SlideShare a Scribd company logo
1 of 8
Download to read offline
Windows 10:
Security focus (part II)
Juan Ignacio Oller Aznar
MVP: Cloud and Datatenter Management
• Thelastfewyearshaveseenarevolutioninenterprisesecuritythreats.Windows10goesbeyondjustbuildingbiggerwalls
anddeliversentirelynewwaystohelpprotectidentities,data,anddevices.
• MicrosoftPassportandWindowsHello
• EnterpriseDataProtection
• DeviceGuard
Protectionagainstmodern
securitythreats
Table of Contents
2
Microsoft Passport & Windows Hello
3
1. Convenient multi-factor authentication
Windows 10 offers a flexible multi-factor authentication that allows users to use either biometrics or a PIN plus a
trusted device to access business networks and resources, while IT can ensure strong identity is used organization
wide instead of passwords.
2. Microsoft Passport
Microsoft Passport is the flexible two-factor authentication solution that acts as an alternative to a password, and has
enterprise grade security much like a SmartCard. Use your PC or your mobile phone, whether it’s an Windows
Phone, iOS, or even an Android device, as one of the factors. The other factor will be biometric or a PIN.
3. Windows Hello*
Windows Hello* is a biometric alternative to a PIN when unlocking a device and using your Microsoft Passport. Users
can use their face, iris or fingerprint to unlock their device, Microsoft Passport, and other types of credentials.
4. Enterprise credential protection using Virtual Secure Mode (VSM)
• Microsoft Passport provides great protection to your users credentials, however you may not be aware that your
user’s derived credentials which are used for single sign-in (SSO), may also be under attack. Windows uses hardware-
based virtualization to isolate and help protect derived credentials from malware and attackers even if Windows itself
has been compromised
External-readycopy
* Windows Hello requires specialized hardware, including fingerprint reader,
illuminated IR sensor or other biometric sensors.
Long Copy
Microsoft Passport and Windows Hello* together offer convenient,
enterprise grade multi-factor authentication. Microsoft Passport is an
easy to deploy two-factor password alternative that provides enterprise
grade security like a SmartCard, but is more flexible. One factor could be
your PC or your phone, and another factor could be a PIN or biometrics
enabled by Windows Hello. Users can use their face, iris or fingerprint to
unlock their device. Enterprise credential protection uses hardware-
based virtualization to isolate a user’s derived credentials so hackers are
unable to access them.
Short Copy
Microsoft Passport is an easy to deploy two-factor password
alternative that is accessible by using a PIN or Windows Hello*,
which provides enterprise grade security and supports fingerprint,
facial, and iris based recognition.
Medium Copy
Microsoft Passport is an easy to deploy two-factor password
alternative that is accessible by using a PIN or Windows Hello*,
which provides enterprise grade security, and supports fingerprint,
facial, and iris based recognition. Enterprise credential protection
uses hardware-based virtualization to isolate a user’s derived
credentials so hackers are unable to access them.
Microsoft Passport & Windows Hello
feature copy: all up
4
External-readycopy
Sound bite
“The combination of easy-to-deploy and use multi-factor authentication makes
enterprise-grade authentication accessible to everyone, not just the largest orgs
with the big budgets.
* Windows Hello requires specialized hardware, including fingerprint reader,
illuminated IR sensor or other biometric sensors.
Enterprise Data Protection
5
1. Enterprise Data Protection
Enterprise Data Protection (EDP) provides data separation and containment capabilities and provides a
strong foundation for DLP. With EDP, Windows can automatically identify corporate apps and data and
protect them with file level encryption while at the same time preventing corporate content from leaking
unprotected to unauthorized locations. IT has full control of keys and protected data and can remote wipe
data on demand.
2. Seamless integration into the platform
• EDP is fully integrated into the mobile and desktop platform so there is no need to switch modes, move to
secure locations, use containers, or special apps to protect data. Windows seamlessly integrates the
protection behind the scenes so users can protect data without being interrupted by the process. This
seamless integration is a major differentiator vs. 3rd party solutions that typically offer security at the
expense of the user experience. With EDP you can have both!
3. IT Control
• With EDP Windows acts as an access control broker that gates user and app access to protected data
based on the policies that you define. IT has full control of keys and data and can remote wipe corporate
data on demand while leaving personal data untouched.
External-readycopy
Long Copy
Enterprise Data Protection with Windows 10 gives you enterprise
ready security that’s easy to manage and use. EDP makes it easier to
perform data separation and containment of corporate data –
wherever it might be. IT has full control of keys and data and can
remote wipe data on demand. Because our solution is seamlessly
integrated into the platform you can use the same apps (e.g.: Office,
Notepad, Adobe) to interact with protected data whether it’s on the
desktop or on mobile. Users enjoy an intuitive design, keeping their
focus on getting work done. And you get the corporate data protection
you need with straightforward manageability.
Short Copy
Enterprise Data Protection with Windows 10 makes it easier to
perform data separation and containment of corporate data –
wherever it might be. Unlike most 3rd party solutions, Windows
does not require containers. Instead our solution protects data
wherever it lives on the device. Windows acts as an access control
broker that gates user and app access to protected data based on
the policies that you define.
Medium Copy
Enterprise Data Protection with Windows 10 gives you enterprise
ready security that’s easy to manage and use. EDP makes it easier
to perform data separation and containment of corporate data –
wherever it might be. And because our solution is seamlessly
integrated into the platform EDP doesn’t get in the way of users
and they can use the same apps (e.g.: Office, Notepad, Adobe) to
interact with protected data whether it’s on the desktop or on
mobile.
EDP feature copy: all up
6
External-readycopy
Sound bite
“Enterprise Data Protection from Windows 10 offers data separation and
containment of corporate data that is easy use and manage.”
1. Control your environment
• Help secure your environment and prevent untrusted apps and code from running using the ultimate
form of app control. Using hardware based isolation Device Guard offers a solution more powerful
than traditional allow and deny listing products. Hardware based app control helps ensure that Device
Guards protection are well defended from tampering and bypass.
2. Hardware Rooted App Control
• Device Guard uses hardware-based virtualization to isolate and protect Device Guard features, such as
the Hyper-V Code Integrity Service, from malware and attacks even if Windows itself has been
compromised. In addition Device Guard uses virtualization to help protect kernel mode processes
from in-memory attacks offering a strong mitigation to zero days.
3. Trusted Apps
• Device Guard enables IT to decide which software vendors and apps are trustworthy within their
environment. IT can trust everything from the Windows Store, from specific software vendors, their
own LOB apps, or a combination of their choosing. Device Guard works with Windows Classic and
Universal Apps and it includes tools that make it easy to sign your legacy apps.
Device Guard
7
External-readycopy
Long Copy
Device Guard on Windows 10 puts you in control of your environment
– and a step ahead of malware – with rigorous access controls that
help prevent untrusted apps and executables from starting. You’ll be
able to lock down devices, granting access only to apps from trusted
sources. Device Guard uses hardware based isolation and virtualization
to help prevent tampering and bypass even in cases where the
operating system has be fully compromised.
Short Copy
Device Guard puts you in control of your environment with
rigorous access controls that help prevent malware, untrusted
apps and executables from running on devices.
Medium Copy
Device Guard puts you in control of your environment and a step
ahead of malware, with rigorous access controls that help prevent
untrusted apps and executables from starting. Device Guard works
with all of the apps in your environment and includes tools that
make it easy to sign legacy apps.
Device Guard feature copy: all up
8
External-readycopy
Sound bite
“Device Guard provides the most decisive malware defense ever shipped in
Windows and ensures that only trusted apps can start on the device.”

More Related Content

What's hot

10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17namprince187
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for workJavier Gonzalez
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesCyber Security Alliance
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock DatasheetIS Decisions
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsRobert Crane
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheettmaliyil
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 

What's hot (20)

10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
sym
symsym
sym
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 

Similar to Windows 10: Security Focus (part II)

Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGuilherme Maia
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessDavid J Rosenthal
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Fastest antivirus software
Fastest antivirus softwareFastest antivirus software
Fastest antivirus softwareinovuustech
 
IT Maintenance and Solution
IT Maintenance and SolutionIT Maintenance and Solution
IT Maintenance and Solutioninovuustech
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha ChathurangaaOS Community
 

Similar to Windows 10: Security Focus (part II) (20)

BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for Business
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Meet windows10
Meet windows10Meet windows10
Meet windows10
 
Fastest antivirus software
Fastest antivirus softwareFastest antivirus software
Fastest antivirus software
 
IT Maintenance and Solution
IT Maintenance and SolutionIT Maintenance and Solution
IT Maintenance and Solution
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 

More from Juan Ignacio Oller Aznar

Taller de Despliegue de imágenes en Azure
Taller de Despliegue de imágenes en AzureTaller de Despliegue de imágenes en Azure
Taller de Despliegue de imágenes en AzureJuan Ignacio Oller Aznar
 
Despliegue de máquinas virtuales en Azure
Despliegue de máquinas virtuales en AzureDespliegue de máquinas virtuales en Azure
Despliegue de máquinas virtuales en AzureJuan Ignacio Oller Aznar
 
Introducción a las máquinas virtuales en Azure
Introducción a las máquinas virtuales en AzureIntroducción a las máquinas virtuales en Azure
Introducción a las máquinas virtuales en AzureJuan Ignacio Oller Aznar
 
Charla Azure Security Barcelona 2019-12-14
Charla Azure Security Barcelona 2019-12-14Charla Azure Security Barcelona 2019-12-14
Charla Azure Security Barcelona 2019-12-14Juan Ignacio Oller Aznar
 
Windows Sever 2016: Administración Remota
Windows Sever 2016: Administración RemotaWindows Sever 2016: Administración Remota
Windows Sever 2016: Administración RemotaJuan Ignacio Oller Aznar
 
Hyper-V y Contenedores, una nueva forma de virtualización
Hyper-V y Contenedores, una nueva forma de virtualizaciónHyper-V y Contenedores, una nueva forma de virtualización
Hyper-V y Contenedores, una nueva forma de virtualizaciónJuan Ignacio Oller Aznar
 
Windows Server 2016: roles, caracteristicas y...
Windows Server 2016: roles, caracteristicas y...Windows Server 2016: roles, caracteristicas y...
Windows Server 2016: roles, caracteristicas y...Juan Ignacio Oller Aznar
 

More from Juan Ignacio Oller Aznar (20)

Taller de Despliegue de imágenes en Azure
Taller de Despliegue de imágenes en AzureTaller de Despliegue de imágenes en Azure
Taller de Despliegue de imágenes en Azure
 
Despliegue de máquinas virtuales en Azure
Despliegue de máquinas virtuales en AzureDespliegue de máquinas virtuales en Azure
Despliegue de máquinas virtuales en Azure
 
Introducción a las máquinas virtuales en Azure
Introducción a las máquinas virtuales en AzureIntroducción a las máquinas virtuales en Azure
Introducción a las máquinas virtuales en Azure
 
Charla Azure Sentinel Zaragoza
Charla Azure Sentinel ZaragozaCharla Azure Sentinel Zaragoza
Charla Azure Sentinel Zaragoza
 
Charla Azure Security Center en Zaragoza
Charla Azure Security Center en ZaragozaCharla Azure Security Center en Zaragoza
Charla Azure Security Center en Zaragoza
 
Introduccion hyper v
Introduccion hyper vIntroduccion hyper v
Introduccion hyper v
 
Charla Azure Security Barcelona 2019-12-14
Charla Azure Security Barcelona 2019-12-14Charla Azure Security Barcelona 2019-12-14
Charla Azure Security Barcelona 2019-12-14
 
DevOps a vista de pajaro
DevOps a vista de pajaroDevOps a vista de pajaro
DevOps a vista de pajaro
 
Intro a la accesibilidad digital
Intro a la accesibilidad digitalIntro a la accesibilidad digital
Intro a la accesibilidad digital
 
Gppb event promotion deck zaragoza
Gppb event promotion deck zaragozaGppb event promotion deck zaragoza
Gppb event promotion deck zaragoza
 
Getting started power apps
Getting started power appsGetting started power apps
Getting started power apps
 
Gppb digital accesibility
Gppb digital accesibilityGppb digital accesibility
Gppb digital accesibility
 
DevOps a vista de pajaro
DevOps a vista de pajaroDevOps a vista de pajaro
DevOps a vista de pajaro
 
Windows Sever 2016: Administración Remota
Windows Sever 2016: Administración RemotaWindows Sever 2016: Administración Remota
Windows Sever 2016: Administración Remota
 
Windows Server: Servidor de DNS
Windows Server: Servidor de DNSWindows Server: Servidor de DNS
Windows Server: Servidor de DNS
 
Windows Server 2016: Servidor de DHCP
Windows Server 2016: Servidor de DHCPWindows Server 2016: Servidor de DHCP
Windows Server 2016: Servidor de DHCP
 
Hyper-V y Contenedores, una nueva forma de virtualización
Hyper-V y Contenedores, una nueva forma de virtualizaciónHyper-V y Contenedores, una nueva forma de virtualización
Hyper-V y Contenedores, una nueva forma de virtualización
 
Windows Server 2016: roles, caracteristicas y...
Windows Server 2016: roles, caracteristicas y...Windows Server 2016: roles, caracteristicas y...
Windows Server 2016: roles, caracteristicas y...
 
Novedades de Windows Server 2016
Novedades de Windows Server 2016Novedades de Windows Server 2016
Novedades de Windows Server 2016
 
Windows PowerShell: Gestión de Servicios
Windows PowerShell: Gestión de ServiciosWindows PowerShell: Gestión de Servicios
Windows PowerShell: Gestión de Servicios
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Windows 10: Security Focus (part II)

  • 1. Windows 10: Security focus (part II) Juan Ignacio Oller Aznar MVP: Cloud and Datatenter Management
  • 3. Microsoft Passport & Windows Hello 3 1. Convenient multi-factor authentication Windows 10 offers a flexible multi-factor authentication that allows users to use either biometrics or a PIN plus a trusted device to access business networks and resources, while IT can ensure strong identity is used organization wide instead of passwords. 2. Microsoft Passport Microsoft Passport is the flexible two-factor authentication solution that acts as an alternative to a password, and has enterprise grade security much like a SmartCard. Use your PC or your mobile phone, whether it’s an Windows Phone, iOS, or even an Android device, as one of the factors. The other factor will be biometric or a PIN. 3. Windows Hello* Windows Hello* is a biometric alternative to a PIN when unlocking a device and using your Microsoft Passport. Users can use their face, iris or fingerprint to unlock their device, Microsoft Passport, and other types of credentials. 4. Enterprise credential protection using Virtual Secure Mode (VSM) • Microsoft Passport provides great protection to your users credentials, however you may not be aware that your user’s derived credentials which are used for single sign-in (SSO), may also be under attack. Windows uses hardware- based virtualization to isolate and help protect derived credentials from malware and attackers even if Windows itself has been compromised External-readycopy * Windows Hello requires specialized hardware, including fingerprint reader, illuminated IR sensor or other biometric sensors.
  • 4. Long Copy Microsoft Passport and Windows Hello* together offer convenient, enterprise grade multi-factor authentication. Microsoft Passport is an easy to deploy two-factor password alternative that provides enterprise grade security like a SmartCard, but is more flexible. One factor could be your PC or your phone, and another factor could be a PIN or biometrics enabled by Windows Hello. Users can use their face, iris or fingerprint to unlock their device. Enterprise credential protection uses hardware- based virtualization to isolate a user’s derived credentials so hackers are unable to access them. Short Copy Microsoft Passport is an easy to deploy two-factor password alternative that is accessible by using a PIN or Windows Hello*, which provides enterprise grade security and supports fingerprint, facial, and iris based recognition. Medium Copy Microsoft Passport is an easy to deploy two-factor password alternative that is accessible by using a PIN or Windows Hello*, which provides enterprise grade security, and supports fingerprint, facial, and iris based recognition. Enterprise credential protection uses hardware-based virtualization to isolate a user’s derived credentials so hackers are unable to access them. Microsoft Passport & Windows Hello feature copy: all up 4 External-readycopy Sound bite “The combination of easy-to-deploy and use multi-factor authentication makes enterprise-grade authentication accessible to everyone, not just the largest orgs with the big budgets. * Windows Hello requires specialized hardware, including fingerprint reader, illuminated IR sensor or other biometric sensors.
  • 5. Enterprise Data Protection 5 1. Enterprise Data Protection Enterprise Data Protection (EDP) provides data separation and containment capabilities and provides a strong foundation for DLP. With EDP, Windows can automatically identify corporate apps and data and protect them with file level encryption while at the same time preventing corporate content from leaking unprotected to unauthorized locations. IT has full control of keys and protected data and can remote wipe data on demand. 2. Seamless integration into the platform • EDP is fully integrated into the mobile and desktop platform so there is no need to switch modes, move to secure locations, use containers, or special apps to protect data. Windows seamlessly integrates the protection behind the scenes so users can protect data without being interrupted by the process. This seamless integration is a major differentiator vs. 3rd party solutions that typically offer security at the expense of the user experience. With EDP you can have both! 3. IT Control • With EDP Windows acts as an access control broker that gates user and app access to protected data based on the policies that you define. IT has full control of keys and data and can remote wipe corporate data on demand while leaving personal data untouched. External-readycopy
  • 6. Long Copy Enterprise Data Protection with Windows 10 gives you enterprise ready security that’s easy to manage and use. EDP makes it easier to perform data separation and containment of corporate data – wherever it might be. IT has full control of keys and data and can remote wipe data on demand. Because our solution is seamlessly integrated into the platform you can use the same apps (e.g.: Office, Notepad, Adobe) to interact with protected data whether it’s on the desktop or on mobile. Users enjoy an intuitive design, keeping their focus on getting work done. And you get the corporate data protection you need with straightforward manageability. Short Copy Enterprise Data Protection with Windows 10 makes it easier to perform data separation and containment of corporate data – wherever it might be. Unlike most 3rd party solutions, Windows does not require containers. Instead our solution protects data wherever it lives on the device. Windows acts as an access control broker that gates user and app access to protected data based on the policies that you define. Medium Copy Enterprise Data Protection with Windows 10 gives you enterprise ready security that’s easy to manage and use. EDP makes it easier to perform data separation and containment of corporate data – wherever it might be. And because our solution is seamlessly integrated into the platform EDP doesn’t get in the way of users and they can use the same apps (e.g.: Office, Notepad, Adobe) to interact with protected data whether it’s on the desktop or on mobile. EDP feature copy: all up 6 External-readycopy Sound bite “Enterprise Data Protection from Windows 10 offers data separation and containment of corporate data that is easy use and manage.”
  • 7. 1. Control your environment • Help secure your environment and prevent untrusted apps and code from running using the ultimate form of app control. Using hardware based isolation Device Guard offers a solution more powerful than traditional allow and deny listing products. Hardware based app control helps ensure that Device Guards protection are well defended from tampering and bypass. 2. Hardware Rooted App Control • Device Guard uses hardware-based virtualization to isolate and protect Device Guard features, such as the Hyper-V Code Integrity Service, from malware and attacks even if Windows itself has been compromised. In addition Device Guard uses virtualization to help protect kernel mode processes from in-memory attacks offering a strong mitigation to zero days. 3. Trusted Apps • Device Guard enables IT to decide which software vendors and apps are trustworthy within their environment. IT can trust everything from the Windows Store, from specific software vendors, their own LOB apps, or a combination of their choosing. Device Guard works with Windows Classic and Universal Apps and it includes tools that make it easy to sign your legacy apps. Device Guard 7 External-readycopy
  • 8. Long Copy Device Guard on Windows 10 puts you in control of your environment – and a step ahead of malware – with rigorous access controls that help prevent untrusted apps and executables from starting. You’ll be able to lock down devices, granting access only to apps from trusted sources. Device Guard uses hardware based isolation and virtualization to help prevent tampering and bypass even in cases where the operating system has be fully compromised. Short Copy Device Guard puts you in control of your environment with rigorous access controls that help prevent malware, untrusted apps and executables from running on devices. Medium Copy Device Guard puts you in control of your environment and a step ahead of malware, with rigorous access controls that help prevent untrusted apps and executables from starting. Device Guard works with all of the apps in your environment and includes tools that make it easy to sign legacy apps. Device Guard feature copy: all up 8 External-readycopy Sound bite “Device Guard provides the most decisive malware defense ever shipped in Windows and ensures that only trusted apps can start on the device.”