This document provides a high-level overview of platform security and the evolving security landscape. It discusses increasing demands for access and escalating security threats. It outlines the evolution of threats from local area networks to the internet era to today. It also discusses different types of attackers and their motivations. The document proposes addressing security threats by focusing on technology, processes, and people. It promotes an infrastructure optimization approach to security and discusses Microsoft's security strategy and development lifecycle.
19.10.2016 klo 9.30 järjestimme webinaarin, jossa kävimme teknisen tietoturvan keskeiset osa-alueet lävitse ja kerromme, mitkä ovat kunkin osa-alueen asiat, jotka vähintään pitää olla kunnossa, jotta voi yöllä nukkua rauhallisin mielin. Asiantuntijavieraana webinaarissa on Microsoftin Partner Technology Strategist, Ari Auvinen, joka osaltaan kertoi, millaisia teknisiä ratkaisuja tietoturva-asioiden kunnostamiseen on olemassa.
19.10.2016 klo 9.30 järjestimme webinaarin, jossa kävimme teknisen tietoturvan keskeiset osa-alueet lävitse ja kerromme, mitkä ovat kunkin osa-alueen asiat, jotka vähintään pitää olla kunnossa, jotta voi yöllä nukkua rauhallisin mielin. Asiantuntijavieraana webinaarissa on Microsoftin Partner Technology Strategist, Ari Auvinen, joka osaltaan kertoi, millaisia teknisiä ratkaisuja tietoturva-asioiden kunnostamiseen on olemassa.
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
The crown jewels of any IT environment is the valuable information you manage. This session will explore techniques and Microsoft technologies that can ensure documents are well-managed, secured, and only available to approved individuals in your organization. We will also look at advanced ediscovery and data governance approaches and technologies that can support these.
50 Shapes of Network & Information SecurityHatem ElSahhar
Knowledge is a right for EVERYONE – feel free to share it!
Here are 50 slides listing some concepts of network and information security. You may find them randomly listed and not structured very well, but I have posting them on a daily basis -almost- and topics were not ready to publish from day one.
The slides may help some of you to get to know some new topics, and might help others to review what they already knew.
They are not considered as a study material, as they don’t cover all the aspects of each listed topic, you will need to dig deeper.
I hope you find them beneficial.
اللهم علمنا ما ينفعنا و انفعنا بما علمتنا و زدنا علما
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
Microsoft’s strategy is to deliver solutions that focus on what businesses need to operate and be successful:
(1) enabling employees, partners and customers to securely access the information, resources and applications they need to be productive.
(2) Freeing people’s time to focus on what’s important (reduce complexity, increase efficiency, etc.)
(3) Ability to adapt & change dynamically to changing threats, changing business environments/relationship, legal requirements, etc.
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
Organizations today are facing unprecedented and sophisticated attacks to their internal Information Technology infrastructure. These evolving attacks include spear phishing, ransomware, credential hijacking, and more and can result in significant data loss and/or theft of confidential and valuable intellectual property. In response to these threats, Microsoft has released an array of tools such as Azure Sentinel, Cloud App Security, Microsoft Defender for Identity, and more which can help to secure and protect against these threats. These tools work with both on-premises and cloud-based infrastructure to provide for comprehensive protection of hybrid environments.
This session breaks down each of these Microsoft tools and provides for an understanding of their value for specific security scenarios. A simple, no-marketing approach is taken to evaluating each individual tool, and a simple breakdown of what is provided with each Microsoft licensing model is outlined. Attendees will gain a better appreciation to which tools to utilize and how to better protect their Information Technology investments from the type of career-ending attacks which are unfortunately common today.
• Understand how modern threats such as spear phishing, ransomware, credential hijacking, and more are commonly faced in today’s IT environments and what tools and techniques can be used to mitigate the risk faced by these modern threats
• Examine Microsoft security tools such as Azure Sentinel, Microsoft Defender for Identity, Azure Security Center, Cloud App Security, Azure AD Privileged Identity Management, Azure AD Identity Protection, Azure Information Protection, and more
• Understand which tools are available for each licensing model in the Microsoft world and when it may make sense to ‘upgrade’ existing licenses to support specific toolsets as opposed to investment in third-party tools
The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target
their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
During events in hotels, a security briefing is a mandatory action before any gathering, in order to make conference organisors and participants, confident about security measurements!
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
The crown jewels of any IT environment is the valuable information you manage. This session will explore techniques and Microsoft technologies that can ensure documents are well-managed, secured, and only available to approved individuals in your organization. We will also look at advanced ediscovery and data governance approaches and technologies that can support these.
50 Shapes of Network & Information SecurityHatem ElSahhar
Knowledge is a right for EVERYONE – feel free to share it!
Here are 50 slides listing some concepts of network and information security. You may find them randomly listed and not structured very well, but I have posting them on a daily basis -almost- and topics were not ready to publish from day one.
The slides may help some of you to get to know some new topics, and might help others to review what they already knew.
They are not considered as a study material, as they don’t cover all the aspects of each listed topic, you will need to dig deeper.
I hope you find them beneficial.
اللهم علمنا ما ينفعنا و انفعنا بما علمتنا و زدنا علما
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
Microsoft’s strategy is to deliver solutions that focus on what businesses need to operate and be successful:
(1) enabling employees, partners and customers to securely access the information, resources and applications they need to be productive.
(2) Freeing people’s time to focus on what’s important (reduce complexity, increase efficiency, etc.)
(3) Ability to adapt & change dynamically to changing threats, changing business environments/relationship, legal requirements, etc.
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
Organizations today are facing unprecedented and sophisticated attacks to their internal Information Technology infrastructure. These evolving attacks include spear phishing, ransomware, credential hijacking, and more and can result in significant data loss and/or theft of confidential and valuable intellectual property. In response to these threats, Microsoft has released an array of tools such as Azure Sentinel, Cloud App Security, Microsoft Defender for Identity, and more which can help to secure and protect against these threats. These tools work with both on-premises and cloud-based infrastructure to provide for comprehensive protection of hybrid environments.
This session breaks down each of these Microsoft tools and provides for an understanding of their value for specific security scenarios. A simple, no-marketing approach is taken to evaluating each individual tool, and a simple breakdown of what is provided with each Microsoft licensing model is outlined. Attendees will gain a better appreciation to which tools to utilize and how to better protect their Information Technology investments from the type of career-ending attacks which are unfortunately common today.
• Understand how modern threats such as spear phishing, ransomware, credential hijacking, and more are commonly faced in today’s IT environments and what tools and techniques can be used to mitigate the risk faced by these modern threats
• Examine Microsoft security tools such as Azure Sentinel, Microsoft Defender for Identity, Azure Security Center, Cloud App Security, Azure AD Privileged Identity Management, Azure AD Identity Protection, Azure Information Protection, and more
• Understand which tools are available for each licensing model in the Microsoft world and when it may make sense to ‘upgrade’ existing licenses to support specific toolsets as opposed to investment in third-party tools
The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target
their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
During events in hotels, a security briefing is a mandatory action before any gathering, in order to make conference organisors and participants, confident about security measurements!
A Survey on Virtualization Data Centers For Green Cloud ComputingIJTET Journal
Abstract —Due to trends like Cloud Computing and Green cloud Computing, virtualization technologies are gaining increasing importance. Cloud is a atypical model for computing resources, which intent to computing framework to the network in order to cut down costs of software and hardware resources. Nowadays, power is one of big issue of IDC has huge impacts on society. Researchers are seeking to find solutions to make IDC reduce power consumption. These IDC (Internet Data Center) consume large amounts of energy to process the cloud services, high operational cost, and affecting the lifespan of hardware equipments. The field of Green computing is also becoming more and more important in a world with finite number of energy resources and rising demand. Virtual Machine (VM) mechanism has been broadly applied in data center, including flexibility, reliability, and manageability. The research survey presents about the virtualization IDC in green cloud it contains various key features of the Green cloud, cloud computing, data centers, virtualization, data center with virtualization, power – aware, thermal – aware, network-aware, resource-aware and migration techniques. In this paper the several methods that are utilze to achieve the virtualization in IDC in green cloud computing are discussed.
These are basic skill set, duty responsibility and his ability to do the assigned work. The requirement of client is also mentioned to make process proper.
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
As the volume and sophistication of attacks has increased, it has become even more critical for organizations to be able to rapidly and accurately identify malicious attack vectors and payloads at time of delivery. This session will explore Microsoft’s unique approach to dealing with this problem and also how we approach tracing and deconstructing a successful attack in order to prevent its’ next iteration.
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...David J Rosenthal
Microsoft 365 is a platform for workplace modernization across security, compliance, productivity, and communications.
Why one platform – the best of suite approach versus best of breed
Microsoft is now best of breed is many of these capabilities as well across security, compliance, meetings, and collaboration.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
Microsoft Strategic Initiative
Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling
Good afternoon everyone. My name is Charles, this is Lizzie, Andres, and Kyle. Today, we are going to present a strategic initiative plan for microsoft for the 2018 fiscal year and beyond.
Cybersecurity
The topic we want to focus on and bring to the business’s attention today is cybersecurity. For those who are unfamiliar, Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack and unauthorized access.
Cybercrime Portfolio
Cyber attacks
Security vulnerabilities
Disclosure of personal data
Network outages and data loss
Disruption of online services
All threaten long-term customer loyalty, security, firm revenue, and firm reliability
Activities that cybersecurity tries to prevent include but are not limited to cyber attacks, etc etc. which all threaten customer relations, security of our firm, our revenue, as well as firm reliability.
Increasing Prevalence
The reason why cybersecurity has come on our radar now is because of the steady increases of attacks in the last few years. The two biggest reasons for this are the boom of the internet of things as well as the underground market. When we implement software in all areas of our life, there will be more opportunities for cybercriminals to target.
Cybercrime Costs
Cybersecurity spending to exceed $1 trillion from 2017-2021
Cybersecurity Costs
Average cost of ~$12 – $17M per incident
Data Breaches
Overall costs to hit $6 trillion annually by 2021
Cybercrime Costs
$325M in damages caused by global ransomware
Damaged caused by global ransomware to surpass $5B in 2017. A 15x from 2015
Global Ransomware
Cybersecurity- Our Business Segments
Personal Computing
Windows OS
82.96% market share
Dependence on the OS by customers like the U.S. Department of Defense or the biggest banks in the world like JP Morgan Chase
A bug that restricts computer usage or alters functions could cause damage to millions of devices and users’ information
Apple macOS password glitch this week; hurts their sales
Intelligent Cloud
Azure, Dynamics 365
Links multiple networks and is the backbone of the firm’s infrastructure
Stores business and personal data
Leaks or hacks can expose personal banking or other sensitive information
Late 2010, Microsoft cloud breach allowed anybody to see employee information
Productivity & Business Processes
Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM
Office (Commercial and 365)
Over 1 billion users
Excel contains financial information that can benefit hackers
Powerpoint can contain interfirm information that is not public yet
Office 365 breach June 2016
57% of users affected
Ransom note that also included an audio warning
Next Steps
The
Solution
Acquire new resources to boost cyber security through:
Organic
Internal departmental growth
Acquisitions
Complete control of external resources
Alliances
P ...
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Ramnish Singh Platform Security Briefing
1. Platform Security Briefing Ramnish Singh PMP, CISSP, Microsoft Certified Architect (Infrastructure) MCITP (Windows 2008),MCTS (Windows Server,Vista, Exchange), MCSE (Windows 2003, 2000, NT), MCT Cisco Certified Design Professional, Cisco Certified Network Professional, Sun CSA IT Advisor | Microsoft Corporation Blog Address (optional) | Email (optional)
2.
3.
4. Security Versus Access Demand for access Escalating threats 23 million branch offices WW(IDC, 2006) 3.6 billion mobile users WW by 2010 (Infonetics, 2007) 85% of companies will have WLANs by 2010 (Infonetics, 2006) 8x increase in phishing sites in past year (AWG, 2006) One message-based Trojan attack per day in 2006 vs. one per week in 2005 (Message Labs, 2006) Strong indication of increase in profit-motivated attacks (Multiple sources)
5. Evolving Threat Landscape Local Area Networks First PC virus Boot sector viruses Create notorietyor cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notorietyor cause havoc Faster propagation 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows Broadbandprevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows 1986–1995 1995–2000 2000–2005 2007
6. National Interest Personal Gain Personal Fame Curiosity Largest segment by $ spent on defense Spy Largest area by $ lost Fastest growing segment Thief Largest area by volume Trespasser Author Vandal Undergraduate Script-Kiddy Expert Specialist Evolving Threats
7. 1st known hack... The need for security in communication networks is not new. In the late nineteenth century an American undertaker named AlmonStrowger discovered that he was losing business to his rivals because telephone operators, responsible for the manual connection of call requests, were unfairly diverting calls from the newly bereaved to his competitors. Strowger developed switching systems that led to the introduction of the first automated telephone exchanges in 1897. This enabled users to make their own connections using rotary dialling to signal the required destination. AlmonStrowger
8. Addressing Security Threats Helps turn IT into a business asset not a cost center Supports your day to day security processes Is the Enabler to running your business successfully Technology Data privacy processes to manage data effectively IT security processes to implement, manage, and govern security Financial reporting processes that include security of the business Process Company understands the importance of security in the workplace Individuals know their role with security governance and compliance IT staff has the security skills and knowledge to support your business People
9. Microsoft’s Promises To You Manage Complexity, Achieve Agility Amplifythe Impactof YourPeople ProtectInformation,ControlAccess Advance the Businesswith IT Solutions
10. Delivering On The Promise:Infrastructure Optimization *Source: Microsoft CSO Summit 2007 Registration Survey
11. Core Infrastructure Optimization More Efficient Cost Center Cost Center Strategic Asset Business Enabler Basic No centralized enterprise directory No automated patch management Anti-malwarenot centrally managed Message security for e-mail only No secure coding practices in place Standardized Using enterprise directory for authentication Automated patch management tools deployed Anti-malwareis managed centrally Unified message security in place Rationalized Integrated directory services, PKIin place Formal patch management process Defense in depth threat protection Security extended to remote and mobile workforce Dynamic Full identity lifecycle management.ID Federation,Rights Mgt Services in use Metrics driven update process Client quarantine and access policy enforcement $1320/PC Cost $580/PC Cost $230/PC Cost Source:GCR and IDC data analyzed by Microsoft, 2006
12. Core Infrastructure Optimization Model: Security Basic Standardized Rationalized Dynamic Technology Self provisioning and quarantine capable systems ensure compliance and high availability Automate identity and access management Automatedsystem management Multiple directories for authentication Limited automated software distribution Patch statusof desktopsis unknown No unified directory for access mgmt Self-assessing and continuous improvement Easy, secure access to info from anywhereon Internet SLAs are linkedto business objectives Clearly defined and enforced images, security, best practices CentralAdmin and configurationof security Standard desktop images defined,not adopted by all IT processes undefined Complexity dueto localized processesand minimal central control Process Improve IT Maturity while Gaining ROI IT is astrategic asset Users look to ITas a valued partner to enable new business initiatives IT Staff manages an efficient,controlled environment Users have the right tools,availability, and access to info IT Staff trained in best practices such as MOF,ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their ownIT solutions People
13. SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)} where the acceptable values for potential impact are low, moderate, or high.
17. Microsoft SecurityAssessment Toolkit SecurityTools Microsoft Windows VistaSecurity Whitepapers SecurityReadiness Educationand Training Microsoft SecurityIntelligence Report Learning Paths forSecurity Professionals www.microsoft.com/technet/security Microsoft Security Strategy
18. Security Development Lifecycle Design Threat Modeling Standards, best practices, and tools Security Push Final Security Review RTM and Deployment Signoff Security Response Product Inception
19. Priority #1 - Platform Security Security Development Lifecycle Security Response Center Better Updates And Tools
20. Comprehensive Security Portfolio Services Edge Encrypting File System (EFS) Server Applications BitLocker™ Information Protection Network Access Protection (NAP) Client and Server OS IdentityManagement Windows CardSpace SystemsManagement Active Directory Federation Services (ADFS) Guidance Developer Tools
21. Security Development Lifecycle (SDL) Kernel Patch Protection Kernel-mode Driver Signing Secure Startup Windows Service Hardening Secure Platform Rights Management Services (RMS) SharePoint, Exchange, Windows Mobile integration Encrypting File System (EFS) Bitlocker Secure Access User Account Control Network Access Protection (NAP) IPv6 IPsec Windows CardSpace Native smart card support GINA Re-architecture Certificate Services Credential roaming Windows Defender IE Protected Mode Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP) Bi-directional Firewall Windows Security Center Data Protection Malware Protection
22. Windows Vista SP1 includes Additional Kernel Patch Protection APIs Enhanced Windows Security Center reporting Expanded BitLocker Drive Encryption (BDE) Additional multifactor authentication methods
23. Security Development Lifecycle (SDL) Windows Server Virtualization (Hypervisor) Role Management Tool OS File Integrity Secure Platform Network Protection Network Access Protection (NAP) Server and Domain Isolation with IPsec End-to-end Network Authentication Windows Firewall With Advanced Security On By Default Identity Access Rights Management Services (RMS) Full volume encryption (Bitlocker) USB Device-connection rules with Group Policy Improved Auditing Windows Server Backup Data Protection Read-only Domain Controller (RODC) Active Directory Federation Srvcs. (ADFS) Administrative Role Separation PKI Management Console Online CertificateStatus Protocol
24. Secure Platform Surface Area Configuration tool Password Policy Enforcement; Granular Roles Built in Encryption;Key Mgmt. Auditing – Data Definition Language (DDL) Advanced Spam and Virus Defenses Compliance Business Continuity Trust Center New Document Security Model Open XML File Formats Rich Authentication GranularAccess Control Complianceand Auditing Hierarchical Encryption Document Inspector Information Rights Management Strong Encryption,Digital Signatures Suite-B: For U.S. Government Data Protection Platform Security Progress Essential Security and Mobile Device Mgmt Built-in Protection with Business Continuity Compliance Support EnhancedMessage Filtering
25. Security Threat Landscape Evolution Microsoft Security Strategy Engineering Excellence Security Development Lifecycle Engineering Excellence Security Development Lifecycle
26. Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers Network Security Secure Anywhere Access End-to-end security with IPv6 and IPsec Access driven by policy not topology Certificate based multi-factor authentication Health checks and remediation prior to access Policy-driven network access solutions Windows Firewall with advanced filtering Server and Domain Isolation Network Access Protection (NAP) ISA Server 2006 Intelligent Application Gateway (2007) Windows Filtering Platform
27. Identity and Access Management Your COMPANYandyour EMPLOYEES Secure and seamlesscross-organizational collaboration Easily managing multiple identities Government sponsored identities (eID) Hardware supported trust platform Disparate directories synchronization Centralized ID controls and mgmt. Embedded identity into applications Policy Governance / Compliance Role Based Permissions Identity and Data Privacy Identity Lifecycle Manager 2007 Active Directory Federation Services Active Directory Lightweight Directory Services Windows Certificate Services Windows CardSpace™
28. Edge, server and client protection “Point to Point” Solutions Security of data at rest and in transit Mobile workforce Manageability Corporate Client Protection Server Protection Consumer/ Small Business Simple PC maintenance Anti-Virus Anti-Spyware Anti-Phishing Firewall Performance Tuning Backup and Restore Edge Protection Protection
29. Interoperability Industry Standards Web Services (WS-*) Open document format (XPS) OpenID Partner Products Network Access Protection EV Certificate support in IE7 Windows CardSpace Windows Security Center Industry Partnerships SecureIT Alliance Microsoft SecurityResponse Alliance Interop Vendor Alliance
30. Security Stack Interoperability Integrated security eases defense in depth architecture deployment Adoption of open standards allows cross platform integration Management System System Center, Active Directory GPO Data BitLocker, EFS, RMS, SharePoint, SQL User Active Directory and Identity Lifecycle Mgr Application SDL process, IIS, Visual Studio, and .NET Device Forefront Client Security, Exchange MSFP Internal Network Network Access Protection, IPSec Perimeter Forefront Edge and Server Security, NAP
36. User Experience Application Platform Optimization Model Development BASIC ADVANCED DYNAMIC STANDARDIZED Infrastructure Optimization SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process Enterprise Content Management BASIC RATIONALIZED DYNAMIC STANDARDIZED Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC RATIONALIZED DYNAMIC STANDARDIZED Security and Networking Data Protection and Recovery
41. Enables agilityApplication Platform Optimization Model STANDARDIZED BASIC ADVANCED DYNAMIC Development SOA and Business Process Data Management Business Intelligence Business Productivity Infrastructure Optimization Model Unified Communications Collaboration IT and Security Process STANDARDIZED BASIC DYNAMIC RATIONALIZED Enterprise Content Management Enterprise Search Business Intelligence Core Infrastructure Optimization Model Identity and Access Management Desktop, Device, and Server Mgmt BASIC STANDARDIZED DYNAMIC RATIONALIZED Security and Networking Data Protection and Recovery
42. Core Infrastructure Optimization Policy and Compliance Risk Assessment User Awareness Basic Standardized Rationalized Dynamic Identity and Access Management Patch Management Threat and Vulnerability Mitigation Secure Messaging and Collaboration Secure Application Architecture Legacy Platform Migration
43. Solutions Benefits Costs Challenges Two Factor Authentication Secure Remote User Basic to Standardized Enforce Strong Passwords Secure Wireless Access Network Intrusion Detection Optimizing SecurityMoving from Basic to Standardized Developer-focused environment Sophisticated and targeted threats Executive sponsorship Awareness campaign Cultural shift to awareness Able to mitigate current high priority risk Labor intensive to maintain Defense in Depth
44. Solutions Benefits Costs Challenges Standardized to Rationalized Network Segmentation Identity & Access Mgmt 2FA: Elevated Access Accts Security Event Monitoring Certificate Provisioning & Renewals Vulnerability Assessments SDL IT Optimizing SecurityMoving from Standardized to Rationalized Evolving and faster threats Ownership largely resided with Security Risk management framework Service manager accountability Accountability closer to business Environmental awareness Improved response Lack of integration between service managers and business Defense in Depth Automate
45. Solutions Benefits Costs Challenges Network Access Protection Rationalized to Dynamic Strong User Authentication User Account Control Bitlocker Drive Encryption Optimizing SecurityMoving from Rationalized to Dynamic Security viewed as a tax to the business Information security governance Information security becomes a strategic asset Culture shift may cause friction Defense in Depth
50. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Mobile Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
51. Mobile Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
52. Mobile Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Group Policy and AGPM Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
53. Mobile Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
54. Mobile Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
56. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Office Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
57. Office Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
58. Office Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
59. Office Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
60. Office Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
62. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Task Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
63. Task Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
64. Task Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Group Policy and AGPM Folder Redirection Offline Files Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
65. Task Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
66. Task Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
68. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Contract / Offshore Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
69. Bi-Directional Firewall, Defender, Malicious Software Removal Tool Network Location Protection Bitlocker Drive Encryption Security Center & UAC OS Microsoft Enterprise Desktop Virtualization (MED-V) Contract / Offshore Worker OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
70. Contract / Offshore Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
71. Contract / Offshore Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
72. Contract / Offshore Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
74. Microsoft Enterprise Desktop Virtualization (MED-V) End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues Home Worker Bitlocker Drive Encryption OPERATING SYSTEM Hardware
75. Home Worker Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection OS Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
76. Home Worker Terminal Server Access RMS Protected Documents Bi-Directional Firewall, Defender, Malicious Software Removal Tool Bitlocker Drive Encryption Security Center & UAC Network Location Protection Applications Anti Virus & Antispyware Network Access Protection OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
77. Home Worker Terminal Server Access RMS Protected Documents Network Access Protection Data, User Settings Applications Anti Virus & Antispyware Folder Redirection Offline Files Group Policy and AGPM Data Backup OS Application (APP-V) & Enterprise Desktop (MED-V) Virtualization Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
78. Home Worker RMS Protected Documents Data, User Settings Applications Folder Redirection Offline Files Group Policy and AGPM Data Backup System Monitoring System Management Mobile Device Management Corporate Security Policy OS Hardware End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
79. 7 Tips for Secure Client Computing Protect your personal information. It’s valuable Know who you’re dealing with Use anti-virus and firewall and update both regularly Setup your OS and Web Browser properly and update both regularly Protect your password Backup important files Learn who to contact if something goes wrong
80. Technology Internet Intranet Web Server Exchange External Web Server User BRANCH OFFICE DMZ CSS Internal Network Internet SharePoint Active Directory HEAD QUARTERS User Customer
81. Technology – Another View Trusted Unhealthy PC Isolated Remediation Server Web Server Infrastructure Servers New Customer Remote Access Gateway Trusted Home Unmanaged Devices MaliciousUsers
82. OSI Model Application Presentation Session Transport Network Media layers Host layers Data Link Physical
84. Head Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
85. Head Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
86. Head Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
87. Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
88. Head Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
89. Head Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
90. Head Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
91. Head Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
92. Head Office (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
94. Branch Office (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
95. Branch Office (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
96. Branch Office (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
97. Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
98. Branch Office (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
99. Branch Office (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
100. Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
101. Branch Office (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
102. Branch Office (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
104. Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
105. Intranet/Extranet (Media Layer) Bitlocker Drive Encryption Secure Wireless Access Secure Remote Access Network Access Protection Intrusion Detection System Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
106. Intranet/Extranet (Media Layer) Secure Wireless Access Network Access Protection Secure Remote Access Site-to-Site VPN Address Translation Intrusion Detection System Network Data Link Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM Physical End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
107. Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Transport Firewall Protection Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
108. Intranet/Extranet (Host Layer) IPSec Enabled Protection Server & Domain Isolation Active Directory Remote Access Protocols Session Transport Firewall Protection Folder Redirection Offline Files Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
109. Intranet/Extranet (Host Layer) GINA Protection GINA Protection Terminal Server Access Active Directory Remote Access Protocols Encrypted File System Presentation Session OPERATING SYSTEM Transport Folder Redirection Offline Files Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL CTRL + ALT + DEL Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
110. Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool GINA Protection Terminal Server Access Encrypted File System Presentation Session Transport Application Protection Management Anti Virus & Antispyware Group Policy and AGPM CTRL + ALT + DEL Application (APP-V) Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
111. Intranet/Extranet (Host Layer) Application Defender, Malicious Software Removal Tool Presentation Session Transport Application Protection Management Web DHCP & DNS Audio Video Messaging Anti Virus & Antispyware Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
112. Intranet/Extranet (Host Layer) Application Presentation Session Transport Web Audio Video Messaging DHCP & DNS Identity Management Data Protection Content Management Database Microsoft Enterprise Desktop Virtualization (MED-V) OPERATING SYSTEM End User Benefits Offline Use Flexible Configurations Rich user experience IT Benefits Protection of the local data Easy to migrate user Mitigation of application compatibility issues
123. Process Application Security Cryptography Access Control Business Continuity & Disaster Recovery Information Security and Risk Management Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security Legal, Regulations, Compliance & Investigations
136. Security Guidance and Resources Microsoft Security Home Page: www.microsoft.com/security Microsoft Forefront: http://www.microsoft.com/forefront/default.mspx General Information: Microsoft Live Safety Center: http://safety.live.com Microsoft Security Response Center: www.microsoft.com/security/msrc Security Development Lifecycle: http://msdn.microsoft.com/security/sdl Get the Facts on Windows and Linux: www.microsoft.com/getthefacts Anti-Malware: Microsoft OneCare Live: https://beta.windowsonecare.com Microsoft Defender: www.microsoft.com/athome/security/spyware/software Spyware Criteria: www.microsoft.com/athome/security/spyware/software/isv Guidance Centers: Security Guidance Centers: www.microsoft.com/security/guidance Security Guidance for IT Professionals: www.microsoft.com/technet/security The Microsoft Security Developer Center: msdn.microsoft.com/security The Security at Home Consumer Site: www.microsoft.com/athome/security
137. આભાર ধন্যবাদ நன்றி धन्यवाद ಧನ್ಯವಾದಗಳು ధన్యవాదాలు ଧନ୍ୟବାଦ നിങ്ങള്ക്ക് നന്ദി ਧੰਨਵਾਦ
LEAD: Who is responsible for driving the evolution of the threats that impact your business?It started with those that were curious and wanted personal fame in hacking into different systems and networks.Then, the motivation moved to those that found a sport in CyberTrespassing and those that look at financial gains from CyberThief. As more individuals made money, the group began to grow larger and larger.Now we are finding experts and specialist that focus on large hacking efforts gaining access to sensitive data that they can sell on the black market. We are also seeing CyberSpy Specialist with national interests at stake.<CLICK>Vandals are the largest group.<CLICK>We see Theives driving the largest area where money is lost<CLICK>The largest segment of spend is focused defending national interests.<CLICK>The fastest growing segment are the experts that are in the business of stealing your business assets.????? Customer QuestionsAre you seeing security threats evolve before the attacked technology is mainstreamed?Why do you think this is happening?
LEAD: Engineering Excellence is focused upon providing fundamentally secure platforms for our customers. They should be secure by design, secure by default, and remain secure after deployment.???? Customer QuestionsWhat kind of security configuration management do you utilize to deploy servers? Desktops?Are you using Group Policy to keep your platforms secure after they are deployed?What is your platform patching strategy?