windows 7 66 50 16 0http://securityblog.s21sec.com/2012/03/s21sec-detects-almost-7000.html Microsoft Windows 2000 45 26 19 0http://arshnet.wordpress.com/2011/12/26/google-vs-microsoft-vs-apple-software-security-risks-year-end-2011/ Cisco IOS 28 26 2 0http://www.gfi.com/blog/research-web-browser-war-security-battle-in-2011/
    • 5 Top Cyber Threats for 2012http://www.cbc.ca/news/technology/story/2012/01/03/sci-cyber-threats.html?cmp=rss
    • Classification to define an access policy  Low Business Impact (LBI)  Medium Business Impact (MBI)  High Business Impact (HBI) Financials Data Source Code SharePoint Classification• CRM Customer Information• Email Product Information VoIP Video Medical Records LBI MBI HBI
    • UNMANAGED MANAGED EXTERNAL KIOSK DEVICES DOMAIN JOINED PC EMAIL, BASIC ACCESS FULL ACCESS, INCLUDING DRM CALENDAR, CONTACTS ACCESS TO CLOUD- BASED ACCESS TO INTERNAL DOCUMENTS DOCS DOCUMENT AND SITES OVER THE INTERNET STORAGE FULL ACCESS TO ACCESS TO CLOUD-BASED LOB APPS ON THE LINE-OF-BUSINESS (LOB) APPSBUSINESS APPS CORP NETWORK
    • LEVEL OF BUSINESS IMPACT Direct Low Access Windows 7 EMAIL, Voice Presence & IM Email CALENDAR, CONTACTS Unified Access Medium Gateway DOCS < Central Documents CRM > Remote High Windows 7, WindowsVista, Windows XP, etc. Desktop RDS Web Non-Windows AccessBUSINESS APPS Slates and tablets, smartphones, etc. Business Intelligence LOB Apps
    • Domain Joined Non Domain Joined MSIT Standards PC with TPM PC w/o TPM PC MS Phone Non-PC Device Enterprise Class PCs with MSIT Recommended: Consumer PCs MSIT Standards Windows Mobile 6.5 & 7 TPM Consumer PC with TPM Enterprise Class and Android and Future Sony, ASUS…Acer Consumer PCs Chrome OS devices Apple Mac with Mac OS X Apple Mac with Bootcamp Apple Mac with Bootcamp iPhone & iPad * Concerns with PII / HBI data loss MSIT Services Helpdesk Hardware Support Yes Best Effort Best Effort Maybe No No Helpdesk Software Support Yes Yes Yes Yes Yes LOB Applications Yes Yes Yes Yes Yes No Patching Yes Yes Yes No No No Driver support in MSIT Images Yes Yes No Maybe No No BitLocker Yes Yes No * No No No * Direct Access Yes Yes No No No No VPN with Smartcard Yes Yes Yes Yes No No WIFI Yes Yes Yes Yes Yes Yes Exchange Yes Yes Yes Yes Yes YesCorporate Access (i.e. Applications, Print, Yes Yes Yes Limited Limited Limited File Shares & SharePoint) Lync / UC Yes Yes Yes Yes Yes Future
    • CONTAIN EMBRACE Policy and Standards Policy/Standards/Best Practices Enabling Technology Enterprise Architecture Enterprise Architecture Service Operation Service Operations/Support Service Desk Support Break/Fix Service Levels for Availability Policy and Standards Policy and StandardsBusiness Value Self-Host (No IT Support) Technical Controls Enforcement ALLOW W/ POLICY BLOCK Risk Mitigation
    • CONTAIN EMBRACEBusiness Value ALLOW W/ POLICY BLOCK Risk Mitigation
    • Yes
    • Responsible Consumerization of IT••• End Users
    • Embracing theConsumerization of IT! Microsoft in the Enterprise
    • Embracing the Consumerization of IT We have four components to our strategyWindows Security and management productivity development