The document discusses enabling consumerization in the enterprise by allowing employees to use personal devices for work. It outlines challenges like ensuring security and compliance when devices are unmanaged. It then presents strategies for isolating devices and data, providing access to corporate applications, and enforcing policies. These include virtualization, mobile device management through Exchange, and using technologies like Network Access Protection and Rights Management to isolate networks and protect sensitive data.
Happiest Minds have worked extensively with Industrial and Manufacturing companies to provide customized and value rich IoT consulting and product assessment services. Our comprehensive tools and frameworks combined with our talent rich pool of IoT consultants have helped shape the IoT journeys of our customers.
Windows 7 And Windows Server 2008 R2 Combined ValueAmit Gatenyo
The document discusses Windows 7 and Windows Server 2008 R2 solutions for mobile workers and IT professionals. It describes technologies like DirectAccess that allow remote access, BranchCache to improve bandwidth usage, and AppLocker for application control. Remote Desktop Services is introduced as a way to deliver applications and desktops virtually. The solutions aim to enhance user productivity for mobile workforces while reducing costs and improving manageability for IT professionals.
EPC Group Intune Practice and Capabilities OverviewEPC Group
Microsoft Intune is a cloud-based service that allows organizations to securely manage devices, apps, and corporate data. It provides mobile device management, mobile application management, and PC management. Intune helps enable employee productivity while keeping corporate information secure across devices and platforms through features like device enrollment, app deployment, policy management, and data protection.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
The consumerization of IT is under way. Workers want tablet access to business applications, often from personal devices. Learn why VPNs are not ideal for mobile connectivity and why remote desktop is a more secure, less expensive approach to tablet access that is easier to deploy, manage and use.
This document provides an overview and introduction to Windows 7. It discusses how Windows 7 was developed with a focus on end-user scenarios, predictability, and engaging partners earlier. Key features highlighted include enhancements to security, deployment, management, productivity, and virtualization. The goals of Windows 7 are to enhance security and control, make users productive anywhere, and streamline PC management.
Casey Johnson has experience as an enterprise architect, senior technical analyst, and systems engineer. He has led projects involving Active Directory design, end-user device standardization, clinical workflow automation software, and the deployment of 2-factor authentication tokens. He has built and maintained critical technology infrastructure including a 5,000+ user Citrix XenApp VDI infrastructure and multi-site disaster recovery systems.
Happiest Minds have worked extensively with Industrial and Manufacturing companies to provide customized and value rich IoT consulting and product assessment services. Our comprehensive tools and frameworks combined with our talent rich pool of IoT consultants have helped shape the IoT journeys of our customers.
Windows 7 And Windows Server 2008 R2 Combined ValueAmit Gatenyo
The document discusses Windows 7 and Windows Server 2008 R2 solutions for mobile workers and IT professionals. It describes technologies like DirectAccess that allow remote access, BranchCache to improve bandwidth usage, and AppLocker for application control. Remote Desktop Services is introduced as a way to deliver applications and desktops virtually. The solutions aim to enhance user productivity for mobile workforces while reducing costs and improving manageability for IT professionals.
EPC Group Intune Practice and Capabilities OverviewEPC Group
Microsoft Intune is a cloud-based service that allows organizations to securely manage devices, apps, and corporate data. It provides mobile device management, mobile application management, and PC management. Intune helps enable employee productivity while keeping corporate information secure across devices and platforms through features like device enrollment, app deployment, policy management, and data protection.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
The consumerization of IT is under way. Workers want tablet access to business applications, often from personal devices. Learn why VPNs are not ideal for mobile connectivity and why remote desktop is a more secure, less expensive approach to tablet access that is easier to deploy, manage and use.
This document provides an overview and introduction to Windows 7. It discusses how Windows 7 was developed with a focus on end-user scenarios, predictability, and engaging partners earlier. Key features highlighted include enhancements to security, deployment, management, productivity, and virtualization. The goals of Windows 7 are to enhance security and control, make users productive anywhere, and streamline PC management.
Casey Johnson has experience as an enterprise architect, senior technical analyst, and systems engineer. He has led projects involving Active Directory design, end-user device standardization, clinical workflow automation software, and the deployment of 2-factor authentication tokens. He has built and maintained critical technology infrastructure including a 5,000+ user Citrix XenApp VDI infrastructure and multi-site disaster recovery systems.
The document summarizes a webinar about maintaining oversight of company assets and remote workers. It introduces the speakers and discusses how the rise of remote work due to COVID-19 has impacted organizations. Challenges of remote work mentioned include lack of visibility into endpoints, application deployment, security, and providing adequate support. The webinar then presents Ivanti Asset Management as a solution that provides unified IT management, asset visibility, and insight into systems from a centralized dashboard. It collects data from multiple sources to monitor assets across their lifecycles. The presentation concludes with a Q&A and announcement of a free trial offer of Ivanti's remote work solutions.
Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate resources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions.
As a systems integrator or reseller, your customers place a considerable amount of trust in the services you recommend and implement. And nothing is more frustrating for you or your customers than those services not responding to integration queries. And in other cases, competing against you for the same service contracts.
If you are one of the many systems integrators or resellers who are unsure of BigFix's enterprise endpoint management product or how you will be supported after the HCL acquisition, Ivanti can help.
This document discusses the benefits of cloud computing for desktop IT professionals and managing business PCs. It provides an overview of cloud computing and compares traditional IT infrastructure to cloud services. It then discusses challenges in managing business PCs and how Windows Intune and Windows 7 can help address these challenges by providing simple administration, security updates, and enabling mobility. Finally, it compares Windows Intune to on-premises solutions and provides licensing and pricing information.
Happiest Minds Technologies is a digital transformation, infrastructure, security, and product engineering services company. The company was founded by Ashok Soota In 2011. It is headquartered In Bangalore, India and has its operations in the United States, United Kingdom, Canada, Singapore, and Australia.
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
The document discusses document management challenges in the maritime industry and how EMC Documentum solutions can help address them. It notes the need for effective information governance to facilitate audits, comply with regulations, and ensure security and litigation readiness given massive information growth. EMC Documentum is presented as a solution with enterprise content management, intelligent platform, and compliance services to manage the full content lifecycle and ensure controlled access across distributed organizations like commercial vessel operators.
How to deploy Windows Mobile to 40,000 usersjasonlan
This document summarizes a presentation about deploying mobile devices at large scale using Microsoft Exchange Server and Windows Mobile. The presentation covers infrastructure requirements, procurement considerations, provisioning tools, device management, support needs, and lessons learned from Microsoft's internal deployment of over 40,000 mobile devices. Effective planning of infrastructure, standardized device selection, centralized management capabilities, and end-user support are key to a successful large-scale mobile rollout.
Enterprise Mobility Suite is a new technology provided by Microsoft to maintain and manage users access to corporate information through their personal devices.
In this way users obtain the dynamic experience they are looking for and IT Managers ensure that corporate data is safe.
The document discusses Windows Intune, a cloud-based PC and mobile device management service from Microsoft. It outlines new Windows Intune licensing options available in early 2013, including bundling Intune with System Center Configuration Manager. It also provides an overview of the top sales scenarios for Intune which are managing unmanaged PCs, mobile device management, and smoother Office 365 deployment. Finally, it encourages partners to prepare for and promote Intune through technical training, marketing tools, and customer demonstrations to take advantage of licensing incentives.
Empower Enterprise Mobility with Microsoft EMSKris Wagner
This document discusses Microsoft's Enterprise Mobility Suite (EMS) solution for managing mobile devices and enabling a productive mobile workforce. EMS provides hybrid identity management, mobile device and application management, access and information protection. It allows single sign-on, self-service password reset, and centralized application access management. EMS also provides remote device management for Windows, iOS and Android devices and helps protect corporate data on devices through features like selective wiping. The solution aims to foster employee productivity through mobility while ensuring security.
Top 10 Enterprise Features of Windows Mobile 6jasonlan
The document provides a summary of the top 10 features of Windows Mobile 6 for enterprise customers. It discusses enhanced messaging, Office Mobile, security capabilities, calendaring features, browser improvements, Windows Mobile updates, Remote Desktop functionality, the Windows Mobile Device Center, accessing documents on mobile devices, and using devices as internet modems.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
This document provides an overview of new features in Windows 7 including the virtual PC, security improvements, performance monitoring tools, networking capabilities, and Internet Explorer 8. It discusses how Windows 7 addresses issues with accessing corporate resources remotely, improving branch office network performance, and integrating desktop and enterprise search. The document is presented by Amit Gatenyo from Dario IT Solutions and provides contact information.
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
The advent of hybrid clouds, multi clouds and app driven business models hasnecessitated a network that has to be robust, secure and scalable to meet rapidly changing business expectations.
The document discusses data protection challenges and solutions from Dell. It notes that 23% of respondents desire increased reliability of backups/recoveries and 22% wish for increased speed or frequency of backups. Dell's data protection approach claims to restore applications and data 6x faster than legacy solutions with near-zero downtime. It provides extensible protection across physical, virtual and cloud in one solution. Dell solutions aim to help customers spend less, operate with more agility, and unlock time in their day.
Microsoft Intune provides mobile device management (MDM) capabilities for Office 365. It allows organizations to enroll mobile devices used by employees and set policies to control access to corporate resources. Intune integrates with Azure Active Directory and Office 365 to enable features like conditional access control, selective wiping of Office 365 data from devices while leaving personal data intact, and reporting on device compliance. It also provides broader mobile application management and mobile PC management capabilities through integration with System Center Configuration Manager.
New Horizons for End-User Computing Event - VMwareArrow ECS UK
Three trends are forcing massive changes on IT: new device platforms beyond Windows, new user expectations around collaboration and productivity, and new apps like SaaS and mobile apps. This is shifting how work gets done from centralized desktops to diverse devices, apps, and work from anywhere. IT now has to manage a more diverse end-user landscape with personal and corporate devices, diverse apps and platforms, and data everywhere. VMware's vision is to enable files, apps and state to follow users intelligently and securely across all devices. The Horizon product family, including Horizon View, Mirage, and Workspace, provides a platform for workforce mobility to transform, deliver, and broker centralized services to empower mobile workforces.
Windows 7 provides several new features to improve security, mobility, and manageability for IT professionals and end users. Key features include DirectAccess for seamless remote access, BranchCache to optimize bandwidth usage in branch offices, BitLocker and BitLocker To Go for data encryption, and AppLocker for application control. Windows 7 also includes enhancements to User Account Control, auditing, and network security to provide a more secure platform overall. These new capabilities are designed to help IT professionals securely manage mobile and distributed workforces while also improving the user experience.
The document summarizes key aspects of the development and features of Windows 7. It discusses Microsoft taking a longer planning phase, focusing on scenarios over individual features. Windows 7 will provide greater predictability through a 3-year development cycle and earlier partner involvement. New features include improved deployment tools, enhanced security like BitLocker and AppLocker, simplified administration through Windows PowerShell, and usability features like libraries and jump lists.
The document summarizes a webinar about maintaining oversight of company assets and remote workers. It introduces the speakers and discusses how the rise of remote work due to COVID-19 has impacted organizations. Challenges of remote work mentioned include lack of visibility into endpoints, application deployment, security, and providing adequate support. The webinar then presents Ivanti Asset Management as a solution that provides unified IT management, asset visibility, and insight into systems from a centralized dashboard. It collects data from multiple sources to monitor assets across their lifecycles. The presentation concludes with a Q&A and announcement of a free trial offer of Ivanti's remote work solutions.
Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate resources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions.
As a systems integrator or reseller, your customers place a considerable amount of trust in the services you recommend and implement. And nothing is more frustrating for you or your customers than those services not responding to integration queries. And in other cases, competing against you for the same service contracts.
If you are one of the many systems integrators or resellers who are unsure of BigFix's enterprise endpoint management product or how you will be supported after the HCL acquisition, Ivanti can help.
This document discusses the benefits of cloud computing for desktop IT professionals and managing business PCs. It provides an overview of cloud computing and compares traditional IT infrastructure to cloud services. It then discusses challenges in managing business PCs and how Windows Intune and Windows 7 can help address these challenges by providing simple administration, security updates, and enabling mobility. Finally, it compares Windows Intune to on-premises solutions and provides licensing and pricing information.
Happiest Minds Technologies is a digital transformation, infrastructure, security, and product engineering services company. The company was founded by Ashok Soota In 2011. It is headquartered In Bangalore, India and has its operations in the United States, United Kingdom, Canada, Singapore, and Australia.
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
The document discusses document management challenges in the maritime industry and how EMC Documentum solutions can help address them. It notes the need for effective information governance to facilitate audits, comply with regulations, and ensure security and litigation readiness given massive information growth. EMC Documentum is presented as a solution with enterprise content management, intelligent platform, and compliance services to manage the full content lifecycle and ensure controlled access across distributed organizations like commercial vessel operators.
How to deploy Windows Mobile to 40,000 usersjasonlan
This document summarizes a presentation about deploying mobile devices at large scale using Microsoft Exchange Server and Windows Mobile. The presentation covers infrastructure requirements, procurement considerations, provisioning tools, device management, support needs, and lessons learned from Microsoft's internal deployment of over 40,000 mobile devices. Effective planning of infrastructure, standardized device selection, centralized management capabilities, and end-user support are key to a successful large-scale mobile rollout.
Enterprise Mobility Suite is a new technology provided by Microsoft to maintain and manage users access to corporate information through their personal devices.
In this way users obtain the dynamic experience they are looking for and IT Managers ensure that corporate data is safe.
The document discusses Windows Intune, a cloud-based PC and mobile device management service from Microsoft. It outlines new Windows Intune licensing options available in early 2013, including bundling Intune with System Center Configuration Manager. It also provides an overview of the top sales scenarios for Intune which are managing unmanaged PCs, mobile device management, and smoother Office 365 deployment. Finally, it encourages partners to prepare for and promote Intune through technical training, marketing tools, and customer demonstrations to take advantage of licensing incentives.
Empower Enterprise Mobility with Microsoft EMSKris Wagner
This document discusses Microsoft's Enterprise Mobility Suite (EMS) solution for managing mobile devices and enabling a productive mobile workforce. EMS provides hybrid identity management, mobile device and application management, access and information protection. It allows single sign-on, self-service password reset, and centralized application access management. EMS also provides remote device management for Windows, iOS and Android devices and helps protect corporate data on devices through features like selective wiping. The solution aims to foster employee productivity through mobility while ensuring security.
Top 10 Enterprise Features of Windows Mobile 6jasonlan
The document provides a summary of the top 10 features of Windows Mobile 6 for enterprise customers. It discusses enhanced messaging, Office Mobile, security capabilities, calendaring features, browser improvements, Windows Mobile updates, Remote Desktop functionality, the Windows Mobile Device Center, accessing documents on mobile devices, and using devices as internet modems.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
This document provides an overview of new features in Windows 7 including the virtual PC, security improvements, performance monitoring tools, networking capabilities, and Internet Explorer 8. It discusses how Windows 7 addresses issues with accessing corporate resources remotely, improving branch office network performance, and integrating desktop and enterprise search. The document is presented by Amit Gatenyo from Dario IT Solutions and provides contact information.
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
The advent of hybrid clouds, multi clouds and app driven business models hasnecessitated a network that has to be robust, secure and scalable to meet rapidly changing business expectations.
The document discusses data protection challenges and solutions from Dell. It notes that 23% of respondents desire increased reliability of backups/recoveries and 22% wish for increased speed or frequency of backups. Dell's data protection approach claims to restore applications and data 6x faster than legacy solutions with near-zero downtime. It provides extensible protection across physical, virtual and cloud in one solution. Dell solutions aim to help customers spend less, operate with more agility, and unlock time in their day.
Microsoft Intune provides mobile device management (MDM) capabilities for Office 365. It allows organizations to enroll mobile devices used by employees and set policies to control access to corporate resources. Intune integrates with Azure Active Directory and Office 365 to enable features like conditional access control, selective wiping of Office 365 data from devices while leaving personal data intact, and reporting on device compliance. It also provides broader mobile application management and mobile PC management capabilities through integration with System Center Configuration Manager.
New Horizons for End-User Computing Event - VMwareArrow ECS UK
Three trends are forcing massive changes on IT: new device platforms beyond Windows, new user expectations around collaboration and productivity, and new apps like SaaS and mobile apps. This is shifting how work gets done from centralized desktops to diverse devices, apps, and work from anywhere. IT now has to manage a more diverse end-user landscape with personal and corporate devices, diverse apps and platforms, and data everywhere. VMware's vision is to enable files, apps and state to follow users intelligently and securely across all devices. The Horizon product family, including Horizon View, Mirage, and Workspace, provides a platform for workforce mobility to transform, deliver, and broker centralized services to empower mobile workforces.
Windows 7 provides several new features to improve security, mobility, and manageability for IT professionals and end users. Key features include DirectAccess for seamless remote access, BranchCache to optimize bandwidth usage in branch offices, BitLocker and BitLocker To Go for data encryption, and AppLocker for application control. Windows 7 also includes enhancements to User Account Control, auditing, and network security to provide a more secure platform overall. These new capabilities are designed to help IT professionals securely manage mobile and distributed workforces while also improving the user experience.
The document summarizes key aspects of the development and features of Windows 7. It discusses Microsoft taking a longer planning phase, focusing on scenarios over individual features. Windows 7 will provide greater predictability through a 3-year development cycle and earlier partner involvement. New features include improved deployment tools, enhanced security like BitLocker and AppLocker, simplified administration through Windows PowerShell, and usability features like libraries and jump lists.
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
Windows 7 provides improved security features for IT professionals to securely manage networks and protect data. It builds on the security foundations of Windows Vista with enhancements such as streamlined user account control, enhanced auditing capabilities, new remote access features like DirectAccess, and data protection tools including AppLocker, Internet Explorer 8, and expanded BitLocker and RMS capabilities. These features allow organizations to securely manage networks and infrastructure, protect users and data, and provide secure access to corporate resources from any location.
This document summarizes a presentation about developing a complete desktop strategy. It discusses challenges like managing costs during a Windows 7 migration and ensuring applications and data are securely accessible from anywhere. It promotes using the Microsoft Desktop Optimization Pack and cloud services to provide end-to-end PC management, security, mobility and optimization of existing investments. Virtualization techniques like application virtualization and virtual desktop infrastructure are presented as key tactics to maximize flexibility. The presentation encourages evaluating these Microsoft solutions in a proof of concept to modernize the desktop strategy.
The document provides an overview of Windows 7 and resources for IT professionals. It discusses key features like DirectAccess for secure remote access, VPN Reconnect for seamless connectivity, BranchCache to optimize WAN usage, and AppLocker for application control. It also summarizes security features such as BitLocker, Network Access Protection, Desktop Auditing, and Internet Explorer 8 improvements. Resources like the Springboard series are highlighted to help IT professionals deploy and manage Windows 7.
Silambarasan V is a system administrator with over 5 years of experience in IT fields such as system administration, technical support, and desktop support. He has worked for various companies in Chennai and Bangalore, including his current role at HCL Services Ltd since 2014. He holds an MCITP certification and a B.Tech in Information Technology. His skills include Windows server administration, Active Directory, networking, virtualization, backup administration, and troubleshooting. He is looking for a role that leverages his technical and communication skills.
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
The document provides an agenda and overview for a webinar on migrating to a virtualized modern desktop. It includes:
- An introduction from Mark Skelton of OCSL and a discussion of EUC market trends and product offerings from Citrix, VMware, and Microsoft by Simon Gray.
- A summary and conclusions section led by Mark Skelton.
- Information on participating in a live Q&A on Twitter after the webinar using @OCSL_UK and #AskOCSL to discuss desktop virtualization strategies.
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
I denne sesjonen vil vi se på hvordan hvordan vi tilrettelegger for Modern Management med Azure Active Directory, Microsoft Intune og Windows 10. Vi vil se på hvordan vi med Azure AD etablerer Identitets- og Tilgangskontroll, Selvbetjening og tilgang til Applikasjoner. Videre vil vi se på hvordan nye Azure AD sammen med Intune fungerer i […]
The document provides an overview of new features and improvements in Windows 7, including:
- Improved compatibility with software and hardware that runs on Windows Vista
- Focus on quality, reliability, security, and driver improvements
- New development process with earlier partner engagement
- Enhancements for the enterprise like easier migration and virtualization support
- Mobility features like DirectAccess for remote access and BranchCache for branch office networking
- PowerShell 2.0 with new features and remote execution capability
- Improved data protection, application control, and troubleshooting tools
- Enhanced battery life and display functionality
- Virtual desktop infrastructure and Windows Virtual PC for application compatibility
The document provides an overview of new features and enhancements in Windows 7, including:
- Improved compatibility with software and hardware that runs on Windows Vista
- Focus on quality, reliability, security, and driver improvements
- New development process with earlier partner engagement and more certainty in release schedule
- Enhancements for the enterprise like easier migration, virtualization, and mobility features
- PowerShell 2.0 includes a graphical interface and improved security, portability, and remote execution
- Group Policy improvements including application and data control, encryption, and preferences
- Troubleshooting and manageability tools with remote capabilities
SMBTechEdge is an affordable and customizable infrastructure suite developed by Safew Technology Labs to provide technology solutions for small and medium sized businesses. It aims to address issues with existing IT solutions such as high costs, vendor locking, and lack of security. The suite provides open source software for servers, desktops, email, backup/recovery, and business processes like CRM and accounting. It is supported by partners Canonical and Intel and can be customized to meet different business needs.
Maninder Singh is a highly accomplished technical consultant with over 10 years of experience managing complex IT projects for financial and education clients. He has extensive experience implementing data center, network, and IT management systems. His areas of expertise include Windows servers, Active Directory, networking, Microsoft Office, and hardware like Dell servers. Currently he is the IT Operations Manager for Bestseller Retail India, overseeing technical support for 59 stores across North and East India. Previously he held system engineer roles providing desktop and network support for clients like IBM, Bajaj Allianz Life Insurance, and Fullerton India.
Maninder Singh is a highly accomplished technical consultant with over 10 years of experience managing complex IT projects for financial and education clients. He has extensive experience implementing data center, network, and IT management systems. His areas of expertise include Windows servers, Active Directory, networking, Microsoft Office, and hardware like Dell servers. Currently he is the IT Operations Manager for Bestseller Retail India, overseeing technical support for 59 stores across North and East India. Previously he held system engineer roles providing desktop and network support for clients like IBM, Bajaj Allianz Life Insurance, and Fullerton India.
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
Introducing Windows 10 Enterprise E3 for CSP
More than 350 million active devices are running Windows 10 and our business customers are moving faster than ever before, with more than 96% of them in active pilots. And, Windows 10 customers are already experiencing improved productivity and cost savings with an average ROI of 188% with a 13-month payback.*
In most instances, organizations are moving quickly to Windows 10 due to the heightened security risks they face and the industry-leading security features in Windows 10 that can help protect them. Companies of all sizes face real security threats from sophisticated hackers and cyber-terrorists, costing an average of $12 million an incident. In the US alone there are more than 56 million small to mid-sized businesses, in critical sectors like healthcare, legal and financial services that need strong security similar to what our large enterprise customers get through volume licensing agreements.
Partners can now offer their business customers the ‘full IT stack’ from Microsoft, including Windows 10, Office 365, Dynamics Azure and CRM as a per user, per month offering through a single channel, which businesses can scale up or down as their needs change. Key features include:
Increased Security: Offering the sophisticated security features of Windows 10 to help businesses secure sensitive data and identities, help ensure devices are protected from cybersecurity threats, give employees the freedom and flexibility to access sensitive data on a variety of devices, and help ensure controlled access to highly-sensitive data.
Simplified Licensing & Deployment: Helping businesses lower up-front costs, eliminating the need for time-consuming device counting and audits, and making it easier to stay compliant with a subscription-based, per-user licensing model. This new offering allows businesses to easily move from Windows 10 Pro to Windows 10 Enterprise E3 without rebooting.
Partner-managed IT: Configuring and managing devices by a partner experienced in Windows 10 and cloud deployments. Partners can also help businesses develop a device security and management strategy with the unique features of Windows 10. Businesses can view subscriptions and usage for Windows 10 Enterprise, and any other Microsoft cloud services purchased, in their partner portal for easier management with one contract, one user account, one support contact, and one simplified bill.
The document discusses OpenText Core, a cloud-based content management and file sharing platform. It notes that organizations are increasingly moving business data and processes to the cloud. OpenText Core provides secure file storage, collaboration features like desktop editing, and administrative controls for file access management. The platform aims to simplify content management and sharing across devices through an intuitive interface in the OpenText cloud.
Overview: Woolpack private cloud services
Enables Virtual Data Centers (VDCs)
User friendly Web based Graphical user interface for management
Robust functionality and High level of security
Simulation of various hardware configurations
Provision for huge number of Linux/Windows M/c
Management of multiple storage backend
Best in class integrated solution because of strategic Partnerships
Utilization of existing investments virtualization solutions
Low CAPEX, Low OPEX and Very High ROI
Charges only for the service and not the software
The document compares and contrasts XenDesktop and VMware VDI for virtual desktop solutions. It discusses how virtual desktop technology allows centralized management and standardization of desktop images. It also covers the benefits of virtual desktops such as reducing costs, improving security and flexibility, and enhancing productivity compared to traditional desktop management approaches.
Introduction to Microsoft 365 BusinessRobert Crane
This document provides an introduction to Microsoft 365 and discusses the technology challenges faced by small and mid-sized businesses today, such as keeping technology up-to-date, managing a mobile workforce, and protecting sensitive data from cyber threats. It presents Microsoft 365 as an integrated solution that can empower employees, safeguard businesses, and simplify IT management through tools like Office 365, Windows 10, and Enterprise Mobility + Security. Microsoft 365 Business is positioned as a complete solution for small and mid-sized businesses that includes productivity apps, device management, security capabilities, and support.
Windows 7 provides enhanced security features for IT professionals to securely manage access and protect data and infrastructure. It includes a fundamentally secure platform with strengthened access controls and auditing. Windows 7 also enables securing access from any location through improved network security, protection of mobile devices, and direct secure access. Additional features protect users and infrastructure through application control and data recovery tools, as well as protecting data from unauthorized viewing using encryption and information rights management.
Sanjeev Kumar is an experienced IT professional with over 6 years of experience in system administration, system engineering, and virtualization technologies like VMware. He has extensive experience implementing and managing Windows server environments, including Active Directory, DNS, DHCP, and GPO administration. He is proficient in client operating systems like Windows 7/8 and server operating systems such as Windows Server 2003/2008/2012. Kumar holds several technical certifications and has worked in various roles supporting Windows server and desktop environments.
Planning customizing office 2010 for your environment onlineStephen Rose
This document discusses planning and deploying Microsoft Office 2010. It provides an overview of Office 2010 features and investments in performance and security. It then discusses various tools available for planning, customizing, managing, and deploying Office 2010, including the Office Customization Tool, Security Compliance Manager, and Microsoft Assessment and Planning Toolkit. It also covers considerations for 32-bit vs. 64-bit deployment and activation methods like Volume Licensing and KMS. The document aims to help IT professionals successfully plan and rollout Office 2010 in their organizations.
This document provides summaries of new and upcoming features in Microsoft Desktop Optimization Pack (MDOP) 2011, including:
- App-V 4.6 SP1 which includes package accelerators for easier application packaging and templates for reusing common settings.
- MED-V 2.0 which is an enterprise-class OS compatibility solution that allows running legacy applications on Windows 7.
- Microsoft Asset Inventory Service which provides software asset inventory and licensing reports.
- Microsoft BitLocker Administration and Monitoring which streamlines BitLocker management and key recovery.
- Microsoft Diagnostics & Recovery Toolset (DART) 7.0 which provides tools to accelerate desktop repair on-site or remotely.
This document discusses various tools for deploying Windows 7 and Office 2010, including MDT, WDS, MAP, ACT, and SCCM. It explains what each tool is used for, such as MAP for inventorying systems and ACT for testing application compatibility. The document then discusses challenges of the deployment like migrating users and applications to the new systems. It provides recommendations on using tools like MDT and hard link migration to automate much of the process and minimize downtime for users.
The document provides an overview of Office 2010, discussing its improved performance, security features, and deployment options. Key points include enhanced speed through multi-core CPU and GPU support; a protected viewer for opening untrusted files; flexible retention policies and mail filtering; and deployment tools like App-V sequencing to virtualize applications. It also outlines an end user readiness framework including training content, guides, and events to help adoption.
This document discusses several Microsoft technologies for desktop management:
- Group Policy allows centralized management of configurations, files, registry settings and more across an organization. It includes over 2,800 policy settings.
- Advanced Group Policy Management provides versioning and change management for Group Policies.
- DirectAccess allows transparent access to internal resources without a VPN. It supports IPv6 and IPv4 connections.
- Network Access Protection enforces compliance of devices connecting to the network.
- BranchCache caches content at branch offices for faster access.
- AppLocker controls which applications can run on devices through configurable rules.
- BitLocker encrypts drives and supports multiple unlock options including smart cards and domain recovery.
Deploying An Optimized Desktop - XP to 7 With P2VStephen Rose
The document discusses various options for migrating from Windows XP to Windows 7, including:
1. Upgrading sequentially from XP to Vista to Windows 7 using setup.exe, which risks applications breaking and hardware issues.
2. Doing a manual migration and install from DVD, which is slow and tedious.
3. Drive cloning based on a reference Windows 7 install, which is fast but requires managing many images.
4. Automated migration tools that move applications, drivers and user data, which is the best option but requires upfront work to package applications and manage drivers.
Everything You Ever Wanted To Know About Application CompatibilityStephen Rose
This document discusses various application compatibility solutions for migrating to Windows 7, including Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), and the Application Compatibility Toolkit (ACT). It provides an overview of each solution, how they work, their benefits, and how they can help address application compatibility challenges during a Windows 7 migration. App-V provides application isolation and streaming. MED-V creates a virtual Windows XP environment for applications not compatible with Windows 7. ACT helps identify and resolve application compatibility issues through shims and standard user analyzer.
This document summarizes Office 2010 for IT professionals, including:
- Improved performance and security over Office 2007 through features like 64-bit support, GPU acceleration, and protected viewing.
- Easier deployment through tools to assess application compatibility and file readiness for migration to Office 2010.
- Increased manageability including new security features for information control and compliance as well as virtualization support through App-V.
- Enhanced productivity across devices through web and mobile apps that integrate with SharePoint and Exchange.
The document provides an overview of Microsoft Application Virtualization (App-V) and Microsoft Enterprise Desktop Virtualization (MED-V). It discusses how App-V streams individual applications virtually while MED-V virtualizes the entire Windows operating system. App-V provides benefits like isolating applications and reducing conflicts, while MED-V allows running applications not supported on a new OS and accelerates OS upgrades. The document also compares the key differences between App-V and MED-V.
This document provides information about Microsoft certification programs for various Microsoft technologies including Windows 7, Office 2010, Exchange Server 2010, SharePoint 2010, and Office Communications Server 14. It outlines the exams and requirements to earn certifications in these areas and provides recommendations for learning resources like courses, books, and eLearning to help prepare. The document encourages IT professionals to pursue certification to prove their skills and stresses that there is no advantage to not getting certified.
The document discusses troubleshooting performance issues for SQL Server. It begins with an introduction and case study on the MS Society of Canada's website. It then discusses optimizing the environment, using Performance Monitor (PerfMon) to monitor performance, and concludes with recommendations to address issues like high CPU usage, slow disk speeds, and insufficient memory.
This presentation provides an overview of virtualization and demonstrates how to set up a virtual environment. It discusses the benefits of virtualization for development and testing. The demonstration shows how to install Windows Server 2003 and Windows XP in virtual machines, configure the virtual network and domain, and test applications across the virtual environment. Optimizing virtual machine resources and migrating physical servers to virtual machines are also covered.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
2. Life and Work are Becoming Indistinguishable At home… At work… And anywhere in between
3. Challenges How do I… Address the work/life blur? Ensure anywhere productivity? Protect data and maintain compliance? Handle PC and device management?
4. Unmanaged Devices Have Hidden Costs Business Risks Theft Security Privacy Corporate and government regulatory compliance Intellectual property (IP) protection IT Challenges Unknown patched state Unknown application vendors Unknown application compatibility Complexity to access corporate data Unique management requirements for each device
5. Consider the Essentials Create the Conditions for Success. How will you control access to sensitive data? How will you manage data backup/restore? DATA How will you deliver business applications? How will you support compliance reporting? APPS Who owns the IP on the device? Who fixes the device if it breaks? OS/HW How will you enforce network security? NETWORK
6. Understand Principles to Enable Consumerization Access to CorporateInformation based on: Who you are Read, Read/Write, Full Access How much you trust the device Unmanaged, Managed, Partially Managed Where the device is Corporate network Internet Untrusted network
7. Evaluate Enabling Technologies Enabling Technologies Can Help. Virtualization CloudComputing EnterpriseManagement Terminal ServerComputing Support User Choice Manage the Essentials
8. Using Technology to Enable Consumerization Isolate Devices and Data Server andDomainIsolation (IPSec) Network AccessProtection (NAP) Rights Management Service Access toCorporateApplications Unified AccessGateway (UAG) Terminal ServerAccess Gateway (TSG) Virtual Desktop Infrastructure (VDI) Enforce Policy Password Policy Remote Wipe Authorized Device 1 2 3
10. SCCM 2012: Mobile Device Management Through Exchange Provide basic management for all Exchange ActiveSync (EAS) connected devices Features Supported: Discovery/Inventory Settings policy Remote Wipe Supports on-premises Exchange 2010 and hosted Exchange
11. Announcing: SCCM 2012 . ‘Light’ Management support EAS Based policy delivery Support includes: Discovery/Inventory Settings policy Remote Wipe
14. Servers withSensitive Data ServerIsolation HR Workstation ManagedComputer ManagedComputer Domain Isolation Isolate: IPSec Server and Domain Isolation Define the logical isolation boundaries Distribute policiesand credentials Managed computerscan communicate Block inbound connectionsfrom untrusted Enable tiered-accessto sensitive resources Active DirectoryDomain Controller CorporateNetwork Resource Server X Unmanaged X Untrusted
15. Isolate: Network Access Protection Policy Serverse.g., Patch, AV 1 1 Access requested Health state sent to NPS (RADIUS) NPS validates against health policy If compliant, access granted If not compliant, restricted network access and remediation Microsoft NPS 3 2 Remediation Serverse.g., Patch 5 Not policy compliant 2 3 RestrictedNetwork 4 Policy compliant DCHP, VPN Switch/Router Corporate Network 5 4
17. Data Isolation: Rights Mgmt Server 1. Author receives a client licensor certificate the“first time” they rights-protect information Active Directory SQL Server 2. Author defines a set of usage rights and rules for their file; Application creates a “Publish License”and encrypts the file Windows Server running RMS 3 3. Author distributes file 4 1 5 4. Recipient clicks file to open, the RMS-enabled application calls to the RMS server which validates the user and issues a “Use License.” 2 3 5. The RMS-enabled application renders file and enforces rights Author using Office The Recipient
20. Two Ways To Provide Access from Unmanaged Devices Data Center/Corporate Network Internet
21. Forefront Unified Access Gateway Exchange CRM SharePoint IIS based IBM, SAP, Oracle Mobile UAG Home/Friend/KioskRead Only Access HTTPS / HTTP TS/RDS HTTPS (443) Internet Direct Access Non web Authentication End-point health detection Enterprise Readiness Edge Ready Information Leakage Prevention Non-Windows Business Partners/Subcontractors Read/Write only to subset of sites on SharePoint AD, ADFS, RADIUS, LDAP… Data Center/Corporate Network Employees Managed Machines Full Access only to sites defined User role
22. RDS via Remote Desktop GatewayRemote access to internal server resources Internet DMZ Corp LAN ExternalFirewall InternalFirewall Terminal Server Home Terminal Server Internet HTTPS/443 Hotel Terminal ServicesGateway Server E-mail Server Business Partner/Client Site
23. Server Hosted Virtual DesktopsVirtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktop Technology from Microsoft-Citrix Windows desktop and session deliveryon-demand Description Personalized desktops hosted in datacenter Integrated Management with SC, Application Virtualization and RDS CAL Desktop Virtualization platform (hypervisor) Full-fidelity user experience over LAN and WAN Lightweight, universal software client Self-service 'storefront' for enterprise applications Better Together Key Considerations Access desktop, applications, data on any device, anywhere Best user experience on LAN or WAN Integrated desktop management IT Investments in server, management, storage, and network infrastructure Unified, centralizedmanagement of physical and virtual environments User/VM Density Business continuity User Flexibility of access User Experience (personalization, graphics) Performance & Scalability is best in class (over LAN, WAN) Our Advantage Best in class technologies combined to provide most comprehensive and most Cost Effective solution Most scalable with Hyper-V and Sessions Better User Experience than PCoIP Single Management Console for physical and virtual assets
24. Extending Virtualization to Unmanaged Devices:Citrix Receiver Smartphones Leverage Windows, iOS, Android, RIM deviceswith universal client Access your VDI Desktop or Remote PC Self-service installation and auto-updates PCs Thin and Diskless PCs Tablets
33. Why Windows 7: This is What Enterprise Customers Are Telling Us Is ImportantTo Them
34. Hardware InnovationsOptimize Windows Slates SSD drives for Rapid boot up and Fast System responsiveness Intel Oaktrail Chipset enabling 8–10 hour battery life on Slates Working with OEMs to optimize system speed and performance Windows 7 trigger start services Rapid wake from sleep delivers “instant on”
35. Working with ISVs to deliver Touch Appsfor Windows 7 Published developer guidance for touch on Windows 7 Immersive Consumer Apps on Windows Product Scout Working with Enterprise ISVs to develop Enterprise Touch Apps
36. Windows Slates Connect to Your Devices Devices at home Devices at Work Devices for VerticalUse Cases
37. DemoWindows 7 Slate PC Immersive Consumer Apps: USA Today, Kindle, andMosaic Apps Rich Enterprise Content Creation with Pen Support:Office and OneNote Ink Support Video Conferencing and Data Sharing with Microsoft Lync Windows 7 Handwriting Recognition Broad Device Support
38. Windows 7 Helps IT Embrace Consumerization Empowered End Users Data and Apps Devices Provide the choice of devices and form factors users desire Enable seamless collaboration through existing investments and infrastructure
Key Point:We Can Help You Unleash the Potential of Consumerization.As consumers get their hands on smarter devices and applications, they are excited to bring these technologies to work and put them to good use. And they want you to support them. People are coming into work with much higher expectations of IT – they want better devices and applications, more options and freedom, and faster, uninterrupted service. These growing expectations are putting increasing pressure on IT to provide compelling solutions for their end users while maintaining a secure and well-managed environment. How can we help? Microsoft and Windows can help your business navigate these new realities of work – what many are calling the consumerization of IT. We can equip IT organizations with guidance on how to embrace and utilize consumerization responsibly, be your trusted advisor, and help you lead your business as you harness the potential of consumerization.OUTLINE OF THE PITCHSection 1:Consumerization – What is it? And why should you care? (slides 2-7)Approximate Time: 10 minSection 2: Guidance & Best Practices: Path to YES (slides 8-14)Approximate Time: 10 minSection 3: Why Microsoft? Why Windows? (slides 15-22)Approximate Time: 5 minSection 4: Specific Guidance – Windows BG (slides 23-31)Approximate Time: 20 minTotal Time: 45 min + Discussion
Timing: 2 minutes Key Points:The ubiquitous and always-connected nature of today’s technology has made it possible to work from anywhere and to bring our personal lives into the workplace. The boundaries between work and home are blurring. Script:Technology has permeated every aspect of our lives. At home, it has become a tool for learning, for entertainment, and for social connections. At work, in particular for information workers, technology is the foundation for how we conduct business. And with constant connectivity regardless of location, it’s becoming impossible to separate the personal from the professional. At home, you might use your personal laptop to clear your work email or to put the finishing touches on a presentation and load it up to the company intranet after dinner. At work, you might arrange to meet a friend for drinks using instant messaging (IM), check out your colleague’s Facebook page, or help out with your kid’s homework by doing a little web research. In fact, according to a study that IDC recently conducted, between a third to more than a half of devices (including laptops, mobile phones, and smartphones) and web-based applications (including IM, professional social networks, and blogs) used in the workplace are used for both work and personal purposes. The days of the 8–5 workday, at least for the information worker, are essentially over. Today the lines between personal and professional have blurred, and we take both our personal and professional lives with us nearly everywhere we go. Additional Information:John Gantz, “A Consumer Revolution in the Enterprise” (sponsored by Unisys), IDC, June 2010, http://www.unisys.com/unisys/ri/report/detail.jsp?id=1120000970003910071
Key Point: Many of companies today are experiencing consumerization in full force. Address the work/life blur?Ensure anywhere productivity?Protect data & maintain compliance?Streamline pc & device management?
Timing: 2 minutes Key Points:There are hidden costs and risks in permitting the use of unmanaged devices to access internal resources and the corporate network. For the business, unmanaged devices present risks in terms of security, privacy, compliance, and intellectual property protection.For IT, unmanaged devices increase complexity and the management burden. Script:There are huge potential productivity benefits with consumer technology, but this device proliferation also means that most enterprises now have numerous unmanaged devices being brought into the enterprise, trying to access the corporate network and confidential business resources. This presents some real challenges and risks:Business risks: Picture this scenario. Someone, let’s say an executive, needs to review the latest specifications for an innovative new product that’s about to launch or perhaps a highly confidential financial report. He or she is ready to leave the office for the day, and the perfect solution seems to be to put it on a slate to read later in the evening. But, worst case scenario, that slate never actually makes it home, because it gets lost in transit. Maybe it’s forgotten on the train or someone smashes the window of the executive’s car and steals it from the backseat. What do you do? Theft—and the consequent loss or exposure of sensitive information or confidential intellectual property (IP)—is a very real risk with unmanaged devices if they have no way to be encrypted, locked, and/or remotely wiped. And if that slate was a personal device, who is ultimately responsible for keeping that information secure and private? How are you preventing regulatory breaches?IT challenges: For IT, the challenges of device proliferation really come down to the added complexity of the IT environment. If a user has problems with a personal, unmanaged device being using for work purposes, he or she is likely to call the enterprise help desk for support, even if that device isn’t IT sanctioned. This raises new headaches for IT: If the device doesn’t have up-to-date patches, will it be stable? If the device has applications from an unknown or unverified vendor, how can they be sure there is no spyware? And will those applications introduce compatibility issues? How do they manage access to corporate information given these concerns? The more devices IT has to contend with, the more complicated and difficult it is to ensure the stability, performance, and security of those devices and the wider network. Regardless of what the device is, if it’s unmanaged, it poses some risks. We’re certainly not excluding Windows-based devices here. If an employee brings in a personal, unmanaged Windows-based tablet, you have no way of knowing whether it is compromised by spyware or infected with a virus that could put your other devices or your confidential business information at risk.
Key Point: Next step is to create conditions for success by managing the essentials.DATAHow will you control access to sensitive data?How will you manage data backup/restore?APPSHow will you deliver business applications? How will you support compliance reporting?OS/HWWho owns the IP on the device?Who fixes the device if it breaks?NETWORKHow will you enforce network security?
Key Point: Microsoft technologies such as desktop virtualization and cloud computing can help enable consumerization scenarios in a way that supports user choice and IT’s ability to manage and secure systemsMicrosoft server hosted Desktop Virtualization solutions offer the following potential benefits for users and IT:Simplify remote connectivity by enabling access to a rich desktop or web page or seamlessly integrated with a local desktopEnable flexible work scenarios such as hot-desking and work from homeDesktop environments centralized in the datacenter provide better business continuity and faster return to productivity for disaster recovery scenariosAccelerate and extend deployment of desktops and applications to a wide array of client devices, including clients on which the desktop operating system can’t run nativelyEnable rapid OS upgrades and patching by installing desktops only once in the data center and not locally on end point devicesWhen evaluating Desktop Virtualization technologies, enterprises can consider Remote Desktop Services (RDS) and Virtual Desktop Infrastructure (VDI). RDS provides session based desktops in the datacenter with higher scale and lower cost than VDI. VDI offers better user operating system isolation than RDS as well as better native application compatibility. VDI also provides the users with the ability to be admins of their own images. Cloud computing with Microsoft Windows InTuneoffers the following potential benefits for users and IT:Centrally manage the deployment of Microsoft updates and service packs to all PCsHelp protect PCs from malware threats with malware protection that can be managed from Web-based consoleReceive alerts on updates and threats to proactively identify and resolve problems with PCsResolve PC issues, regardless of location, with remote assistanceTrack hardware and software assets used in your businessCentrally manage update, firewall, and malware protection policies, even on remote machines outside corporate networkAs organizations evaluates technologies that enable them to embrace the reality of consumerization of IT, Microsoft offers a wide range of solutions to meet particular demands of users and IT.
Virtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktopKey Messages:Best in class technologies combined to provide most comprehensive and most Cost Effective solution (See slide 17)Most scalable with Hyper-V and Sessions (See slide 18)Better User Experience than PCoIPSingle Management Console for physical and virtual assets (See Slide 24)Additional Resources:Telecom Italia VDI Case Study (Appendix)
Any device, anywhere with Receiver™. Today’s digital workforce demands the flexibility to work from anywhere at any time using any device they’d like. Leveraging Citrix Receiver as a lightweight universal client, XenDesktop users can access their desktop and corporate applications from the latest tablets, smartphones, PCs, Macs, or thin client. This enables virtual workstyles, business continuity and user mobility. XenDesktop 5 includes new Citrix Receivers for all the latest tablets, smartphones, Macs and thin clients.
Engineering and design guidance for slate PC apps -- http://code.msdn.microsoft.com/wintouchguideWindows Product Scout: http://www.microsoft.com/windows/product-scout/ ISV Engagement through ACE Framework