Your SlideShare is downloading. ×
0
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mms201 Optimize Your Server Infrastructure

420

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
420
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • So lets look at some of the customers who have realized the benefits of infrastructure optimization with Microsoft management solutions:CONTINENTAL: Continental has traditionally spent U.S.$6 million to $8 million annually on server deployments, primarily for refreshes. It typically replaced about 250 legacy servers. Now it will move those servers into the virtual environment. Using Virtual Server and System Center Virtual Machine Manager, it expects to consolidate to about 80 servers, creating a 3:1 savings. Continental will minimize its number of servers by maximizing utilization. Continental can use the System Center Virtual Machine Manager rating system to identify which servers have capacity for additional workload, factoring in both historical performance data and ongoing requirements. Whereas Continental might have achieved only 5 percent utilization with physical servers, it can reach over 50 percent utilization with System Center Virtual Machine Manager and Virtual Server.Notes on the other customer stories
  • Secure messaging and collaboration can contribute to the benefits you can derive from server infrastructure optimization in the following ways:Control Costs Simplify management and save IT costsReduce re-workReduce the likelihood of lost end-user productivityGreater protection from costly non-complianceImprove Security and AvailabilityIncrease the security of the e-mail communicationsMore reliable communications and collaboration systemsHigher levels of policy-based security companywideIncrease the level of protection on communications and collaboration systemsProtect against leakage of confidential informationIncrease AgilityIncreased server performanceIncreased end-user productivity through protected information sharingImproved collaboration with customersIncreased productivity and responsiveness for remote and mobile employees
  • 2 Examples:First is example of critical nature of global messaging and collab environment and why Del Monte chose to secure and manage both server environments with Forefront and System Center solutionsSecond is an example of the gains SOK, a large Russian Manufacturer expects to make by securing their messaging infrastructure with Forefront Security for Exchange. (in terms of reducing cost of downtime and improving security)http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=4000001194 Solution Overviewhttp://www.delmonte.comCustomer Size: 17600 employeesOrganization ProfileBased in San Francisco, California, Del Monte Foods distributes and sells food and pet products, throughout the United States. The company employs 7,800 salaried and 9,800 seasonal workers.Business SituationBecause Del Monte employees were increasingly reliant on Microsoft® communication and collaboration products, Del Monte sought better protection and management for this IT environment.SolutionThe organization implemented a comprehensive security software solution based on Microsoft Forefront™ Security and Microsoft System Center products. BenefitsEasy deployment and configuration Effective antivirus protection Centralized view of environment Seamless integration Comprehensive security managementSoftware and ServicesMicrosoft Forefront Client SecurityMicrosoft Forefront Security for Exchange ServerMicrosoft Forefront Security for SharePointMicrosoft Internet Security and Acceleration Server 2006Microsoft Operations Manager (MOM) 2005Vertical IndustriesConsumer Goods ManufacturingCountry/RegionUnited States2nd ExampleSOK Group, one of Russia’s largest manufacturers, previously relied on a third-party product to protect its central e-mail infrastructure. However, the single scan engine in that product sometimes allowed new viruses to slip through. As the company upgraded to Microsoft Exchange Server 2007, it decided to also migrate to Microsoft Forefront Security for Exchange Server.  As a result, SOK Group expects to cut the downtime of its e-mail infrastructure by 20 to 30 percent. This improvement will come primarily from the ability to use five scan engines simultaneously in Forefront Security for Exchange Server, compared to the single scan engine in its previous security product. With their prior solution, there have also been incidents in which new viruses hit the network before the vendor issued the necessary signature updates. But… “With the multiple simultaneous scan engines in Forefront Security for Exchange Server, we did not have a single virus infection.”  PetrGrachev Chief Information OfficerSOK Group
  • Information protection and secure access contributes to the benefits of server infrastructure optimization in the following ways:Control Costs Automate lifecycle management of user identitiesCentralize management across multiple enterprise systems and line-of-business (LOB) applications Improve Security and AvailabilityProvide network-perimeter protection, strong authentication, and identity managementControl access by role and job levelImprove governance and regulatory complianceIncrease AgilityProvide secure access and collaboration with partnersIncrease access to systems, enabling information workers to do moreEmpower information workers to get their jobs done whenever and wherever needed
  • SituationEstablished as a joint venture between Corning Glass Works (now Corning Incorporated) and the Dow Chemical Company, Dow Corning is a global leader in silicon-based technology and innovation. The company provides more than 7,000 products and services to 20,000 customers worldwide, has 10,000 employees, and generated U.S.$4.39 billion in sales in 2006.For Dow Corning, which has more than 4,000 patents globally, protecting its intellectual property (IP) is a business imperative. “The business world has changed, and IP protection risks can vary from country to country,” says Mark Gandy, Enterprise Architect at Dow Corning. “We’re expanding geographically and collaborating more and more with partners, so we need to handle and protect content in a way that’s compliant both with local regulations and with our own IP-protection policies.”More specifically, Dow Corning wanted to institutionalize how it protected IP in a way that could be scaled across the enterprise. It already had information-protection policies that classify content into categories such as “nonclassified” or “highly confidential” and specify how the content must be handled. However, the company needed a way to make it easy for people to handle content appropriately.“Although people generally followed the policies that were in place, doing so sapped their productivity and ability to collaborate,” says Gandy. “Encryption and other security-related technologies are complicated for end users and can take several extra steps to employ, which made it difficult for people in the field, who are under pressure to be productive.” In looking for a solution, Dow Corning identified four major success factors:User experienceThe solution had to be easy to use and integrate with peoples’ normal workflows. In this case, that meant integrating with the Office programs that are used company-wide to create, manage, and share documents. Operational excellenceDow Corning wanted to deploy and support minimal additional technology infrastructure, as a way to minimize any increases in ongoing IT costs. Corporate governance. The company needed to ensure it retained control of protected content such as being able to access it even if the user who encrypted it left the company. ScalabilityDow Corning needed a solution that could easily support the company’s worldwide operations, including all 10,000 employees.SolutionDow Corning met all requirements with Active Directory Rights Management Services in the Windows Server 2008 operating system, which provides identity-based information protection to help safeguard information from unauthorized access and use. In conjunction with applications enabled to take advantage of it, Active Directory Rights Management Services provides persistent protection and usage policies that remain with information no matter where it goes or how it’s stored.“Active Directory Rights Management Services was the ideal solution for us because it integrates seamlessly with both the Microsoft Office system on the desktop and our Windows Server based IT infrastructure,” says Gandy. “We decided specifically to go with Active Directory Rights Management Services in Windows Server 2008 because of the many enhancements it offers over the previous version, including its inclusion as a core server role, an improved management interface, and the ability to easily extend its reach to support collaboration with business partners.”
  • Selecting a Technology Partner and Supporting TechnologiesThough you would likely gain significant benefits by implementing solutions for all of the solution areas above, if you are like most business and technology professionals, you have limited budget and resources. Furthermore, your current infrastructure may already be more optimized in some areas and less optimized in others. As a result, you will likely derive the greatest benefit in the shortest amount of time if you select one solution area to focus on first. Once you have selected an area to focus on, you need to consider what technology partners and technologies you will work with to help you optimize your infrastructure.Microsoft is Your Technology PartnerMicrosoft is dedicated to helping organizations like yours empower employees to drive the business forward. From the start, Microsoft’s goal has been to deliver software that enables people to harness their creativity, imagination, and intellect. Over the years, Microsoft has expanded that vision beyond individuals working in isolation to delivering optimized productivity solutions for dynamic teams and a geographically distributed workforce. These enterprise-ready solutions include not just software but also best practices, guidance, and implementation services so you can successfully implement a solution quickly with low cost and risk. With the latest wave of innovation, now is the ideal time to evaluate how Microsoft infrastructure solutions can best be used your organization. Microsoft remains committed to helping you realize the most value out of your IT investments and drive growth and new opportunities.Microsoft offers a unique value proposition to our customers:Our software is trusted and familiarOur solutions are unified and comprehensiveOur software is interoperable by designSoftware That is Trusted and FamiliarWhen you select software that is familiar and easy to use, you reduce IT support and training costs while maximizing the productivity of your users. Every day, in every department, Microsoft dedicates itself to thinking about and understanding how people use software and then applies this knowledge to build software that is familiar and easy to use. One of Microsoft’s goals is to make sure that people’s experiences are consistent from application to application. Because Microsoft understands how an information worker works with software, how a system administrator manages systems, and how a developer develops new applications and solutions, we build tools that will fit with the way your employees work and deliver a consistent, familiar experience to help them work more productively.Solutions That are Unified and ComprehensiveMicrosoft’s comprehensive solution set spans the operating system platform, virtualization, management, security, and identity and access infrastructure to help equip you with the resources and technical capabilities you need to optimize your infrastructure. Microsoft solutions are designed to work together to streamline management and reduce IT complexity. Furthermore, Microsoft solutions span the various aspects of your IT environment, from the desktop to mobile devices to servers to the development platform to security and more for many of the systems in your infrastructure. Interoperable by DesignWhile Microsoft products have always worked well together with minimal integration costs, the likelihood that all of your solutions are from Microsoft is low. As a result, you need solutions that provide integration and interoperability between technologies from different vendors. Microsoft delivers interoperability by design. At its most basic level, this means connecting people, data, and diverse systems. As a result, Microsoft is increasingly being recognized as a leader in enterprise platform software. In fact, according to a recent IDC survey of 500 North American organizations, the Windows Server operating system is the most popular platform for running mission-critical applications in the enterprise.3 Furthermore, IDC identified Microsoft .NET as the application-technology platform that enterprises expect to use most often for developing mission-critical applications.
  • To summarize, server infrastructure optimization can help your organization control costs, improve security and availability, and increase agility. It can do this as you implement solutions from one or more of the key solution areas: data center management, secure messaging and collaboration, or information protection and secure access. Supporting these solutions is the Infrastructure Optimization methodology which provides a framework, services, technologies, and guidance and tools to help you optimize your infrastructure.
  • In today’s presentation, we are going to talk about …Challenges that IT professionals face today and the resulting need for server infrastructure optimization.Microsoft’s Infrastructure Optimization approach.Solutions you can adopt to help you optimize your server infrastructure, including an overview of those solutions and potential ways to prioritize which is most appropriate for you now.Next steps to start you on the path.The objective of this presentation is to help you understand the benefits of optimizing your server infrastructure and determine which solution areas to focus on first to enable you to gain benefits that are most valuable to your organization now. These solution areas include:Managing your data center Securing and optimizing your messaging and collaboration infrastructureOptimizing accessto and protection for your information and systemsOnce you have a sense for the solution area that will provide the greatest benefits for your organization, you are encouraged to talk with your Microsoft account representative or Microsoft partner to learn more about that solution area and develop a plan to implement solutions that will improve the optimization of your server infrastructure. This presentation provides an overview along with recommendations on how to get started.
  • So let’s level set on some of the key concerns and priorities that business decision makers (BDMs) and technical decision makers (TDMs) have at a high level.In a recent study, Business leaders sited the following as key areas of focus for their business.An evolving business identifies challenges such as:Building relationships with customersInnovationSales productivity IT responsivenessFrom our conversations with information technology (IT) professionals in companies of all sizes, we know that some common IT priorities include:Aligning IT with business goals: Terms such as “IT governance” and “IT value” have required IT people to find true meaning for them. And it’s not just point-in-time alignment, it’s about continuous alignment. So as the business landscapes evolve and things change, IT is ready and able to be a strong partner.IT-enabled process improvement: This is one of the key concerns that paves the way for supporting business with IT for greater business value. Efficient processes help IT with regards to visibility, predictability of delivery, and ultimately bolster the business’ confidence in IT’s ability to meet it’s needs.Staff development: The best team of IT talents to support the business.Business continuity and risk management: Several regulated and unregulated situations give rise to mission-critical problems in absence of IT support. So risk management and security are the key concerns for IT to help business keep continuing.Controlling IT cost.From a CIO’s perspective, the real scenario of IT is shocking for these reasons: A very low percentage of budget is spent on improving the business. Operation overhead is very high. The root cause of such a scenario is the disparate system that has grown out of the operation overheads and investment policies in IT. In fact, on average, only 20 percent of IT budget is allocated for new capabilities, and CIOs want to flip that and spend less on maintenance.Additional NotesIT spending needs to match IT needs. The majority of CIOs will be responsible for using information as a strategic asset within their organization; however, most IT spending today does not match this (Source: Gartner; ID Number: G00144215)80 percent budget spent “to sustain current operations”.20 percent budget spent on “organizational growth and change”and less then 2 percent budget on “transformational” business change, in some Fortune 500 companiesEffective CIOs spend actually spend 20 percent less on infrastructure and operations than ineffective ones.Key Message:The bulk of IT budgets today is spent just “treading water” rather than adding new business value. Microsoft is focused on trying to help your IT department flip that equation.Talking Points: There are “good” and “bad” pressures on IT. The green arrows represent the good pressure: pressure to add new business value by increasing productivity, driving customer connections, etc. The red arrows represent the “bad” pressures: the necessary, day-to-day pressures that require lots of time, resources, and effort to address but that don’t necessarily push the business ahead. It’s these pressures that consume 80 percent of most IT budgets today, according to analysts; that’s a lot of investment spent on “standing still” when you’d rather be spending resources that add new business value and take the business further. As companies grow, their IT infrastructures grow along with them. But more often that not, the pace of that growth is uneven, driven as much by the conditions under which the infrastructures operate as by the models they aspire to. You add an application here. You add functionality there. You add people across the board. Yet the more variables you add to your infrastructure, the harder it can be to manage and, more importantly, to keep secure.   So even as the costs for hardware and software are going down, the costs of managing and supporting your infrastructure are increasing. $140B is spent on management and support—yet software is only 6 percent of it. Software is an enabler…
  • To understand how Microsoft is helping customers to address these issues, lets first look at Dynamic IT,Dynamic IT to us is really a technology strategy that we look at within businesses that are enabling both IT professionals and developers across the entire IT lifecycle to enable adynamic state. One key area is virtualization. Tothe extent I can virtualize, I'm no longer bound by the hard-core wiring that exists between different layers of my infrastructureand I've become more logical, which means I'm more flexible and I can lower costs. Being process-led and model-driven allows me to take an end-to-end view of an application lifecycle, where I can capture what the developer of an application really intended in his knowledge about a systemand use that exact same knowledge in an easy way as they go to implement that and operate that on an ongoing basis.  “Service enabled” is really thinking about the new kinds of application paradigms that are coming about related to service-oriented architecture and services-led business modelsand how I integrate those things into my existing environment. Then finally, “user-focused,” which involves thinking about you consider what every different kind of user wants in his or her interactions with systems, data, and applications, whether that's an end user (obviously a heritage Microsoft knows very, very well and has focused on for a long time), an IT professional, or a developer. In other words, we are focused on providing the right user experience for the right people.  To do that, technology is important, but it's how do you bring together the process and the people together in an integrated way to help really solve that problem.
  • Infrastructure Optimization helps enterprises understand the current state of their IT infrastructure and devise a roadmap for their business to increase agility. By assessing an organization’s level of optimization (basic, standardized, rationalized, and dynamic), Microsoft and its partners can help identify the strategic value and business benefits for the enterprise in moving from a basic level of maturity to higher levels of maturity. Benefits of optimizing your server infrastructure include:Control CostsHigher levels of IT maturity can result in savings of up to 80 percent in IT labor costs. Improve Security and AvailabilityAn optimized server infrastructure can lead to greater business continuity, enhanced compliance, and better, more secure access to network resources.Increase AgilityOrganizations can achieve notable improvements in the ability to provide faster, more responsive IT service and increase agility.
  • To help customers achieve these benefits, Microsoft has put together the following solutions specifically designed to optimize the server infrastructure:Data Center ManagementData center management enables organizations to address their challenges by optimizing the data center through unified management of the physical and virtual infrastructure, configuration management, server compliance, end-to-end monitoring, and disaster recovery.Secure Messaging and CollaborationEstablishing a secure messaging and collaboration infrastructure enables organizations to address their challenges by protecting against viruses, spam, and information leakage, while enabling more secure remote access. An optimized messaging and collaboration infrastructure improves the quality and reliability of critical business services delivered to internal and external stakeholders.Information Protection and Secure AccessInformation protection and secure access enables organizations to drive operational efficiency, enable new business scenarios, and enhance security and compliance.These Core IO solutions are each made up of the following components:ModelThe Core IO model provides a way to think about the challenges that you face, prioritize the areas you want to focus on improving, and organize your activities to pursue those priorities. The model outlines a progression through four levels of optimization and illustrates the strategic value and business benefits of moving from a “basic” level of optimization, where the infrastructure is generally considered a “cost center,” toward a “dynamic” infrastructure, where the business value of the infrastructure is clearly understood and is viewed as a strategic asset.Enabling TechnologiesSupporting each of the Infrastructure Optimization Models are products, features and technologies that have been designed to facilitate your progression from a basic level of optimization through to a dynamic level.ServicesTogether, Microsoft Services and an extensive network of Microsoft technology partners provide industry-leading expertise to assist you with your optimization efforts. Microsoft Services has developed a number of Core IO service offerings based on industry best practices, plus Microsoft has established criteria and associated competencies in the Microsoft Partner Program to enable partners to certify that they have the required expertise in delivering advanced-infrastructure solutions.Tools and GuidanceMicrosoft has built an extensive set of resources that fit within the context of Core IO to help you deploy and manage solutions more effectively. These tools and solution guides are free and increase the likelihood of a successful implementation.
  • Data center management can contribute to the benefits of server infrastructure optimization in the following ways:Control CostsOptimal resource utilizationDecreased power consumptionImproved system efficiencyReduced hardware and software costsReduced maintenance staff and budgetBetter return on existing technology investmentsImprove Security and AvailabilityEffective and secure patchingGreater LOB system availabilityIncreased proactive IT managementHigh availability and disaster recovery at a reasonable costMinimized downtimeDesired configuration management to maximize uptime and securityFaster recovery from incidentsIncrease AgilityAutomated and accelerated management of user identitiesLess time responding reactively to issuesImproved responsiveness to requests to restore critical dataGreater efficiency through cross-platform interoperability
  • Transcript

    • 1. MMS201 Speaker Name Microsoft Corporation
    • 2. 1. To show how Infrastructure Optimization can help you IT Challenges address the key challenges facing your Core Infrastructure Optimization server infrastructure Server Infrastructure Solutions Overview 2. Prioritization To identify which server infrastructure solutions Next Steps are a priority for your organization Data Center Management Secure Messaging and Collaboration Information Protection and Secure Access 3
    • 3. Technology Regulatory change compliance Competition Security 20% New 80% Cost Keep business Maintenance reduction up and running Customer End-user connection productivity Business results and new value
    • 4. Enabling IT Professionals and Developers across the IT Lifecycle Service Unified and Virtualized Enabled Process-led, User Focused Model-driven Basic Standardized Rationalized Dynamic Cost Efficient Business Strategic center cost center enabler asset People. Process. Technology. 5
    • 5. Basic Standardized Rationalized Dynamic Uncoordinated, Managed IT Managed and Fully automated manual infrastructure with consolidated IT management, infrastructure limited automation infrastructure with dynamic resource maximum usage, business automation linked SLAs Dynamic IT More Efficient Strategic Asset Cost Center Business Enabler Cost Center
    • 6. Improve IT’s ability to Enable greater Simplify the task of securing respond to business automation and help and backing up the server changes by enabling drive down the costs environment ensuring centralized management, associated with availability throughout policy-based control, and maintaining, monitoring, the server infrastructure rapid configuration and coordinating and deployment IT management Basic Standardized Rationalized Dynamic More Cost Business Strategic Efficient Center Enabler Asset Cost Center
    • 7. Information Data Center Secure Messaging Protection and Management and Collaboration Secure Access Unified management Identity Lifecycle Multi-engine of physical and Management Anti-malware protection virtual servers Remote Access Secure Publishing Configuration Management Strong Authentication Information usage control Server Compliance Access Policy Enforcement Optimized End to End Monitoring Server Performance Information Protection Data Protection and Recovery model technologies services tools/guidance
    • 8. Configuration End-to-end Server Data Protection Management Compliance and Recovery Monitoring Proactive Automated Configuration Business Platform Provisioning Controls and Continuity through Monitoring and Updating Reporting Virtualization of Physical Application Centralized Management and Virtual and Service-level Security Auditing Backup Environments Monitoring Comprehensive and Recovery Server Interoperable Security and Disaster Recovery Consolidation and Extensible Identity and through Platform Access Virtualization Management
    • 9. Control Costs Easily virtualize the server operating system to facilitate workload consolidation with rapid deployment and provisioning Consolidate servers through virtualization to maximize resource utilization and simplify server management Improve Security and Availability Automate updating and patch management Automate server health monitoring, reduce error noise, isolate processes, improve diagnostics, and act on alerts effectively Quickly recover and restore the data center’s physical and virtual environment Increase Agility Monitor and manage large-scale server networks easily with tiered views of tens of thousands of servers Simplify and automate large-scale server software deployments with comprehensive tools to plan, test, deploy, analyze, and optimize server software
    • 10. Continental Airlines Case Study Solution Situation In the process of consolidating 80 Traditionally spent U.S. servers, creating a 3:1 savings $6 million to $8 million (saving of $2 million annually) annually on server deployments (typically Easy identification of servers that replacing about 250 have capacity for an additional legacy servers) workload through System Center Virtual Machine Manager Only 5 percent server utilization Greater than 50 percent utilization of server capacity “We’ll feel comfortable topping utilization at 70 to 75 percent.” Danish Foreign Ministry Reduced Saved $500k in Cut help-desk Cut deployment Cut update time backup time deployment costs by 35% time by 73% by 90% by 50% costs
    • 11. Secure Messaging Secure Collaboration Comprehensive protection against Malware protection both inside malware and SPAM that eliminates the firewall or passed along by single points of failure with a multi- trusted partners engine architecture Content filtering to maintain Secure remote access compliance by controlling the sharing or storage of Protection for sensitive information inappropriate materials with end-user usage controls Multi-engine architecture to Powerful monitoring and reporting eliminate single points of failure to proactively address issues Information usage control
    • 12. Control Costs Simplify management Increase end-user “up time” due to fewer security issues Increase regulatory compliance Improve Security and Availability Provide better security through layered protection Secure and make messaging and collaboration more reliable Protect confidential data – not just against threats Increase Agility Increase server performance Secure information sharing beyond the firewall Enhance productivity through remote access to messaging and collaboration tools
    • 13. Del Monte Foods Case Study Situation Solution Del Monte Foods distributes and sells The organization implemented a food and pet products throughout comprehensive security solution based on Microsoft Forefront™ Security and the United States. The company employs 7,800 salaried and 9,800 Microsoft System Center products seasonal workers Multiple antivirus engines Because of the critical nature of their In-depth file and keyword filtering, and messaging and collaboration optimized antivirus performance for the environment, system security has Exchange Server 2007 environment become a priority for Del Monte Needed to ensure that critical systems had no downtime Migrated to Microsoft Forefront Security for Exchange Server Expects to cut downtime of e-mail infrastructure by 20% to 30% “With the multiple simultaneous scan engines in Forefront Security for Exchange Server, we did not have a single virus infection.” Petr Grachev, CIO, SOK Group
    • 14. Identity Information Secure Management Protection Access Protect confidential data Increase security through Synchronize identities in Office and Exchange multi-factor authentication and passwords Enforce usage and Streamline access through Automate account distribution policy for universal passwords and provisioning and documents and e-mails Web single sign-on credential management Automatically apply usage Secure remote access to Provide self-service for policies to documents stored SharePoint and Exchange access management, user in SharePoint® Server profiles, passwords, and Secure remote access smart-card PINs Provide fine-grained access through SSL VPN control based on end-point Manage workflow via Federate access control compliance inspection Office and SharePoint to partners and customers 15
    • 15. Control Costs Automate lifecycle management of user identities Centralize management across multiple enterprise systems and line-of-business (LOB) applications Improve Security and Availability Provide network-perimeter protection, strong authentication, and identity management Control access by role and job level Improve governance and regulatory compliance Increase Agility Provide secure access and collaboration with partners Increase access to systems, enabling information workers to do more Empower information workers to get their jobs done whenever and wherever needed
    • 16. DOW CORNING CASE STUDY Situation Solution Dow Corning needed The company deployed Active to make it easy for Directory® Rights Management employees to share Services in Windows Server® 2008, information while which enables users to limit how following the company’s others can open, modify, print, forward, information-protection or take other actions with content policies, which dictate Benefits include ease of use, minimal how intellectual property added infrastructure and complexity, must be protected extensibility to business partners, full corporate control and auditability, ease of management, and low total cost of ownership
    • 17. Unified and Comprehensive Covers functions needed to optimize your infrastructure: Operating systems, virtualization, management, security, identity, and access Spans the breadth of your infrastructure: Desktop, server, mobile devices, application platform, and security Interoperable by Design Our products have always worked well together Compliant with industry standards by design Trusted and Familiar Reduces IT Support and end user training costs Maximizes productivity
    • 18. Information Data Center Secure Messaging Protection and Management and Collaboration Secure Access Unified management of Multi-engine Identity Lifecycle physical and virtual servers Anti-malware protection Management Configuration Management Secure Publishing Remote Access Server Compliance Information usage control Strong Authentication End to End Monitoring Optimized Server Access Policy Enforcement Performance Disaster Recovery Information Protection model technologies services tools/guidance
    • 19. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

    ×