The document outlines a two day training on Windows Server 2012 R2 and System Center 2012 R2. Day 1 covers new features of Windows Server 2012 R2 including server virtualization, cloud optimized networking, and storage. Day 2 focuses on server management, VDI, access and information protection, and web applications. The document also provides information on downloading the Windows Server 2012 R2 and System Center 2012 R2 previews and an upcoming System Center 2012 R2 Jumpstart event.
Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate resources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions.
Enterprise Mobility Suite is a new technology provided by Microsoft to maintain and manage users access to corporate information through their personal devices.
In this way users obtain the dynamic experience they are looking for and IT Managers ensure that corporate data is safe.
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
Enterprise Mobility Suite (EMS) is Here from Atidan starting April 2015
Device Management, Access Control, Information Protection
Hybrid and Cloud Identity with Azure Active Directory Premium
Device Management, Access Control, Information Protection
Mobile Device Management with Microsoft Intune
Mobile device settings management
Mobile app management
Selective wipe
Data Protection with Azure Rights Management
Information protection
Connection to on-premises assets
Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate resources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions.
Enterprise Mobility Suite is a new technology provided by Microsoft to maintain and manage users access to corporate information through their personal devices.
In this way users obtain the dynamic experience they are looking for and IT Managers ensure that corporate data is safe.
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
Enterprise Mobility Suite (EMS) is Here from Atidan starting April 2015
Device Management, Access Control, Information Protection
Hybrid and Cloud Identity with Azure Active Directory Premium
Device Management, Access Control, Information Protection
Mobile Device Management with Microsoft Intune
Mobile device settings management
Mobile app management
Selective wipe
Data Protection with Azure Rights Management
Information protection
Connection to on-premises assets
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
A general guide on how to use SIF IDM V2.7 and V3.1 for identity management in education technology solutions, especially for complex multi-vendor, multi-application frameworks. Includes the typical use cases such as provisioning and SSO establishment, workflows, best practice in U.S. and Australia implementations, and architectural contexts.
Patterns and Antipatterns in Enterprise SecurityWSO2
To view recording of this webinar please use below URL:
Attacks against information systems is on the rise making enterprise security a major concern. It’s important to identify and address security needs such as confidentiality, integrity, availability and auditability of information. Enterprise security patterns facilitate balanced and informed decisions about security needs, as well as provide a rationale for the evolution of security needs over time. Antipatterns, which are fostered by misapplications of concepts and misunderstandings of security concerns, should be avoided. Enterprise security patterns and antipatterns solve these security concerns by addressing recurrent problems and challenges. These security patterns facilitate balanced and informed decisions about security needs, avoid the misapplication of concepts and misunderstanding of security concerns and provide a rationale for evolution of security needs over time.
This webinar will
Deep dive into enterprise security patterns and antipatterns
Explore the importance of using them
Discuss how to apply them with WSO2 Identity Server
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
Profesia, Lynx Group, presenta la terza puntata di masterclass sulla tecnologia WSO2 di cui è Distributore esclusivo per l'Italia.
Autenticazione e autorizzazione, riconoscimento e abilitazione all'accesso. L'Identity server è uno strumento in grado di gestire l'autenticazione dei vostri utenti, interni ed esterni , di gestire le sessioni di login e di effettuare autenticazioni mirate al contesto applicativo. È consigliabile prediligere sempre un prodotto on-premise o in cloud compatible GDPR che supporta protocolli SAML e oAuth2 e permette la federazione con i maggiori IDP social.
Se stai pensando a una trasformazione digitale per evolvere verso un business agile scrivi a contact@profesia.it e parla con uno dei nostri esperti
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
No enterprise security strategy or solution is complete without authentication. Managing and authorizing hundreds of user identities across disparate systems presents a formidable challenge for any IT organization. BlackBerry Workspaces recognizes that authentication and identity management should not be a deterrent to adopting critical new technology. We make it easy for enterprises to deploy Workspaces by providing self-provisioning methods out-of-the-box and by enabling integration with existing systems to align with current policies.
Design Pattern for Oracle Identity ProvisioningMike Reams
Architecture Design pattern for how to manage person data in an Identity ecosystem. Supports a TOGAF framework for establishing Building Blocks.
Reference:
Design Pattern Library http://solventarchitect.com/design-patterns
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...Vincent Biret
Slides supporting the session at the granite state user group meeting of January 2019. Talking as well about #Azure Active directory and lots of other things
Session 1 for the Azure Introduction for IT Pros event held at the Microsoft Norway offices in March 2015. The deck explains the mobility support in Azure and the Enterprise Mobility Suite (EMS).
WorksPad turns iPad, iPhone, and Android devices into functional enterprise mobile workplaces, providing business users with a wide range of capabilities, user-friendly interface, and enterprise-grade security in a single app for iOS and Android.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
A general guide on how to use SIF IDM V2.7 and V3.1 for identity management in education technology solutions, especially for complex multi-vendor, multi-application frameworks. Includes the typical use cases such as provisioning and SSO establishment, workflows, best practice in U.S. and Australia implementations, and architectural contexts.
Patterns and Antipatterns in Enterprise SecurityWSO2
To view recording of this webinar please use below URL:
Attacks against information systems is on the rise making enterprise security a major concern. It’s important to identify and address security needs such as confidentiality, integrity, availability and auditability of information. Enterprise security patterns facilitate balanced and informed decisions about security needs, as well as provide a rationale for the evolution of security needs over time. Antipatterns, which are fostered by misapplications of concepts and misunderstandings of security concerns, should be avoided. Enterprise security patterns and antipatterns solve these security concerns by addressing recurrent problems and challenges. These security patterns facilitate balanced and informed decisions about security needs, avoid the misapplication of concepts and misunderstanding of security concerns and provide a rationale for evolution of security needs over time.
This webinar will
Deep dive into enterprise security patterns and antipatterns
Explore the importance of using them
Discuss how to apply them with WSO2 Identity Server
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
Profesia, Lynx Group, presenta la terza puntata di masterclass sulla tecnologia WSO2 di cui è Distributore esclusivo per l'Italia.
Autenticazione e autorizzazione, riconoscimento e abilitazione all'accesso. L'Identity server è uno strumento in grado di gestire l'autenticazione dei vostri utenti, interni ed esterni , di gestire le sessioni di login e di effettuare autenticazioni mirate al contesto applicativo. È consigliabile prediligere sempre un prodotto on-premise o in cloud compatible GDPR che supporta protocolli SAML e oAuth2 e permette la federazione con i maggiori IDP social.
Se stai pensando a una trasformazione digitale per evolvere verso un business agile scrivi a contact@profesia.it e parla con uno dei nostri esperti
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
Matt Tatro, Denise Lores, Wade Ellery
Radiant Logic
How to avoid building half an Enterprise IdP; demonstration of how to create a federated identity service that will complement and improve your SSO by aggregating all of your identity silos into an enterprise IdP.
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
No enterprise security strategy or solution is complete without authentication. Managing and authorizing hundreds of user identities across disparate systems presents a formidable challenge for any IT organization. BlackBerry Workspaces recognizes that authentication and identity management should not be a deterrent to adopting critical new technology. We make it easy for enterprises to deploy Workspaces by providing self-provisioning methods out-of-the-box and by enabling integration with existing systems to align with current policies.
Design Pattern for Oracle Identity ProvisioningMike Reams
Architecture Design pattern for how to manage person data in an Identity ecosystem. Supports a TOGAF framework for establishing Building Blocks.
Reference:
Design Pattern Library http://solventarchitect.com/design-patterns
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...Vincent Biret
Slides supporting the session at the granite state user group meeting of January 2019. Talking as well about #Azure Active directory and lots of other things
Session 1 for the Azure Introduction for IT Pros event held at the Microsoft Norway offices in March 2015. The deck explains the mobility support in Azure and the Enterprise Mobility Suite (EMS).
WorksPad turns iPad, iPhone, and Android devices into functional enterprise mobile workplaces, providing business users with a wide range of capabilities, user-friendly interface, and enterprise-grade security in a single app for iOS and Android.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
Microsoft Cloud Identity and Access Management Poster - AtidanDavid J Rosenthal
Unlock the power of the cloud with enterprise-level identity services for all your cloud apps.
AZURE ACTIVE DIRECTORY
Use Azure Active Directory (Azure AD) at
global scale to centrally manage employee
access and provide single sign-on to
Microsoft services such as Azure, Office 365,
Dynamics CRM, Windows Intune, and
thousands of non-Microsoft cloud apps
MULTI-FACTOR AUTHENTICATION
Use Multi-Factor Authentication to protect
access to sensitive company information
and to help protect your organization from
malicious attacks.
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
KEY FEATURES
Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away. Focus on what is important using a simple, convenient feed.
Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc. This includes support for multi factor authentication (MFA).
Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Windows Server 2012 R2 Jump Start - AIP
1.
2. Day 1
Introducing Windows Server 2012 R2
Server Virtualization in Windows Server 2012 R2
Cloud Optimized Networking in Windows Server 2012 R2
Storage in Windows Server 2012 R2
Day 2
Server Management & Automation with Windows Server 2012
R2
VDI with Windows Server 2012 R2
Access & Information Protection with Windows Server 2012 R2
Web Application & Platform with Windows Server 2012 R2
Access & Information Protection with Windows Server 2012 R2
3. DOWNLOAD
Windows Server
2012 R2 Preview
aka.ms/ws2012r2
#WS2012R2JS
DOWNLOAD
System Center
2012 R2 Preview
aka.ms/sc2012r2
Hands-On Labs
http://www.microsoftvirtualacademy.com
System Center 2012 R2 Jumpstart
July 15th - http://aka.ms/SCR2JS
4. The explosion of devices is
eroding the standards-based
approach to corporate IT.
Devices
Deploying and managing
applications across
platforms is difficult.
Apps Data
Users need to be productive
while maintaining
compliance and reducing
risk.
Users expect to be able to
work in any location and
have access to all their
work resources.
Users
5. Devices AppsUsers
Empower users
Allow users to work on the
devices of their choice and
provide consistent access to
corporate resources.
Unify your environment
Deliver a unified application and
device management on-
premises and in the cloud.
Protect your data
Help protect corporate
information and manage risk.Management. Access. Protection.
Data
6. Protect your data
Centralize corporate information
for compliance and data protection
Policy based access control to
applications and data
Unify your environment
Common identity to access resources
on-premises and in the cloud
Empower users
Simplified registration and
enrollment for BYO Devices
Automatically connect to internal
resources when needed
Access to company resources
consistent across devices
7. Challenges Solutions
Users want to use the device of their choice and have
access to both their personal and work related
applications, data and resources
Users want an easy way to be able to access their
corporate applications from anywhere
IT want to empower users to work this way but also
need to control access to sensitive information and
remain in compliance with regulatory policies
Users can register their devices which makes them known to
IT who can then use device authentication as part of providing
access to corporate resources
Users can enroll their devices which provides them with the
Company Portal for consistent access to applications, data
and to manage their devices
IT can publish access to corporate resources with
conditional access based on the users identity, the device they
are using and their location
Empower
users
8. IT can publish access to
resources with the Web
Application Proxy
based on device
awareness and the users
identity
IT can provide seamless
corporate access with
DirectAccess and
automatic VPN
connections.
Users can work
from anywhere on
their device with
access to their
corporate resources.
Users can register
devices for single
sign-on and access to
corporate data with
Workplace Join
Users can enroll devices for
access to the Company Portal
for easy access to corporate
applications
IT can publish Desktop
Virtualization (VDI) for
access to centralized
resources
9. IT can publish access to corporate resources with
the Web Application Proxy based on device
awareness and the users identity. Multi-factor
authentication can be used through Windows
Azure Active Authentication.
Users can register BYO
devices for single sign-on
and access to corporate
data with Workplace Join.
As part of this, a certificate
is installed on the device
Users can enroll devices which
configure the device for management
with Windows Intune. The user can
then use the Company Portal for easy
access to corporate applications
As part of the registration
process, a new device object is
created in Active
Directory, establishing a link
between the user and their
device
Data from Windows Intune is
sync with Configuration
Manager which provides unified
management across both on-
premises and in the cloud
10. Users can access
corporate applications
and data wherever
they are
IT can use the Web Application
Proxy to authenticate users and
devices with multi-factor
authentication
Use conditional access for
granular control over how
and where the application
can be accessed
Active Directory provides
the central repository of
user identity as well as
the device registration
information
Developers can leverage Windows
Azure Mobile Services to integrate
and enhance their apps
Devices
Apps & Data
Published
applications
AD Integrated
11. Users can sync
their work data to
their devices.
Users can register
their devices to be
able to sync data
when IT enforces
conditional access
IT can publish access directly
through a reverse proxy, or
conditional access can be
enforced via device
registration through the
Web Application Proxy
IT can configure a File Server to
provide Work Folder sync
shares for each user to store
data that syncs to their devices,
including integration with
Rights Management
IT can selectively wipe the
corporate data from
Windows 8.1 clients
Devices
Apps & Data
Active Directory
discoverability
provides users Work
Folders location
12. Can originate admin
connection from intranet
Connection to
intranet is always active
Cannot originate admin
connection from intranet
VPN
DirectAccess
With DirectAccess, a users
PC is automatically
connected whenever an
Internet connection is
present.
Traditional VPNs are user-
initiated and provide on-
demand connectivity to
corporate resources.
An automatic VPN
connection provides
automated starting of the
VPN when a user launches
an application that requires
access to corporate
resources.
Firewall
13. Unify your
environment
Challenges Solutions
Providing users with a common identity when they
are accessing resources that are located both on-
premises in corporate environment, and in cloud-
based platforms.
Managing multiple identities and keeping the
information in sync across environments is a drain on
IT resources.
Users have a single sign-on experience when
accessing all resources regardless of location.
Users and IT can leverage their common identity for
access to external resources through federation.
IT can consistently manage identities across on-
premises and cloud-based identity domains.
14. User provided devices are
“unknown” and IT has no control.
Partial access may be provided to
corporate information.
Registered devices are “known”
and device authentication
allows IT to provide conditional
access to corporate information
Domain joined computers
are under the full control of IT
and can be provided with
complete access to corporate
information
Browser session single
sign-on
Seamless 2-Factor Auth
for web apps
Enterprise apps single
sign-on
Desktop Single Sign-On
15. Run Active Directory at
scale with support for
virtualization and rapid
deployment through
domain controller
cloning.
Developers can
integrate applications for
single sign-on across
on-premises and cloud-
based applications.
Leverage cloud platforms to run
Windows Server Active Directory and
Active Directory Federation Services
to reduce infrastructure on-premises.
Manage Active Directory
using Windows
PowerShell, use the
improved deployment
experience and leverage the
Active Directory
Administrative Center for
centralized management
Activate clients
running Office on at
least Windows 8 or
Windows Server 2012
automatically using
existing Active
Directory infrastructure.
16. Users get access through accounts in
Windows Azure Active Directory
to Windows Azure, Office 365 and
3rd party applications
IT can provide users with a common
identity across on-premises or cloud-
based services leveraging Windows
Server Active Directory and
Windows Azure Active Directory
Users are more
productive by having
a single sign-on to
all their resources IT can use Active Directory
Federation Services to connect with
Windows Azure for a consistent
cloud based identity.
Developers can build
applications that leverage
the common identity model
Dirsync keeps user attributes in sync
across directories.
17. Users can register their devices to gain access
to corporate data and apps and single sign-on
through device authentication
Conditional access with multi-
factor authentication is provided on
a per-application basis, leveraging
user identity, device registration &
network location
Organizations can
federate with partners
and other organizations
for seamless access to
shared resources
Organizations can connect to SaaS
applications running in Windows
Azure, Office 365 and 3rd party
providers
Enhancements to ADFS include simplified
deployment and management
Published
applicationsFirewall
18. Allow users to manage their identity
with an easy to use portal, tightly
integrated with Office.
Self-service group and
distribution list
management, including
dynamic membership
calculation in these
groups and distribution
lists, is based on the
user’s attributes.
Users can reset their
passwords via Windows
logon, significantly reducing
help desk burden and costs.
Sync users identity
across
directories, including
Active
Directory, Oracle, SQL
Server, IBM DS, and
LDAP.
Manage the complete life cycle of
certificates and smart cards
through integration with Active
Directory.
19. FIM
Workflow
Built-in workflow for
identity management
Automatically synchronize all
user information to different
directories across the enterprise
Automate the process of
on-boarding new users
Real-time de-provisioning
from all systems to prevent
unauthorized access and
information leakage
LDAP
Certificate Management
20. Protect your
data
Challenges Solutions
As users bring their own devices in to use for
work, they will also want to access sensitive
information and have access to this information locally
on the device.
A significant amount of corporate data can only be
found locally on user devices.
IT needs to be able to secure, classify and protect
data based on the content it contains not just where it
resides, including maintaining regulatory compliance.
Users can work on the device of their choice and be
able to access all their resources regardless of location
or device.
IT can enforce a set of central access and audit
polices, and be able to protect sensitive information
based on the content of the documents.
IT can centrally audit and report on information
access.
21. Desktop
Virtualization
IT can publish resources using the
web application proxy and create
business-driven access policies with
multi-factor authentication based
on the content being accessed.
IT can audit user access to
information based on
central audit policies.
Users can access
corporate data regardless
of device or location with
Work Folders for data
sync and desktop
virtualization for
centralized applications.
IT can provide a secure and familiar
solution for users to access sensitive
corporate data from anywhere with
VDI and RemoteApp technologies.
Centralized Data
Distributed Data
Devices
22. 1. Users attempts to login or
perform an action that is
subject to MFA
2. When the user
authenticates, the application
or service performs a MFA
call
3. The user must respond to
the challenge, which can be
configured as a txt, a phone
call or using a mobile app
5. IT can configure the type
and frequency of the MFA
that the user must respond
to
4. The response is returned
to the app which then allows
the user to proceed
23. Centrally manage
access control and
audit polices from
Windows Server
Active Directory.
Automatically
identify and classify
data based on
content. Classification
applies as files are
created or modified.
Integration with
Active Directory
Rights Management
Services provides
automated
encryption of
documents.
Central access and audit
policies can be applied
across multiple file servers,
with near real-time
classification and processing
of new and modified
documents.
File classification, access
policies and automated
Rights Management
works against client
distributed data through
Work Folders.
24. Protect your data
Centralize corporate information
for compliance and data protection
Policy based access control to
applications and data
Unify your environment
Common identity to access resources
on-premises and in the cloud
Empower users
Simplified registration and
enrollment for BYO Devices
Automatically connect to internal
resources when needed
Access to company resources
consistent across devices
25. DOWNLOAD
Windows Server
2012 R2 Preview
aka.ms/ws2012r2
#WS2012R2JS
DOWNLOAD
System Center
2012 R2 Preview
aka.ms/sc2012r2
Hands-On Labs
http://www.microsoftvirtualacademy.com
System Center 2012 R2 Jumpstart
July 15th - http://aka.ms/SCR2JS