SlideShare a Scribd company logo
•
    –
    –
    –

    –

•
•
    –
    –
    –

    –

•
    –
•
    –
•
•
•
Day 1: Device Management                   Day 2: Data Access

Mod 1: KEYNOTE—
                                           Mod 5: Productive with Office 365
Enabling the Consumerization of IT


Mod 2: End-to-End Security & Access        Mod 6: Information Protection


Mod 3: User-Centric Application Delivery   Mod 7: Cloud Security and Management


Mod 4: Mobile Device Management            Mod 8: Desktop Virtualization
•
•
•
International Telecommunications Union “Tablet Demand and Disruption” Morgan
International Telecommunications Union “Tablet Demand and Disruption” Morgan
CONSUMERIZATION
HAS ALREADY
HAPPENED…
READY AND PRODUCTIVE   PERSONALIZED        INTELLIGENT
         ANYWHERE           EXPERIENCE       INFRASTRUCTURE


        Work on the road                          Unified management on-
                                                premises and from the cloud



Work on your
 own device
                                                      Optimized application
                                                          infrastructure

                            Personalized
   Work on your phone      Windows devices


                                                End to end security and
                                                        access
Work from a
branch office
THE OLD WAY…
CORPORATE
                                                          NETWORK



                                                      Financial Data           Sales Data      Intranet Data




                       Windows Server                SharePoint Server      Windows Server   SharePoint Server
                        2003 AD DC                        2003                  2003              2003




INTERNET

           3RD Party VPN                                SMS 2003             Exchange 2003         PBX


                                            Work Station/Office


                                                                                              3rd Party AM
                                Desktop Cell phone     Windows XP      Windows XP
                                 Phone                 Office 2003     Office 2003
Device                     Identity                 Policy Applied

        Services: Full Application Access, device-centric       Domain Join, Group
                                           User Name
        Where:Known local or Corporate provided or PPTP/L2TP VPN Policy, 3rd Party
                Offline          Online via CORP Windows XP PCs                                                Full Access
                                            Password
        Data: All types of data, no local data protection       AV, SMS 2003 client




        Services: Email and documents attached to email
                      EAS connected device, if Name with Exchange 2003
                                          User works
        Where:Known & Online
                Offline
                                          Blackberries
                                                                       EAS or BES               Email Access
                                           Password
        Data: All types of data, only protection via EAS or BES policy
Trust




                                         User Name
              Unknown
                                          Password

        Services: Hope it works with credentials                                    Full Network Access
        Where: CORP network-OR Outlook Web Access (OWA) online
                    Any device Unsupported                                            See what works
        Data: All types of data unprotected
                                                                                                                 Services and
                                                                                                                    Device
              Unknown                                                                                            Data Access
                                                                                                                   Examples
                                                                                                                  Examples



                                                          Access
People in Ethan’s organization want
to use smartphones, slates, tablets,
and laptops connect to the corporate
network.
Can he maintain compliance and
ensure corporate data is safe on
all devices?




                                       Ethan
                                       Systems Engineer
                                       Contoso Financial Network
                                       Ultimate safety hero, but open to new ideas.
Ben has lots of devices
                                      and travels frequently.
                                      How can he be productive on
                                      all of his devices with all the
                                      personal things he’s used to while
                                      on-the-road?




Ben Smith
Global Business Development Manager
Contoso Financial Network
Self-proclaimed gadget geek.
Lisa is very tired and keeps
                                          getting bugged by Ben to help him
                                          close a customer deal.
                                          Can she work from home in her
                                          pajamas?




Alice Ciccu
Technical Advisor
Contoso Financial
Doesn’t know the meaning of impossible.
CORPORATE
                                                                                                       NETWORK

                              UNTRUSTED           DOMAIN                         SERVER ISOLATION
                                                ISOLATION
                                                                           Financial Data             Sales Data           Intranet Data




                                                                          SharePoint Server         Windows Server         SharePoint Server
                                                                               2003                     2003                    2003




       INTERNET

                  3RD Party VPN                                               SMS 2003                Exchange 2003             PBX



                                          X      Work Station/Office




                                                                                                            3rd Party AM    Windows Server
                                              Desktop   Smart     Slate      Windows XP       Windows XP                     2003 AD DC
                                                                                                                              Domain
Untrusted                                      Phone    phone                Office 2003      Office 2003                    Controller
CORPORATE
                                                                                NETWORK

                              UNTRUSTED                    DOMAIN ISOLATION

                                                                       Financial Data              Sales Data         Intranet Data




                                                                                                 Windows Server     SharePoint Server
                                                                                                     2003                2003




       INTERNET

                  3RD Party VPN
                     Modern                                                    SMS 2003            Exchange 2003           PBX
                    Gateway


                                                         Work Station/Office




                                                                                                     3rd Party AM
                                  Unmanaged/     Smart   Desktop   Windows XP      Windows XP                             Domain
                                  Rogue Device   phone    Phone    Office 2003     Office 2003                           Controller
Untrusted
•
    –
    –
CORPORATE
                                                                                                 NETWORK

                                              UNTRUSTED               DOMAIN
                                                                    ISOLATION
                                                                                     Financial Data                   Sales Data             Intranet Data




                                                                                                                    Windows Server         SharePoint Server
                                                                                                                        2003                    2003




                  INTERNET

                                     Modern
                                          Modern    Direct Access                               SMS 2003              Exchange 2003               PBX
                                     Gateway
                                          Gateway       Server
   Hotel


                               Remediate


                                                                                                                                   X
                                                                          Work Station/Office
                              Remediate
Smart   Slate
phone           Office 2003                  Network Access                                                                    3rd Party
                                                Protection                                                                        AM             Domain
                                            Unmanaged/     Smart          Desktop    Windows XP       Windows XP                                Controller
    Untrusted   Quarantine Network
                                            Rogue Device phone             Phone     Office 2003      Office 2003
CORPORATE
                                                                                        NETWORK

                                     UNTRUSTED               DOMAIN
                                                           ISOLATION
                                                                             Financial Data         Sales Data          Intranet Data

    Exchange SharePoint Lync



                                                                                                   Windows Server
                                                                                                       2003
                                                                                                                           X
                                                                                                                      SharePoint Server
                                                                                                                           2003



                                   ADFS Web Proxy
  On the Road

            INTERNET
                                                                                                         X
                                                                                                      Exchange 2003
                                                                                                          OWA
                                                                                                                             PBX


                                 Modern    Direct Access
                                 Gateway       Server            Work Station/Office


Smart                    Slate
phone      Office 2003
                                                             Desktop                                 ADFS                   Domain
    Untrusted                                                 Phone       Office 2003                                      Controller
•
•
    –
        
        
        
    –
CORPORATE
                                                                                             NETWORK

                                           UNTRUSTED               DOMAIN
                                                                 ISOLATION
                                                                                   Financial Data         Sales Data

   Exchange SharePoint Lync



                         Web                                                                            Windows Server
                        Browser                                                                             2003




        Hotel

                 INTERNET

                                       Modern    Direct Access                                                            PBX
                                       Gateway       Server


 X                                                                    Work Station/Office


Smart                          Slate
phone           Office 2003   Wiped      ADFS Web Proxy
                                                                  Desktop                                 ADFS            Domain
         Stolen Devices!                                           Phone                                                 Controller
   Untrusted          Partial trust
•
    –
CORPORATE
                                                                                                  NETWORK

                                            UNTRUSTED               DOMAIN
                                                                  ISOLATION         Financial Data             Sales Data
                   LBI                                                                     HBI                      MBI




    Exchange SharePoint Lync
        AD RMS
                                                                                                              Windows Server
                                                                                           AD RMS                 2003
                                                                                                                 AD RMS
                                          ADFS Web Proxy




           INTERNET


                                        Modern    Direct Access                                                                 PBX
                                        Gateway       Server
                  BitLocker Encrypted


                                                                      Workstation/Office

Smart     Slate
phone                 Office 2003
         Stolen Devices!                                          Desktop                                    ADFS               Domain
                                                                   Phone                                                       Controller
   Untrusted          Partial trust
CORPORATE
                                                                                              NETWORK

                                           UNTRUSTED               DOMAIN
                                                                 ISOLATION
                     LBI                                                                       HBI              MBI




   Exchange SharePoint Lync
    AD RMS


                                                                                              AD RMS       AD RMS




                                         ADFS Web Proxy

                                                                                                                       PBX



                                                                       Work Station/Office
                                       Modern    Direct Access
                                       Gateway       Server
   New Slate
                      New Windows
 Client Installed                                                  Desktop                               ADFS          Domain
                         Phone
Software Installed                                                  Phone                                             Controller

    Untrusted          Partial trust
CORPORATE
                                                                                       NETWORK

                                      UNTRUSTED                 DOMAIN
                                                              ISOLATION
              LBI                                                                        HBI             MBI




  Exchange SharePoint Lync
   AD RMS


                                                                 VDI / RDS              AD RMS      AD RMS
                                    ADFS Web Proxy


               INTERNET




                                  Modern    Direct Access                                                       PBX
                                  Gateway       Server
                                                               Virtual Desktop

On the Road
                                                                Work Station/Office




       New Windows
          Phone       New Slate                             Desktop                               ADFS          Domain
                                                             Phone                                             Controller
  Untrusted      Partial trust
CORPORATE
                                                                                          NETWORK

                                     UNTRUSTED               DOMAIN
                                                           ISOLATION
               LBI                                                                          HBI             MBI




  Exchange SharePoint Lync
   AD RMS

                                                             VDI / RDS                    AD RMS           AD RMS                     ADFS
                                   ADFS Web Proxy
                                                                                  Data
                                                                                  Sync
               INTERNET



                                 Modern    Direct Access                                                                             PBX
                                 Gateway       Server       Virtual Desktop                                   Domain
                                                                                                             Controller
On the Road
                                                                                                                          Work Station/Office
                                                                        Profile
                                                                        Sync


 New Windows
    Phone                                                                                                             Desktop
                New Slate                                                           Profile File Storage               Phone
  Untrusted      Partial trust
CORPORATE
                                                                                    NETWORK

                                     UNTRUSTED                DOMAIN
                                                            ISOLATION
               LBI                                                                     HBI             MBI




  Exchange SharePoint Lync
   AD RMS

                                                               VDI / RDS             AD RMS           AD RMS                     ADFS
                                   ADFS Web Proxy


               INTERNET




                                 Modern    Direct Access                                                                        PBX
                                 Gateway       Server        Virtual Desktop                             Domain
                                                                                                        Controller
On the Road
                                                                                                                     Work Station/Office




 New Windows                                               APP-V Sequencer
    Phone                                                                                                        Desktop
                New Slate                                                      Profile File Storage               Phone
  Untrusted      Partial trust
•
    –

•
    –
•
    –

•
    –

•
    –
CORPORATE
                                                                                    NETWORK

                                     UNTRUSTED                DOMAIN
                                                            ISOLATION
               LBI                                                                     HBI             MBI




  Exchange SharePoint Lync
   AD RMS

                                                               VDI / RDS             AD RMS           AD RMS                     ADFS
                                   ADFS Web Proxy


               INTERNET



                                 Modern    Direct Access                                                                        PBX
                                 Gateway       Server                                                    Domain
                                                             Virtual Desktop
                                                                                                        Controller
On the Road
                                                                                                                     Work Station/Office




 New Windows
    Phone       New Slate
                                                           APP-V Sequencer
                                                                                                                     X
                                                                                                                 Desktop
                                                                               Profile File Storage               Phone
 Untrusted       Partial trust
Device                     Identity               Policy Applied              Policy Compliant

        Services: Full Application Access, User Name
                                            User-Centric
                                                                     Domain Join, Group
        Where:Known
                Anywhere with Physical Windows PC with TPM, BitLocker and DirectAccess
                                 internet seamlessly OR Offline
                                            Password                                         SCCM, SCEP, NAP   Corporate Full
                                                                      Policy, SCCM client
        Data: HBI, MBI, LBI                 Certificate Virtualation machine (VDI)
                                             Desktop



        Services: Limited local, Remote options
                                     EAS connected device
                                          User Name
        Where: Offline & Online
                        Non-domain joined PC with Windows Intune   EAS, Domain
               Known                       Password
        Data: EAS – LBI or MBI/HBI with AD PC out of compliance Join, Group Policy
                             Domain joined RMS                                                 Corporate
                                     Certificate (Optional)                                     Partial
        PCs – LBI-HBI with bitlocker & manage to compliance
Trust




        Services: Remote Desktop, Remote Apps, Web
        Apps, Modern Gateway
        Windows, Windows Phone, Android, iPad, iPhone
                                      User Name
              Unknown
        Where: Online only             Password
                                                                    Proxied
        Data: Remote only, No local



           Services: none                                                                                         Services and
            Any Device
           Where: CORP
             Any Device
              Unknown                     Public                                                                     Device
                                                                                                                  Data Access
           Data: none                                                                                               Examples
                                                                                                                   Examples


                                                         Access
•
    http://aka.ms/itcamps
•
    http://aka.ms/CoITMatrix
•
    http://www.MicrosoftVirtualAcademy.com
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational
purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft,
and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. Some information relates to pre-released product which may be substantially modified before it’s commercially released.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
Agora Group
 
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Advantec Distribution
 
XEN App
XEN AppXEN App
XEN App
subtitle
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk Finance
Marco Marazzini
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
Interop
 
Onrego company presentation
Onrego company presentationOnrego company presentation
Onrego company presentation
Kimmo Vesajoki
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
Ed Wong
 
iSpaces - Investor overview (Fall 2012)
iSpaces - Investor overview (Fall 2012)iSpaces - Investor overview (Fall 2012)
iSpaces - Investor overview (Fall 2012)
Alex Brotherbees
 
Revised OGUNSEYE ALICE OLUSHOLA
Revised OGUNSEYE ALICE OLUSHOLARevised OGUNSEYE ALICE OLUSHOLA
Revised OGUNSEYE ALICE OLUSHOLA
Alice Ogunseye
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
SecutecGroup Baudewijns
 
Consumerization
ConsumerizationConsumerization
Consumerization
Stephen Rose
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
technext1
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
Mountaha
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
Canon Business CEE
 
Concept of Blackberry Technology
Concept of Blackberry TechnologyConcept of Blackberry Technology
Concept of Blackberry Technology
Animesh Mishra
 
Business and Online Services - Chris Auld
Business and Online Services - Chris AuldBusiness and Online Services - Chris Auld
Business and Online Services - Chris Auld
Intergen
 
A security system that changed the world
A security system that changed the worldA security system that changed the world
A security system that changed the world
STO STRATEGY
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
zakmackraken
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
Raman K. Attri
 
E Card Ppt
E Card PptE Card Ppt
E Card Ppt
Prashant Priyam
 

What's hot (20)

Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
 
XEN App
XEN AppXEN App
XEN App
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk Finance
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 
Onrego company presentation
Onrego company presentationOnrego company presentation
Onrego company presentation
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
iSpaces - Investor overview (Fall 2012)
iSpaces - Investor overview (Fall 2012)iSpaces - Investor overview (Fall 2012)
iSpaces - Investor overview (Fall 2012)
 
Revised OGUNSEYE ALICE OLUSHOLA
Revised OGUNSEYE ALICE OLUSHOLARevised OGUNSEYE ALICE OLUSHOLA
Revised OGUNSEYE ALICE OLUSHOLA
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Consumerization
ConsumerizationConsumerization
Consumerization
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Concept of Blackberry Technology
Concept of Blackberry TechnologyConcept of Blackberry Technology
Concept of Blackberry Technology
 
Business and Online Services - Chris Auld
Business and Online Services - Chris AuldBusiness and Online Services - Chris Auld
Business and Online Services - Chris Auld
 
A security system that changed the world
A security system that changed the worldA security system that changed the world
A security system that changed the world
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
 
E Card Ppt
E Card PptE Card Ppt
E Card Ppt
 

Viewers also liked

3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game
David Tesar
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTW
David Tesar
 
building microservices
building microservicesbuilding microservices
building microservices
Cisco DevNet
 
Microsoft & Internet of Things
Microsoft & Internet of ThingsMicrosoft & Internet of Things
Microsoft & Internet of Things
Marlon Luz
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
Vinoth Rajagopalan
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoT
Ilyas F ☁☁☁
 
DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container Service
David Tesar
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
Aniket Kanitkar
 

Viewers also liked (8)

3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game3 Ways To UP Your OPs Game
3 Ways To UP Your OPs Game
 
Mobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTWMobile App Instrumentation Experimentation FTW
Mobile App Instrumentation Experimentation FTW
 
building microservices
building microservicesbuilding microservices
building microservices
 
Microsoft & Internet of Things
Microsoft & Internet of ThingsMicrosoft & Internet of Things
Microsoft & Internet of Things
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoT
 
DevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container ServiceDevOps, Microservices, and Azure Container Service
DevOps, Microservices, and Azure Container Service
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 

Similar to Consumerization of IT MSL Jumpstart Keynote

Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
trickey270
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
Ana González Monzón
 
Future of IT
Future of ITFuture of IT
Future of IT
Simon May
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
Paul Crone
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
Intergen
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinar
Sentri
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
NCCOMMS
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
Bipeen Sinha
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
Droidcon Berlin
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
247 Invest
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
MskDotNet Community
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
yonifine
 
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
Microsoft Décideurs IT
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
Stephen Rose
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
Kenny Buntinx
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
Jason Poyner
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
Sylvia Low
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Cisco Canada
 

Similar to Consumerization of IT MSL Jumpstart Keynote (20)

Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Future of IT
Future of ITFuture of IT
Future of IT
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
System Center webinar
System Center webinarSystem Center webinar
System Center webinar
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
Comment le « Workplace on Command » et les solutions Microsoft contribuent à ...
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Consumerization of IT MSL Jumpstart Keynote

  • 1.
  • 2. – – – – •
  • 3. – – – – • –
  • 4. – • • •
  • 5. Day 1: Device Management Day 2: Data Access Mod 1: KEYNOTE— Mod 5: Productive with Office 365 Enabling the Consumerization of IT Mod 2: End-to-End Security & Access Mod 6: Information Protection Mod 3: User-Centric Application Delivery Mod 7: Cloud Security and Management Mod 4: Mobile Device Management Mod 8: Desktop Virtualization
  • 7. International Telecommunications Union “Tablet Demand and Disruption” Morgan
  • 8. International Telecommunications Union “Tablet Demand and Disruption” Morgan
  • 10.
  • 11.
  • 12. READY AND PRODUCTIVE PERSONALIZED INTELLIGENT ANYWHERE EXPERIENCE INFRASTRUCTURE Work on the road Unified management on- premises and from the cloud Work on your own device Optimized application infrastructure Personalized Work on your phone Windows devices End to end security and access Work from a branch office
  • 14. CORPORATE NETWORK Financial Data Sales Data Intranet Data Windows Server SharePoint Server Windows Server SharePoint Server 2003 AD DC 2003 2003 2003 INTERNET 3RD Party VPN SMS 2003 Exchange 2003 PBX Work Station/Office 3rd Party AM Desktop Cell phone Windows XP Windows XP Phone Office 2003 Office 2003
  • 15. Device Identity Policy Applied Services: Full Application Access, device-centric Domain Join, Group User Name Where:Known local or Corporate provided or PPTP/L2TP VPN Policy, 3rd Party Offline Online via CORP Windows XP PCs Full Access Password Data: All types of data, no local data protection AV, SMS 2003 client Services: Email and documents attached to email EAS connected device, if Name with Exchange 2003 User works Where:Known & Online Offline Blackberries EAS or BES Email Access Password Data: All types of data, only protection via EAS or BES policy Trust User Name Unknown Password Services: Hope it works with credentials Full Network Access Where: CORP network-OR Outlook Web Access (OWA) online Any device Unsupported See what works Data: All types of data unprotected Services and Device Unknown Data Access Examples Examples Access
  • 16. People in Ethan’s organization want to use smartphones, slates, tablets, and laptops connect to the corporate network. Can he maintain compliance and ensure corporate data is safe on all devices? Ethan Systems Engineer Contoso Financial Network Ultimate safety hero, but open to new ideas.
  • 17. Ben has lots of devices and travels frequently. How can he be productive on all of his devices with all the personal things he’s used to while on-the-road? Ben Smith Global Business Development Manager Contoso Financial Network Self-proclaimed gadget geek.
  • 18. Lisa is very tired and keeps getting bugged by Ben to help him close a customer deal. Can she work from home in her pajamas? Alice Ciccu Technical Advisor Contoso Financial Doesn’t know the meaning of impossible.
  • 19. CORPORATE NETWORK UNTRUSTED DOMAIN SERVER ISOLATION ISOLATION Financial Data Sales Data Intranet Data SharePoint Server Windows Server SharePoint Server 2003 2003 2003 INTERNET 3RD Party VPN SMS 2003 Exchange 2003 PBX X Work Station/Office 3rd Party AM Windows Server Desktop Smart Slate Windows XP Windows XP 2003 AD DC Domain Untrusted Phone phone Office 2003 Office 2003 Controller
  • 20. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION Financial Data Sales Data Intranet Data Windows Server SharePoint Server 2003 2003 INTERNET 3RD Party VPN Modern SMS 2003 Exchange 2003 PBX Gateway Work Station/Office 3rd Party AM Unmanaged/ Smart Desktop Windows XP Windows XP Domain Rogue Device phone Phone Office 2003 Office 2003 Controller Untrusted
  • 21. – –
  • 22. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION Financial Data Sales Data Intranet Data Windows Server SharePoint Server 2003 2003 INTERNET Modern Modern Direct Access SMS 2003 Exchange 2003 PBX Gateway Gateway Server Hotel Remediate X Work Station/Office Remediate Smart Slate phone Office 2003 Network Access 3rd Party Protection AM Domain Unmanaged/ Smart Desktop Windows XP Windows XP Controller Untrusted Quarantine Network Rogue Device phone Phone Office 2003 Office 2003
  • 23. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION Financial Data Sales Data Intranet Data Exchange SharePoint Lync Windows Server 2003 X SharePoint Server 2003 ADFS Web Proxy On the Road INTERNET X Exchange 2003 OWA PBX Modern Direct Access Gateway Server Work Station/Office Smart Slate phone Office 2003 Desktop ADFS Domain Untrusted Phone Office 2003 Controller
  • 24. • • –    –
  • 25. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION Financial Data Sales Data Exchange SharePoint Lync Web Windows Server Browser 2003 Hotel INTERNET Modern Direct Access PBX Gateway Server X Work Station/Office Smart Slate phone Office 2003 Wiped ADFS Web Proxy Desktop ADFS Domain Stolen Devices! Phone Controller Untrusted Partial trust
  • 26.
  • 27. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION Financial Data Sales Data LBI HBI MBI Exchange SharePoint Lync AD RMS Windows Server AD RMS 2003 AD RMS ADFS Web Proxy INTERNET Modern Direct Access PBX Gateway Server BitLocker Encrypted Workstation/Office Smart Slate phone Office 2003 Stolen Devices! Desktop ADFS Domain Phone Controller Untrusted Partial trust
  • 28. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION LBI HBI MBI Exchange SharePoint Lync AD RMS AD RMS AD RMS ADFS Web Proxy PBX Work Station/Office Modern Direct Access Gateway Server New Slate New Windows Client Installed Desktop ADFS Domain Phone Software Installed Phone Controller Untrusted Partial trust
  • 29. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION LBI HBI MBI Exchange SharePoint Lync AD RMS VDI / RDS AD RMS AD RMS ADFS Web Proxy INTERNET Modern Direct Access PBX Gateway Server Virtual Desktop On the Road Work Station/Office New Windows Phone New Slate Desktop ADFS Domain Phone Controller Untrusted Partial trust
  • 30. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION LBI HBI MBI Exchange SharePoint Lync AD RMS VDI / RDS AD RMS AD RMS ADFS ADFS Web Proxy Data Sync INTERNET Modern Direct Access PBX Gateway Server Virtual Desktop Domain Controller On the Road Work Station/Office Profile Sync New Windows Phone Desktop New Slate Profile File Storage Phone Untrusted Partial trust
  • 31. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION LBI HBI MBI Exchange SharePoint Lync AD RMS VDI / RDS AD RMS AD RMS ADFS ADFS Web Proxy INTERNET Modern Direct Access PBX Gateway Server Virtual Desktop Domain Controller On the Road Work Station/Office New Windows APP-V Sequencer Phone Desktop New Slate Profile File Storage Phone Untrusted Partial trust
  • 32. – • –
  • 33. – • – • –
  • 34. CORPORATE NETWORK UNTRUSTED DOMAIN ISOLATION LBI HBI MBI Exchange SharePoint Lync AD RMS VDI / RDS AD RMS AD RMS ADFS ADFS Web Proxy INTERNET Modern Direct Access PBX Gateway Server Domain Virtual Desktop Controller On the Road Work Station/Office New Windows Phone New Slate APP-V Sequencer X Desktop Profile File Storage Phone Untrusted Partial trust
  • 35.
  • 36.
  • 37. Device Identity Policy Applied Policy Compliant Services: Full Application Access, User Name User-Centric Domain Join, Group Where:Known Anywhere with Physical Windows PC with TPM, BitLocker and DirectAccess internet seamlessly OR Offline Password SCCM, SCEP, NAP Corporate Full Policy, SCCM client Data: HBI, MBI, LBI Certificate Virtualation machine (VDI) Desktop Services: Limited local, Remote options EAS connected device User Name Where: Offline & Online Non-domain joined PC with Windows Intune EAS, Domain Known Password Data: EAS – LBI or MBI/HBI with AD PC out of compliance Join, Group Policy Domain joined RMS Corporate Certificate (Optional) Partial PCs – LBI-HBI with bitlocker & manage to compliance Trust Services: Remote Desktop, Remote Apps, Web Apps, Modern Gateway Windows, Windows Phone, Android, iPad, iPhone User Name Unknown Where: Online only Password Proxied Data: Remote only, No local Services: none Services and Any Device Where: CORP Any Device Unknown Public Device Data Access Data: none Examples Examples Access
  • 38. http://aka.ms/itcamps • http://aka.ms/CoITMatrix • http://www.MicrosoftVirtualAcademy.com
  • 39. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. Some information relates to pre-released product which may be substantially modified before it’s commercially released. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  1. Better word for IT Architect or Solution ArchitectCompliance is missingWhat You’ll leave withAdd ‘integrate’ or ‘apply’
  2. Better word for IT Architect or Solution ArchitectCompliance is missingWhat You’ll leave withAdd ‘integrate’ or ‘apply’
  3. Here's where we think your opportunity is, your personal opportunity and your corporation's opportunity. It's just a time of change. It's just a time of change where users are demanding that they be given more flexibility. You've got a chance I think to broaden your impact. Rather than being just -- and I don't want to say that in a way that's demeaning at all, but you have an opportunity to be more than just a desktop administrator. Be the person, be the team that enables users to work across any device they want to work on. Take charge of all the different technologies in your organization that enable this. Expand your influence, expand your role, expand your impact, expand your careers. As you do that, your users will be wildly, wildly happy, they'll be more productive, they will look at you honestly as their hero. And as you do that, the organization will be differentiated, your organization will be able to attract greater talent because you will have a policy and you will have an infrastructure that is these just really incredibly talented individuals who want to come to work for an organization that's going to empower them, you'll have a story about how your organization and how you as IT are going to empower them to work the way they want to. And make no mistake, that's a big attractor of talent.
  4. Key Messages:We have workstyle solutions to support diverse workstyles; we would like to explore specific ones with you today (those that are most relevant to the needs of your business).With Windows 7, we can offer many flexible workstyle solutions. We’ll focus today on the intelligent infrastructure pillar of flexible workstyle and how these capabilities can help enable consumerization. Talk Track: We believe it’s time to give users more freedom, more flexibility to get great work done and drive business value. Windows solutions offers three tangible business benefits to enable flexible workstyles : Greater productivity because people can work anywhere, on a variety of devices with instant access to the information they need and the people they count on, using the applications, services, and social networking tools they are used to. Personalized experiencethrough tools and capabilities that anticipate people’s needs, remember their preferences, and adapt to their workstyles. An intelligent infrastructure that’s smart, safe, cost-effective, and easy to manage.We’ll focus today on Unified management on-premises and from the cloud, optimized application experience, and modern security and access.
  5. Key Message: While the culture of work and the way your employees get stuff done has changed dramatically, in many cases, the tools we provide them have remained the same.There is a better way…
  6. Timeframe: 2003. FYI - Windows XP launch October 25 2001Company Name: Contoso FinancialInfrastructure + Policies:Mobile: Only support 1 type of mobile device (blackberry)PCs: only support company-provided desktops or laptops running Windows XPRemote connectivity: Traditional PPTP/L2TP VPNCORP Phone: Traditional PBXSecurity & Management: 3rd Party Anti Malware server & clients, SMS 2003Productivity: Office 2003, SharePoint 2.0, Exchange 2003Information protection: Require user authentication to get email and some places on SharePoint, no protection on data itself. No PKI.Enterprise Cloud services: none
  7. Company was growing, lots of things needed upgrades (Exch, Office, SharePoint)SharePoint: Intranet data company was expanding quickly and needed to add storage capacity since O365 provides 10GB base site + 500 MB of pooled storage for each user for SharePoint it was a cost-effective way to quickly scale while also providing the SharePoint 2010 functionality – with things like co-authoring, SharePoint presence, web apps.Office: Includes a license Exchange: Needed more mobile device support & bigger mailbox  new server, time to deploy, new storage. 25 GB storage per user.Demo: PPT co-auth in O365 with Office 2010 & document in O365 & Lync to communicate.