Mobil e 65% of companies are deploying at least one social software tool. SocialClou d Digital content will grow to Over 80% of new apps will be distributed.

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Identity Management - Login © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Ray Ozzie Chief Software Architect. Applications and Solutions Cloud Infrastructure Services Live Platform Services Global Foundation Services Services.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Feature: Reprint Outstanding Transactions Report © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Feature: Payroll and HR Enhancements © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Study conducted on behalf of Microsoft by Harris Interactive Inc. Study conducted on behalf of Microsoft by Harris Interactive, Inc. Study conducted on.
Co- location Mass Market Managed Hosting ISV Hosting.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Feature: Purchase Order Prepayments II © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: OLE Notes Migration Utility
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Identity and Access Management Business Ready Security Solutions.
Feature: SmartList Usability Enhancements © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Mobil e 65% of companies are deploying at least one social software tool. SocialClou d Digital content grew to Over 80% of new apps were distributed or.
 Rico Mariani Architect Microsoft Corporation.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Connecting Vehicles and Transport to the Cloud GSMA Connected Living - mAutomotive Johan Gentzell. Industry Market Development Manager, Microsoft Corporation.
Connect with life Connect with life
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Document Attachment –Replace OLE Notes © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
James Thurston Senior Strategist for Global Policy & Standards Microsoft Trustworthy Computing.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Ian Ellison-Taylor General Manager Microsoft Corporation PC27.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
demo Instance AInstance B Read “7” Write “8”

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
demo Demo.
Unified. Simplified. Unified Communications Launch 2007.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
Feature: Suggested Item Enhancements – Analysis and Assignment © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and.
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

IoCompleteRequest (Irp);... p = NULL; …f(p);
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
The time to address enterprise mobility is now
Deployment Planning Services
VP Business Development Durable Cloud SBA Certified HUBZone-EDWOSB
Information Protection
Возможности Excel 2010, о которых следует знать
Why? (or … am I really in the right track?)
Title of Presentation 11/22/2018 3:34 PM
Title of Presentation 12/2/2018 3:48 PM
1/3/2019 1:21 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Title of Presentation 5/12/ :53 PM
Шитманов Дархан Қаражанұлы Тарих пәнінің
Title of Presentation 5/24/2019 1:26 PM
Hybrid Storage Direct proposal 6/8/ :37 AM
Title of Presentation 7/24/2019 8:53 PM
Presentation transcript:

Mobil e 65% of companies are deploying at least one social software tool. SocialClou d Digital content will grow to Over 80% of new apps will be distributed or deployed on clouds in Big Data 70% of organizations are either using or investigating cloud computing solutions By 2016, smartphones and tablets will put power in the pockets of a billion global consumers The world’s mobile worker population will reach 80% growth of unstructured data is predicted over the next five years. 1.3 billion over 37% of the total workforce by 2015 Millennials will make up 75% of the American workforce by ZB in 2012, up 48% from 2011, rocketing toward 8ZB by Large Scale Technology Trends Transforming access to people and information

Exponential Growth of IDs Widespread legacy technology rise in Mobile Malware Malicious software more compromised records More sophisticated attacks Individual Organized Crime Groups Terrorist Groups Nation- States Targeted attacks user accounts stolencredit card accounts stolen Data theft & insider leaks addresses stolen from US military contractor files stolen from Pentagon Cyber terrorism & hacktivism Global cost of computer crime Complex Challenges Driving need for new security approach Malicious softwareTargeted attacks Data theft & insider leaks Cyber terrorism & hacktivism

Strong Tension Today Between business innovation and cyber security requirements Business Innovation Cyber Security Requirements

Specific Concerns We Hear from Customers Why should I trust Microsoft’s Cloud? What industry audits and security certifications cover the Microsoft Platform ? If I run my service in your cloud, can I meet my compliance needs ? How should an enterprise evaluate cloud providers when it comes to security, privacy and compliance?

Why Should I Trust the Microsoft Cloud? Proven Track Record History of meeting obligations associated with the delivery of over 400 cloud services Scale Spreading cost of robust security and compliance across large number of customers provides a trusted cloud at lower cost Security at our Foundation Years of experience through our Trustworthy Computing initiative

Law Enforcement Access Microsoft Response Process: Many nations have laws addressing law enforcement access to cloud service information, to support criminal investigations

Responding to government demands If we receive a government demand for data held by a business customer, we take steps to redirect the government to the customer directly, and we notify the customer unless we are legally prohibited from doing so. We have never provided any government with customer data from any of our business or government customers for national security purposes(…) We only respond to requests for specific accounts and identifiers. There is no blanket or indiscriminate access to Microsoft’s customer data. If a government wants customer data – including for national security purposes – it needs to follow applicable legal process, meaning it must serve us with a court order for content or subpoena for account information. We do not provide any government with the ability to break the encryption used between our business customers and their data in the cloud, nor do we provide the government with the encryption keys. government-legal-demands-for-customer-data.aspx

Law enforcement request report In the first half of 2013, Microsoft disclosed content in response to 2.2% of the total number of law enforcement requests received. Each of those disclosures was in response to a court order or warrant, and the vast majority of those disclosures related to users of our consumer services. Unfortunately, we are not currently permitted to report detailed information about the type and volume of any national security orders (e.g. FISA Orders and FISA Directives) that we may receive Law enforcement sought information about only a tiny fraction of the millions of end users of our enterprise services, such as Office 365. We received 19 requests for accounts we host for enterprise customers, seeking information about 48 accounts. We disclosed customer data in response to five of those requests (4 content; 1 only non-content), and in all but one case, we were able to notify the customer. We rejected the request, found no responsive data, or redirected law enforcement to obtain the information from the customer directly in thirteen of those cases. One request is still pending. (…) the requests are fairly concentrated with over 73% of requests coming from five countries, the United States, Turkey, Germany, the United Kingdom, and France.

Law enforcement requests from Norwegian Authorities, H enforcement-and-national-security-requests-for-last-half-of-2012.aspx

Global Foundation Services Microsoft’s Cloud Environment Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Consumer and Small Business Services Enterprise Services Third-party Hosted Services SecurityGlobal NetworkOperationsData Centers Software as a Service (SaaS)

Microsoft Data Center Scale Chicago Quincy Dublin Amsterdam Hong Kong Singapore Japan "Data Centers have become as vital to the functioning of society as power stations." The Economist San Antonio Multiple global CDN locations Microsoft has more than 10 and less than 100 DCs worldwide Boydton Des Moines Quincy, Washington27MW100% Hydro power San Antonio, Texas27MWRecycled water for cooling Chicago, IllinoisUp to 60MWWater side economization, Containers Dublin, IrelandUp to 50MWOutside air cooling, PODs

Customer Compliance Needs Customers ultimately responsible for ensuring their compliance obligations are met Microsoft will share its certifications and audit reports to allow customers to establish reliance Responsibility: Data Classification and Accountability Application Level Controls Operating System Controls Host Level Controls Identity and Access Management Network Controls Physical Security CLOUD PROVIDER CLOUD CUSTOMER SaaS PaaS IaaS

Data Classification

What data goes where?

Information Security Management System ISO / IEC 27001:2005 certification SSAE 16/ISAE 3402 SOC 1 AT101 SOC 2 and 3 PCI DSS certification FedRAMP P-ATO, FISMA certification and accreditation And more … PREDICTABLE AUDIT SCHEDULE COMPLIANCE FRAMEWORK Information Security Management System INFORMATION SECURITY MANAGEMENT FORUM RISK MANAGEMENT PROGRAM INFORMATION SECURITY POLICY PROGRAM Test and Audit

Infrastructure Compliance Capabilities ISO / IEC 27001:2005 Certification SSAE 16/ISAE 3402 SOC 1, AT101 SOC 2 and 3 HIPAA/HITECH PCI Data Security Standard Certification FedRAMP P-ATO and FISMA Certification & Accreditation Various State, Federal, and International Privacy Laws (95/46/EC—aka EU Data Protection Directive; California SB1386; etc.)

© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.