Security Insights: How Microsoft Secures IT
The Worlds Most. Attacked Network The Worlds Most* Attacked Network *The US Government is lots of small isolated networks
Microsoft IT Environment 111K+ e-mail server accounts 1.9 Tb Db Single Instance SAP 334K+ PCs and devices Dublin Redmond Tukwila Tokyo SVC 3M+ internal e-mail messages per day 10M+ e-mails from the Internet per day 9M+ rejected as spam 99.99% availability Singapore 106K+ end users 98 countries 441 buildings 9.5M+ remote connections per month
Microsoft IT Spend Breakdown FY05 Breakdown Cost Element View People 72% Data & Voice 16% Hardware 5% Facilities 5% Software 2% Software 5% (adjusted to include estimate if MS software were included) Functional View Applications 60% App Development (29%) App Support (31%) Infrastructure 40% Network (14%) Data Center (7%) Employee Services (5%) Voice (5%) Helpdesk (5%) Security (3%) Employee Services = monitoring/Tier 2 (2%), messaging (1%), software deployment (1%), collaboration (0.5%), data protection (0.5%)
Key Strategies and Tactics Secure the Network Identity & Access Management IP and Data Protection Enhanced Auditing & Monitoring Awareness Secure Extranet and Partner Connections Secure Remote Access Network Segmentation Network Intrusion Detection Systems Hardening the Wireless Network Strong Passwords Public Key Infrastructure: Certificate Services E-Mail Hygiene and Trustworthy Messaging Least Privileged Access Managed Source Code Security Development Lifecycle - IT Securing Mobile Devices Automated Vulnerability Scans Combating Malware Security Event Collection Information Security Policies Training and Communications For More Information
Key Messages A Windows infrastructure can be made Highly Secure Security doesn’t have to cost money Security doesn’t have to be complicated ISA Server used on the edge
Resources Demo on the stand Free eval. from the stand Expert assistance on the stand Resources on-line www.microsoft.com/uk/security IH
Security Insights – Coming Up 11:15 Secure Messaging 11:45 Identity Theft 12:15 How Microsoft Secures IT 12:45 User Security 13:15 Secure Messaging 13:45 Spyware 14:15 Identity Theft 14:45 How Microsoft Secures IT 15:15 User Security 15:45 Spyware
www.microsoft.com/uk/security www.microsoft.com/uk/technet/learning © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.