Security Insights: How Microsoft Secures IT

Slides:



Advertisements
Similar presentations
WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.
Advertisements

Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Communication Challenges Communication Overload Distributed teams, partners, and customers High cost of communications Security and compliance.
Challenges in the Enterprise Sunjeev Pandey Sr. Director - GTS Microsoft IT.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
CFO Summit The Business Value of IT Rick Devenuti Corporate Vice President & CIO Rick Devenuti Corporate Vice President & CIO.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Security Insights: Spyware. Spyware Challenges Bombard you with ads Change system settings Collect personal information Slow down or crash computers Invade.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Microsoft IT Team & Enterprise Collaboration Kimberly Malone Group Program Manager Microsoft IT Collaboration Services.
Security Insights: User Security. Users – the Achilles heel Users interaction Security technology protects: Machine Machine User > Machine Machine.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Security Insights: Identity Theft & Management. The Identity Theft Problem What is Identity Theft? Dumpster diving Low tech Phishing/Pharming Targets.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Implementing and Managing Azure Multi-factor Authentication
Securing Information Systems
Phase 4: Manage Deployment
Enterprise Security in Practice
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
Journey to Microsoft Secure Cloud
Microsoft Ignite /2/2018 6:37 AM BRK2293
Configure and Manage Your Hybrid Cloud Environment at Scale
Conduct a successful pilot deployment of Microsoft Intune
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
The power of common identity across any cloud
Forefront Security ISA
Deriving more value from your Windows investment
Microsoft’s Security Strategy
Phase 4: Compelling Case for Change
Cybersecurity Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
SAM GDPR Assessment <Insert partner logo here>
11/12/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Protect your OneDrive and SharePoint files on mobile devices
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure your Active Directory to mitigate risk in the cloud
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Twenty Windows Tools You Never Knew Existed
Identity Infrastructure Fundamentals and Key Capabilities
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Office365 Exchange Online Risun Antony Technology Specialist
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Enabling the hybrid cloud with remote access appliances
Microsoft Virtual Academy
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Security in mobile technologies
Day 2, Session 2 Connecting System Center to the Public Cloud
Microsoft Data Insights Summit
Security in the Real World – Plenary Day One
In the attack index…what number is your Company?
Using Software Restriction Policies
Data Lost Prevention (DLP) © Copyright 2009 Technica All rights reserved. No part of this presentation in all its property may be used or reproduced in.
Security Insights: Secure Messaging
Cloud Computing for Wireless Networks
Presentation transcript:

Security Insights: How Microsoft Secures IT

The Worlds Most. Attacked Network The Worlds Most* Attacked Network *The US Government is lots of small isolated networks 

Microsoft IT Environment 111K+ e-mail server accounts 1.9 Tb Db Single Instance SAP 334K+ PCs and devices Dublin Redmond Tukwila Tokyo SVC 3M+ internal e-mail messages per day 10M+ e-mails from the Internet per day 9M+ rejected as spam 99.99% availability Singapore 106K+ end users 98 countries 441 buildings 9.5M+ remote connections per month

Microsoft IT Spend Breakdown FY05 Breakdown Cost Element View People 72% Data & Voice 16% Hardware 5% Facilities 5% Software 2% Software 5% (adjusted to include estimate if MS software were included) Functional View Applications 60% App Development (29%) App Support (31%) Infrastructure 40% Network (14%) Data Center (7%) Employee Services (5%) Voice (5%) Helpdesk (5%) Security (3%) Employee Services = monitoring/Tier 2 (2%), messaging (1%), software deployment (1%), collaboration (0.5%), data protection (0.5%)

Key Strategies and Tactics Secure the Network Identity & Access Management IP and Data Protection Enhanced Auditing & Monitoring Awareness Secure Extranet and Partner Connections Secure Remote Access Network Segmentation Network Intrusion Detection Systems Hardening the Wireless Network Strong Passwords Public Key Infrastructure: Certificate Services E-Mail Hygiene and Trustworthy Messaging Least Privileged Access Managed Source Code Security Development Lifecycle - IT Securing Mobile Devices Automated Vulnerability Scans Combating Malware Security Event Collection Information Security Policies Training and Communications For More Information

Key Messages A Windows infrastructure can be made Highly Secure Security doesn’t have to cost money Security doesn’t have to be complicated ISA Server used on the edge 

Resources Demo on the stand Free eval. from the stand Expert assistance on the stand Resources on-line www.microsoft.com/uk/security IH

Security Insights – Coming Up 11:15 Secure Messaging 11:45 Identity Theft 12:15 How Microsoft Secures IT 12:45 User Security 13:15 Secure Messaging 13:45 Spyware 14:15 Identity Theft 14:45 How Microsoft Secures IT 15:15 User Security 15:45 Spyware

www.microsoft.com/uk/security www.microsoft.com/uk/technet/learning © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.