This document summarizes security features in Windows 7 Enterprise. It discusses (1) a fundamentally secure platform with streamlined user account control and enhanced auditing, (2) securing anywhere access through network security, network access protection, and DirectAccess, (3) protecting users and infrastructure with AppLocker, Internet Explorer, and data recovery tools, and (4) protecting data from unauthorized viewing using RMS, EFS, and BitLocker/BitLocker To Go. The features are designed to provide simple, manageable security and control for IT professionals.
Pequeña presentación sobre más opciones de seguridad de Microsoft Windows 10. Esta charla está englobada dentro de un ciclo de micro-charlas de seguridad de cliente Windows.
Whitepaper Abstract
The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of the information they protect. In response to this threat, the PCI has produced an excellent series of process and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series of principles and accompanying requirements that are critical to the integrity of the industry's computer systems.
This paper outlines relevant PCI DSS requirements and discusses how BOUNCER by CoreTrace provides an elegant solution for meeting many of the requirements — in any PCI environment with sensitive data, from large servers processing thousands of transactions to small kiosks in the mall.
ESET is introducing its brand new product ESET Secure AuthenticationESET
ESET Secure Authentication (ESA) provides ultra-strong authentication to protect your network access and assets. It allows your mobile workforce to safely connect to the company network.
It is a mobile-based solution that uses two-factor (2FA) one-time-password (OTP) authentication system for accessing the company's VPN and OWA (Outlook Web App).
Read more about ESET Secure Authentication: www.eset.com/business/products/secure-authentication
Certification Europe ran an Information Security Breakfast Seminar in November 2011. the main topic of the day was ISO 27001 and the benefits which a company can achieve by implementing ISO 27001 - Information Security Management Systems certification within a company.
Brian Honan, CEO of BH Consulting Ltd presented a very interesting and compelling presentation on 'Implementing ISO 27001 In A Cost Effective Way' at the event. The attached slides give a brief synopsis of the overall process.
Further details can be found on our our company website http://www.certificationeurope.com and on our You Tube channel http://www.youtube.com/user/CertificationEurope#p/u
Symantec Enterprise Mobility Vision May 2012Symantec
Symantec’s recent enterprise mobile enhancements help organizations leverage mobility to improve operational efficiencies and better meet the challenges of the “Bring Your Own Device” trend.
Guardium, the database security company, develops the most widely-used network solution for database security and auditing. By securing sensitive corporate information such as financial, customer, and employee data in real-time and automating change controls and compliance reporting. Named "Hot Pick" by Information Security magazine, and "Editor’s Choice" by SQL Server magazine, Guardium's SQL Guard family of network appliances continuously monitors and prevents unauthorized access to databases, performing deep packet inspection on all network traffic and detailed SQL linguistic analysis to detect or block specific commands based on policies (with specialized modules for SOX, PCI, Basel II, and data privacy laws). For more information, please visit www.guardium.com.
201104 Best Practices For Keeping Your Home Network Securermpall
An awesome document provided to me by the govt. with permission to distribute. This was created by the NSA and has covered everything to protect your home computing devices.
Pequeña presentación sobre más opciones de seguridad de Microsoft Windows 10. Esta charla está englobada dentro de un ciclo de micro-charlas de seguridad de cliente Windows.
Whitepaper Abstract
The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of the information they protect. In response to this threat, the PCI has produced an excellent series of process and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series of principles and accompanying requirements that are critical to the integrity of the industry's computer systems.
This paper outlines relevant PCI DSS requirements and discusses how BOUNCER by CoreTrace provides an elegant solution for meeting many of the requirements — in any PCI environment with sensitive data, from large servers processing thousands of transactions to small kiosks in the mall.
ESET is introducing its brand new product ESET Secure AuthenticationESET
ESET Secure Authentication (ESA) provides ultra-strong authentication to protect your network access and assets. It allows your mobile workforce to safely connect to the company network.
It is a mobile-based solution that uses two-factor (2FA) one-time-password (OTP) authentication system for accessing the company's VPN and OWA (Outlook Web App).
Read more about ESET Secure Authentication: www.eset.com/business/products/secure-authentication
Certification Europe ran an Information Security Breakfast Seminar in November 2011. the main topic of the day was ISO 27001 and the benefits which a company can achieve by implementing ISO 27001 - Information Security Management Systems certification within a company.
Brian Honan, CEO of BH Consulting Ltd presented a very interesting and compelling presentation on 'Implementing ISO 27001 In A Cost Effective Way' at the event. The attached slides give a brief synopsis of the overall process.
Further details can be found on our our company website http://www.certificationeurope.com and on our You Tube channel http://www.youtube.com/user/CertificationEurope#p/u
Symantec Enterprise Mobility Vision May 2012Symantec
Symantec’s recent enterprise mobile enhancements help organizations leverage mobility to improve operational efficiencies and better meet the challenges of the “Bring Your Own Device” trend.
Guardium, the database security company, develops the most widely-used network solution for database security and auditing. By securing sensitive corporate information such as financial, customer, and employee data in real-time and automating change controls and compliance reporting. Named "Hot Pick" by Information Security magazine, and "Editor’s Choice" by SQL Server magazine, Guardium's SQL Guard family of network appliances continuously monitors and prevents unauthorized access to databases, performing deep packet inspection on all network traffic and detailed SQL linguistic analysis to detect or block specific commands based on policies (with specialized modules for SOX, PCI, Basel II, and data privacy laws). For more information, please visit www.guardium.com.
201104 Best Practices For Keeping Your Home Network Securermpall
An awesome document provided to me by the govt. with permission to distribute. This was created by the NSA and has covered everything to protect your home computing devices.
Norton Zone lets you deploy a safe and easy file-sharing service with the security expertise, visibility, and administrative controls you can only get from Symantec. With patented key encryption, Active Directory for SSO, automated two-factor authentication, and more, your employees can share files any time from any device—smartphone, computer or tablet.
On October 26th, C/D/H presented on Windows Intune to a group of IT professionals at TechKNOWLEDGEy 2011. Attendees learned an overview of Intune and how it can simply PC management.
View the slide deck and find out the benefits of Intune, if it’s right for your business, pricing basics and how to take advantage of a free trial.
For more information on this or other topics, visit our blog at www.cdhtalkstech.com.
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
RSA 2012 Virtualization Security February 2012Symantec
At RSA 2012 Symantec and VMware announced five new security integrations with the VMware cloud infrastructure suite designed to deliver extensive protection for virtual and cloud environments along with operational cost savings. With new VMware integrations, Symantec enables joint customers to completely protect their virtual infrastructure and business-critical applications with data loss prevention, IT risk an compliance, data center protection, security information and event management (SIEM) and endpoint protection solutions – delivering unparalleled security, scalability and cost reductions for rapid services delivery and enhanced business agility for the cloud.
At VMworld 2012, Symantec announced new solutions and technical integrations with VMware across its entire product portfolio to ensure higher levels of protection for virtualized environments. Together, Symantec and VMware enable SMBs and enterprises to use the benefits of virtualization without compromising protection.
Cisco Trustsec & Security Group TaggingCisco Canada
This presentation covers the protocols and functions that create a trusted network. We will discuss the best practices when deploying this tagging ability using campus switches including migration techniques from non-SGT capable to devices to a fully SGT capable network deployment. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
ESET: Delivering Benefits to Medium and Large BusinessesESET
Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore!
http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
Our enterprise-grade security
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
We’re more integrated and flexible
Architecture matters. That’s why our solutions run in the cloud and work seamlessly with your on-premises investments—taking the worry out of scale, maintenance, and updates.
Our cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for costly and complicated integration efforts across point capabilities. It’s the fastest and most cost-effective way to meet new business challenges and accommodate new devices, new apps, and new hires.
Nobody manages Office better
Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest IT challenges. Other vendors solve it with apps that compromise user experience and put the brakes on productivity.
Microsoft enterprise mobility solutions integrate deeply with Microsoft Office, the gold standard of productivity. We’re the only solution that brings managed mobile productivity with Microsoft Office across devices.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Norton Zone lets you deploy a safe and easy file-sharing service with the security expertise, visibility, and administrative controls you can only get from Symantec. With patented key encryption, Active Directory for SSO, automated two-factor authentication, and more, your employees can share files any time from any device—smartphone, computer or tablet.
On October 26th, C/D/H presented on Windows Intune to a group of IT professionals at TechKNOWLEDGEy 2011. Attendees learned an overview of Intune and how it can simply PC management.
View the slide deck and find out the benefits of Intune, if it’s right for your business, pricing basics and how to take advantage of a free trial.
For more information on this or other topics, visit our blog at www.cdhtalkstech.com.
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
RSA 2012 Virtualization Security February 2012Symantec
At RSA 2012 Symantec and VMware announced five new security integrations with the VMware cloud infrastructure suite designed to deliver extensive protection for virtual and cloud environments along with operational cost savings. With new VMware integrations, Symantec enables joint customers to completely protect their virtual infrastructure and business-critical applications with data loss prevention, IT risk an compliance, data center protection, security information and event management (SIEM) and endpoint protection solutions – delivering unparalleled security, scalability and cost reductions for rapid services delivery and enhanced business agility for the cloud.
At VMworld 2012, Symantec announced new solutions and technical integrations with VMware across its entire product portfolio to ensure higher levels of protection for virtualized environments. Together, Symantec and VMware enable SMBs and enterprises to use the benefits of virtualization without compromising protection.
Cisco Trustsec & Security Group TaggingCisco Canada
This presentation covers the protocols and functions that create a trusted network. We will discuss the best practices when deploying this tagging ability using campus switches including migration techniques from non-SGT capable to devices to a fully SGT capable network deployment. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
ESET: Delivering Benefits to Medium and Large BusinessesESET
Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore!
http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
Our enterprise-grade security
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
We’re more integrated and flexible
Architecture matters. That’s why our solutions run in the cloud and work seamlessly with your on-premises investments—taking the worry out of scale, maintenance, and updates.
Our cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for costly and complicated integration efforts across point capabilities. It’s the fastest and most cost-effective way to meet new business challenges and accommodate new devices, new apps, and new hires.
Nobody manages Office better
Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest IT challenges. Other vendors solve it with apps that compromise user experience and put the brakes on productivity.
Microsoft enterprise mobility solutions integrate deeply with Microsoft Office, the gold standard of productivity. We’re the only solution that brings managed mobile productivity with Microsoft Office across devices.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Neki Novi Novinari - Mali vodič kroz svet medija i novinarstvaDragana Petkovic
Vodič o novim medijima i novinarstvu za srednjoškolce i mlade novinare, kreiran i objavljen u sklopu rada na portalu Mingl, u okviru projekta koje je podržalo Ministarstvo kulture.
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline for their systems.
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
Gestiona todos tus dispositivos corporativos Windows 10 desde Microsoft Intune. Entornos híbridos de autenticación, autenticación multi factor y acceso seguro a aplicaciones SaaS. Por Jose María Genzor
19.10.2016 klo 9.30 järjestimme webinaarin, jossa kävimme teknisen tietoturvan keskeiset osa-alueet lävitse ja kerromme, mitkä ovat kunkin osa-alueen asiat, jotka vähintään pitää olla kunnossa, jotta voi yöllä nukkua rauhallisin mielin. Asiantuntijavieraana webinaarissa on Microsoftin Partner Technology Strategist, Ari Auvinen, joka osaltaan kertoi, millaisia teknisiä ratkaisuja tietoturva-asioiden kunnostamiseen on olemassa.
This session will explore Windows 7 core platform security improvements, securing anywhere access, data protection, and protecting desktop users. We will explain how Windows 7 features in each of these areas provide the foundation for secure and reliable platform. We will discuss User Account Control improvements, enhanced auditing, Network Access Protection (NAP), Firewall improvements, Applocker, Bitlocker and Bitlocker to go enhancements, Direct Access, Internet Explorer 8 security improvements, and EFS enhancements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Enhance Security and Control
Narenda Wicaksono
IT Pro Advisor, Microsoft Indonesia
3. Windows 7 Enterprise Security
Building upon the security foundations of Windows Vista, Windows 7 provides IT
Professionals security features that are simple to use, manageable, and valuable.
4. A. Fundamentally Secure Platform
Windows Vista Foundation
Streamlined User Account
Control
Enhanced Auditing
5. B. Securing Anywhere Access
Network Security
Network Access Protection
Direct AccessTM
6. C. Protect Users & Infrastructure
AppLockerTM
Internet Explorer
Data Recovery
7. D. Protect Data from Unauthorized
Viewing
RMS
EFS
BitLocker &
BitLocker To GoTM
8. A. Fundamentally Secure Platform
Windows Vista Streamlined User Enhanced Auditing
Foundation Account Control
9. Streamlined User Account Control
Make the system work well for
standard users
Administrators use full privilege
only for administrative tasks
File and registry virtualization
helps applications that are not
UAC compliant
10. User Account Control – Windows 7
Reduce the number of OS applications and tasks that require elevation
Refactor applications into elevated/non-elevated pieces
Flexible prompt behavior for administrators
Users can do even more as a standard user
Administrators will see fewer UAC Elevation Prompts
12. Network Security
Policy based network
segmentation for more
secure and isolated logical
networks
Multi-Home Firewall
Profiles
DNSSec Support
13. Network Access Protection
Ensure that only “healthy”
machines can access
corporate data
Enable “unhealthy”
machines to get clean
before they gain access
14. DirectAccess
Security protected,
seamless, always on
connection to corporate
network
Improved management of
remote users
Consistent security for all
access scenarios
15. Network Access Protection
POLICY
SERVERS
such as: Patch, AV
Windows DHCP, VPN
Client Switch/Router NPS
Not Policy Remediation
Compliant Servers
Example: Patch
Restricted
Network
Health policy validation and
remediation
Helps keep mobile, desktop
and server devices in Policy CORPORATE NETWORK
compliance Compliant
Reduces risk from
unauthorized systems on the
network
16. Remote Access for Mobile Workers
Access Information Anywhere
Difficult for users to access corporate resources from outside the office
Challenging for IT to manage, update, patch mobile PCs while disconnected
from company network
17. Remote Access for Mobile Workers
Access Information Anywhere
Same experience accessing corporate resources inside and outside the office
Seamless connection increases productivity of mobile users
Easy to service mobile PCs and distribute updates and polices
18. C. Protect Users & Infrastructure
AppLockerTM Internet Explorer 8 Data Recovery
19. AppLockerTM
Enables application
standardization within an
organization without
increasing TCO
Increase security to safeguard
against data and privacy loss
Support compliance
enforcement
20. Internet Explorer 8
Protect users against social
engineering and privacy
exploits
Protect users against browser
based exploits
Protect users against web
server exploits
21. Data Recovery
File back up and restore
CompletePC™ image-based
backup
System Restore
Volume Shadow Copies
Volume Revert
22. Application Control
Users can install and run non-standard applications
Even standard users can install some types of software
Unauthorized applications may:
Introduce malware, Increase helpdesk calls, Reduce user productivity,
Undermine compliance efforts
23. Application Control
Eliminate unwanted/unknown applications in your network
Enforce application standardization within your organization
Easily create and manage flexible rules using Group Policy
26. RMS
Policy definition
and enforcement
Protects information
wherever it travels
Integrated RMS Client
Policy-based protection of
document libraries in
SharePoint
27. EFS
User-based file and folder
encryption
Ability to store EFS keys
on a smart card
28. BitLocker
Easier to configure and
deploy
Roam protected data
between work and home
Share protected data with
co-workers, clients,
partners, etc.
Improve compliance and
data security
29. BitLocker
Worldwide Shipments (000s)
1200 Removable Solid-
State Storage
1000
Shipments
800
600
400 PC
200 Shipments
0
2007 2008 2009 2010 2011
• Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth
• Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa,
George Shiffler III
30. BitLocker
+
Extend BitLocker drive encryption to removable devices
Create group policies to mandate the use of encryption and block
unencrypted drives
Simplify BitLocker setup and configuration of primary hard drive
31. BitLocker
BitLocker Enhancements
Automatic 200 Mb hidden boot partition
New Key Protectors
Domain Recovery Agent (DRA)
Smart card – data volumes only
BitLocker To Go
Support for FAT*
Protectors: DRA, passphrase, smart card and/or auto-unlock
Management: protector configuration, encryption enforcement
Read-only access on Vista & XP
SKU Availability
Encrypting – Enterprise
Unlocking – All
32. Windows 7 Enterprise Security
Building upon the security foundations of Windows Vista, Windows 7 provides IT
Professionals security features that are simple to use, manageable, and valuable.
Windows Vista Network Security AppLocker RMS
Foundation
Network Access Internet Explorer 8 EFS
Streamlined UAC Protection
Data Recovery BitLocker
Enhanced Auditing DirectAccess