Unified Access Gateway (UAG) provides secure, anywhere access to applications like SharePoint and Exchange, increasing productivity while maintaining compliance. It delivers integrated security through built-in access policies and authentication methods. UAG simplifies remote access infrastructure management by consolidating solutions and providing simplified wizards and policies. It extends the benefits of DirectAccess across more devices and applications, enhancing scalability and simplifying deployments.
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
Managing processes, automatically testing controls within processes, and proactively managing risk through key performance/risk indicators are significant challenges to establishing GRC/IT-GRC practices and an effective compliance framework. This session will focus on the current and future capabilities of Novell Compliance Management Platform that can assist organizations with implementating process controls and risk management throughout the enterprise. We will provide specific examples with SAP GRC Access Control, Process Control and Risk Management.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
What an Enterprise Should Look for in a Cloud ProviderNovell
This session will address the security and compliance aspects that an enterprise should insist on from a cloud provider. The mechanisms for cloud annexation that provide security and compliance will be described and the architecture of Novell Cloud Security Service will be presented. Presenters will emphasize the contribution that Novell Cloud Security Service makes to intelligent workload management because of cloud security and compliance.
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
Managing processes, automatically testing controls within processes, and proactively managing risk through key performance/risk indicators are significant challenges to establishing GRC/IT-GRC practices and an effective compliance framework. This session will focus on the current and future capabilities of Novell Compliance Management Platform that can assist organizations with implementating process controls and risk management throughout the enterprise. We will provide specific examples with SAP GRC Access Control, Process Control and Risk Management.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
What an Enterprise Should Look for in a Cloud ProviderNovell
This session will address the security and compliance aspects that an enterprise should insist on from a cloud provider. The mechanisms for cloud annexation that provide security and compliance will be described and the architecture of Novell Cloud Security Service will be presented. Presenters will emphasize the contribution that Novell Cloud Security Service makes to intelligent workload management because of cloud security and compliance.
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
Open Data Center Alliance Solution Provider Panel Discussion at 2011 Intel Developer Forum
Panel: Marvin Wheeler, ODCA Chair; Winston Bumpus, VMware; Brent Schroeder, Dell; Shannon Williams, Citrix; Gordon Haff, Red Hat; Sanjog Gad, EMC
Novell Success Stories: Collaboration in GovernmentNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The California Highway Patrol, Hudiksvall Municipality, Liconsa, Kent Police Authority, The Louisiana Department of Social Services, Texas General Land Office, DRV BW, and the Ministry of Social Development in Bahrain all use Novell Collaboration tools for their IT success.
Security is high on the list of concerns for many organizations as they evaluate their cloud computing options. This session will examine security in the context of the various forms of cloud computing. We'll consider technical and non-technical aspects of security, and discuss several strategies for cloud computing, from both the consumer and producer perspectives.
IT Rationalization: Leveraging Service-Oriented AbstractionBob Rhubart
Oracle ACE Director Basheer Khan's presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
Peter Coffee presentation at The Open Group in Seattle, February 2010, on business incentives and handling of business concerns surrounding cloud computing
Xuber for Insurers is configurable and flexible across the full
insurance policy life cycle from Submissions and Quotes through Policy Administration, Claims Management to Ceded Reinsurance
Recoveries and Credit Control. Xuber supports all major lines of business including specialty and niche lines handling, international lines, the London Market and Lloyd’s business lines.
This White Paper introduces company IT Management, Directors and The Board to the concept of Software as a Service (SaaS), explaining how and why software houses are adopting it as a business and supply strategy. It also introduces the SaaS Hotel™ brand from 1st Easy — its architecture and how it can help support and benefit software companies that have adopted or plan to adopt a SaaS delivery strategy.
Recent presentation to Infosys on HP's cloud capabilities, opportunities to partner, case studies and what HP is doing in Private Cloud to enable partner and business success in the ANZ market.
Open Data Center Alliance Solution Provider Panel Discussion at 2011 Intel Developer Forum
Panel: Marvin Wheeler, ODCA Chair; Winston Bumpus, VMware; Brent Schroeder, Dell; Shannon Williams, Citrix; Gordon Haff, Red Hat; Sanjog Gad, EMC
Novell Success Stories: Collaboration in GovernmentNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The California Highway Patrol, Hudiksvall Municipality, Liconsa, Kent Police Authority, The Louisiana Department of Social Services, Texas General Land Office, DRV BW, and the Ministry of Social Development in Bahrain all use Novell Collaboration tools for their IT success.
Security is high on the list of concerns for many organizations as they evaluate their cloud computing options. This session will examine security in the context of the various forms of cloud computing. We'll consider technical and non-technical aspects of security, and discuss several strategies for cloud computing, from both the consumer and producer perspectives.
IT Rationalization: Leveraging Service-Oriented AbstractionBob Rhubart
Oracle ACE Director Basheer Khan's presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
Peter Coffee presentation at The Open Group in Seattle, February 2010, on business incentives and handling of business concerns surrounding cloud computing
Xuber for Insurers is configurable and flexible across the full
insurance policy life cycle from Submissions and Quotes through Policy Administration, Claims Management to Ceded Reinsurance
Recoveries and Credit Control. Xuber supports all major lines of business including specialty and niche lines handling, international lines, the London Market and Lloyd’s business lines.
This White Paper introduces company IT Management, Directors and The Board to the concept of Software as a Service (SaaS), explaining how and why software houses are adopting it as a business and supply strategy. It also introduces the SaaS Hotel™ brand from 1st Easy — its architecture and how it can help support and benefit software companies that have adopted or plan to adopt a SaaS delivery strategy.
Recent presentation to Infosys on HP's cloud capabilities, opportunities to partner, case studies and what HP is doing in Private Cloud to enable partner and business success in the ANZ market.
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
Strong authentication and single sign-on for SaaS applications is available with SafeNet
Authentication Manager and SafeWord 2008.
With either platform, the enterprise security team retains complete control over the
configuration, deployment, and administration of the authentication infrastructure, which
remains in the enterprise’s IT domain.
Organizations can deploy either platform in their network’s DMZ, so users can authenticate
directly to cloud-based applications and services, rather than having to go through the corporate VPN. As a result, users have a faster, more seamless experience accessing on-premise and
cloud-based applications, while enterprises enjoy optimized security.
Datasheet: WebSphere DataPower Service Gateway XG45Sarah Duffy
WebSphere DataPower Service Gateway XG45 is built for web services deployments, governance, light integrations and hardened security. http://ibm.co/HIHOAs
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
Para trabajar en un ecosistema digitalmente transformado, los directores de sistemas de información y otros líderes empresariales tienen que navegar en un entorno de amenazas a la seguridad en constante cambio. Las soluciones de Next Gen Security (NGS) son soluciones de seguridad optimizadas para trabajar mejor con la escala masiva y cobertura expansiva de la Tercera Plataforma. Aunque 7 de cada 10 empresas afirman estar en el proceso de implementar una solución más de seguridad de nueva generación, 3 de esos 7 no tendrá éxito por la falta de competencia interna, por lo que el tema de seguridad es cada día más crítico”. Akamai ofrece un rendimiento a escala con la solución de distribución en la nube más grande y confiable del mundo. Sus recursos se escalan de forma que sus clientes no tengan que hacerlo. Akamai tiene una visibilidad sin igual de las propiedades más atacadas en la web y obtiene inteligencia ante amenazas continuamente a partir de inspecciones avanzadas tanto del tráfico bueno como del malo.
Overview of SaaS and online services and the business reasons why organisations should be considering these. Delivered by Ben Kepes at Intergen's ON seminar series in May 2010.
Migrating its entire virtualized environment from VMware to Hyper-V has helped Miele & Cie, an appliance manufacturer shrink its server space by more than 50 percent and improve productivity.
To add to the new flexible and energy-efficient data center, Miele has also ‘saved an estimated 35 percent in licensing costs by going with a Microsoft virtualization solution’.
Hyper-V has helped AcXess fill that much needed virtualization gap with an improvised and more competent functionality and reduced data center and hardware costs.
According to Tom Elowson, President and Cofounder, AcXess, “Hyper-V has made all the difference. It is amazing to think we have grown our business 300 percent over the last few years with Hyper-V. ”
There are many misconceptions surrounding Cloud Computing and what it has to offer.
Tell apart the facts from the myths with Cloud Computing Myth Busters and develop a deeper understanding of the Cloud.
Download Myth Busters >>
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
1. Unified Access Gateway
(UAG)
December 2009
Brendan Foley Uri Lichtenfeld
Director Product Manager
Identity & Security Business Group
2. Agenda
• Business Challenges
• Business Ready Security
• Overview of Forefront Unified Access Gateway
− Anywhere Access
− Integrated Security
− Simplified Management
• Demo
• Licensing & Pricing
• Summary
November 2006
3. Business Challenges
Threats Current
Solutions
Business Landscape
Increased Product
volume proliferation
Greater Lack of
sophistication integration
Profit High cost of
motivated ownership
Security not aligned to business needs and new opportunities
4. Business Ready Security
Help securely enable business by managing risk and empowering people
Identity
Highly Secure & Interoperable Platform
from: to:
Block Enable
Cost Value
Siloed Seamless
5. Business Ready Security Solutions
Secure Messaging Secure Collaboration Secure Endpoint
Information Protection
Identity and Access Management
6. UAG delivers secure, anywhere access to messaging, collaboration
and other applications, increasing productivity while maintaining
compliance with policy.
Anywhere • Employees/partners/customers are productive from anywhere
• Simple and secure, optimized for SharePoint / Exchange
Access • Extend networking connectivity with Windows DirectAccess.
• Protects IT assets through fine-grained, built-in access policies
Integrated • Easily enables a variety of strong authentication methods.
Security • Helps limit exposure and data leakage
• Consolidates remote access infrastructure
Simplified • Simplifies deployment and ongoing tasks through wizards and
Management built-in policies.
• Delivers a simplified user experience, reducing support costs
7. How It Works Challenge: wide
variety of devices and
platforms increases risk UAG continually inspects
and TCO. traffic and blocks
How: User initiates access from Data Center / Corporate Network
applications or
browser; UAG then verifies user transactions that are
identity and health of device and deemed risky Exchange
from that
provides appropriate access. user/location. CRM
Mobile SharePoint
IIS based
IBM, SAP, Oracle
Home / Kiosk
Layer3 VPN
TS/ RDS
Internet HTTPS (443) Administrator Citrix
configures granular
DirectAccess
access policy, based on
identity of user and web
Non
health of device
Solution: Leverage
Business Partners UAG to consolidate
AD, ADFS,
access methods and
RADIUS, LDAP….
deliver a consistent user
Need: Remote workers policy
experience and and NPS, ILM
partners require secure Access
access from anywhere. attempts are
Employees
logged and
Managed Machines
auditable.
8. Anywhere Access
Forefront UAG: A key enabler of DirectAccess
UAG extends the benefits of Windows DirectAccess across your
infrastructure, enhancing scalability and simplifying deployments and ongoing
management
9. UAG and DirectAccess better together:
Extends access to line of business servers with IPv4 support
Access for down level and non Windows clients
Enhances scalability and management
Simplifies deployment and administration
Hardened Edge Solution
Always On
IPv6
SSL-VPN
+
IPv4
10. Anywhere Access
Simple, secure access optimized for SharePoint . . .
• Secure Remote Access for SharePoint.
Enabling employees, partners and
customers access to SharePoint from
virtually any location or device.
• Integrates SSL VPN Into SharePoint
By integrating its menu as a Web-part,
UAG can add access to client/server and
network resources to any existing
deployment.
• Improved User Experience
With enhanced web single-sign-on
capabilities, UAG can deliver remote
access to SharePoint portals and backend
applications without requiring additional
authentication.
11. Anywhere Access
. . . And simple, secure access optimized for Exchange
Publish all Exchange mail services as a
single UAG application:
• Easier publishing experience
• Symmetrical topology for all front-end
mail services
Publish each Exchange service as a
separate application:
• Greater back-end topology
12. Integrated Security
• Overlay granular access control to specific sites and/or
features within sites
• Built-in endpoint security policies (integrated with NAP)
• Expanded authentication and authorization capabilities
• Session clean-up and information leakage prevention
• Integrated network security
13. Simplified Management
• Simplifies deployment and ongoing tasks through wizards
and built-in policies.
• Simplified user experience - reducing support costs
• Consolidates remote access infrastructure
Step 2:
Step 1:
Provide the
Choose the type
All
Step 3:internal name
of application
Configure the
of the
SharePoint to
you wish
same external
publish.
Server.
name on your
Done!
SharePoint
Server.
Provide the
external name.
15. From IAG to UAG
IAG UAG
APPLICATION PUBLISHING
Granular Application Filtering Improved
Session cleanup and removal
End point health detection Improved
INTEGRATION
Integrated with NAP policies New
Remote Desktop and RemoteApp integration New
Extends and simplifies DirectAccess deployments New
SCALE AND MANAGEMENT
Built in load balancing New
Array management capabilities New
Enhanced monitoring and management (SCOM) New
16. UAG Form Factors
• Server Software install (MSI)
− Installs on hardware or virtual servers on
Hyper-V or SVVP guest
• Hardware appliance from OEM partners
16
17. How to Buy
• Server License
− OEM Partners: Customers can buy Forefront UAG as a
physical appliance. This includes the underlying
Windows Server 2003 R2 license.
− Microsoft Volume Licensing: Customers can run
Forefront UAG as software. These options require
provisioning the Windows license from a customer’s
existing agreement.
• Client Access and Other Licenses
− Microsoft Volume Licensing: Customers can buy
Forefront UAG CALs, External Connectors, and SPLAs
through Microsoft Volume Licensing. In addition to
individual CALs, customers with large environments can
purchase a 10,000 CAL pack.
18. Summary
• Extends, scales and simplifies DirectAccess
deployments
• Delivers Anywhere Access to SharePoint,
Exchange and more
• Protects IT assets and limits exposure
• Scalable and simple to deploy
Download now!
http://www.microsoft.com/uag
November 2006