Bernhard van der Feen Product Solution Manager Security Microsoft.

Slides:



Advertisements
Similar presentations
What is Infrastructure Optimisation and Why should you care?
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Building an Optimized Infrastructure
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Microsoft’s Security Positioning towards Service
Microsoft Forefront Client Security
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The Big Picture on Security Frank O’Keeffe Regional Information Security Manager Microsoft Corporation.
Benefits, Risks and Service Desk Impact. Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
4/17/2017 7:22 AM ©2005 Microsoft Corporation. All rights reserved.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security and Infrastructure Optimisation Security Considerations NameBarry Hughes TitleSenior Consultant - MCS Microsoft Corporation.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
What is Infrastructure Optimization and Why do I Care?
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Design of a cyber security awareness campaign for Internet Cafés users in rural areas WA Labuschagne, MM Eloff, N Veerasamy, L Leenen, M Mujinga CSIR /
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Neil Sanderson 24 October, Early days for virtualisation Virtualization Adoption x86 servers used for virtualization Virtualization adoption.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Cliff Evans Security and Privacy Lead Microsoft Ltd.
Secure management of Infrastructure. IT Complexity And Cost.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
2 Reduce Costs, Simplify IT, and increase Your Value to the Business Damir Bersinic Senior IT Pro Advisor, Microsoft Canada
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
WINDOWS 10 BUSINESS. Windows 10 for SMB Best platform for modern business Affordable and innovative devices Simple to setup and manage Enterprise-quality.
Välkommen till Forefront Tour 2008!. Forefront Partners här idag.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
The Infrastructure Optimization Journey NameTitleCompany.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Computer Security By Duncan Hall.
Overarching Vision People Ready Business: Microsoft software uniquely amplifies the efforts of every individual, team and manager in your company, helping.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Tim Rains Group Product Manager Microsoft Session Code: SIA101.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Leverage the Microsoft Platform For Sales Success Bruce Rasmussen Carpe Diem Consulting.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Chapter 6: Securing the Cloud
Cisco 2017 Security Annual Report
Microsoft’s Security Strategy
Capitalize on modern technology
Secure once, run anywhere Simplify your security with Sophos
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
The People Ready Vision for Business in the Enterprise
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

Bernhard van der Feen Product Solution Manager Security Microsoft

Security status Microsoft Security strategy Propositie Security producten in het Microsoft platform Marktsituatie, marktpositie en concurrentie Discussie

This Security Intelligence Report contains data and trends observed over the past several years, but focuses on the first half of 2007 (1H07) Released October sections Software Vulnerability Disclosures Malicious Software Potentially Unwanted Software Report is successor of H206 report and “MSRT Progress Made, Trends Observed” white paper

More than 3,400 new vulnerabilities disclosed in 1H07 Data represents ALL software vendors (not just Microsoft) A decrease from 2H06 The first period-to- period decrease in total vulnerabilities since 2003

Application vulnerabilities continued to grow relative to operating system vulnerabilities as a percentage of all disclosures during 1H07 Supports the observation that security vulnerability researchers may be focusing more on applications than in the past

While the number of vulnerability disclosures continues to increase across the software industry, the ratio of exploit code available for these vulnerabilities in Microsoft products remains steady and is even on a slight decline Vulnerabilities Vulnerabilities where Exploit Code was available

Windows Defender detected 2.8 times less potentially unwanted software on computers running Windows Vista than on computers running Windows XP SP2 (normalized) The number of detections of potentially unwanted software on computers running Windows Vista was half of the number of detections of potentially unwanted software on computers running Windows Server 2003, after normalization

Attacks targeted and very focused Financial motives for data and/or machine compromise Fraudsters more creative in driving new targets to malicious sites – term called “whaling”. Limited motivation for broad worm/virus attacks Downloader's and Trojans the new attack vector: spearphising, application and web attacks Increasing sophistication of attack tools Increasing use of encryption for files and communications Malware sophistication increasing to avoid detection and emerging signs of conditional malware behavior Newer tehnologies require new approaches to security: Web 2.0, SaaS, Virtulization, Web Services Fraudsters piggyback on search engines By abusing the way that the sites cache search queries to optimize their rankings in other search engines -- most notably, Google -- fraudsters have been able to inject iframe redirects into the cached results. Fraudsters piggyback on search engines By abusing the way that the sites cache search queries to optimize their rankings in other search engines -- most notably, Google -- fraudsters have been able to inject iframe redirects into the cached results. Whaling: Latest scam targets executives “ security service caught 514 s bound for its customers all targeted at C-level executives in various organizations in a two-hour period.” “In September another blast consisted of 1,100 whaling attacks within 15 hours..” Whaling: Latest scam targets executives “ security service caught 514 s bound for its customers all targeted at C-level executives in various organizations in a two-hour period.” “In September another blast consisted of 1,100 whaling attacks within 15 hours..”

Local Area Networks First PC virus Boot sector viruses Create notoriety or cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notoriety or cause havoc Faster propagation 32-bit Windows Broadband prevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows

National Interest Personal Gain Personal Fame Curiosity Undergraduate Expert Specialist Largest area by volume Largest area by $ lost Script-Kiddy Largest segment by $ spent on defense Fastest growing segment AuthorVandal Thief Spy Trespasser

Secure Application Architecture36% Secure Application Architecture36% Protection 62% Patch Management 29% Identity and Access 57% Secure Messaging & Collaboration 38% Legacy Platform Migration 14% *Source: CSO Summit 2008 Registration Survey Compliance Management (2007) 44% Compliance Management 29%

Provides capability framework to help you build an optimized infrastructure (not Microsoft- specific) Establishes a foundation based on industry analyst, academic, and consortium research Provides guidance and best practices for step-by-step implementation Drives cost reduction, security and efficiency gains Enables agility Model-Based Approach Application Platform Optimization Model Business Intelligence Enterprise Content Management Collaboration Unified Communications Enterprise Search Business Productivity Infrastructure Optimization Model Development SOA and Business Process Business Intelligence User Experience Data Management Data Protection and Recovery Desktop, Device, and Server Mgmt Identity and Access Management Security and Networking Core Infrastructure Optimization Model IT and Security Process BASIC STANDARDIZE D RATIONALIZE D DYNAMIC BASIC STANDARDIZE D RATIONALIZE D DYNAMIC BASIC STANDARDIZE D ADVANCED DYNAMIC

Technology Process People IT is a strategic asset Users look to IT as a valued partner to enable new business initiatives IT Staff manages an efficient, controlled environment Users have the right tools, availability, and access to info IT Staff trained in best practices such as MOF, ITIL, etc. Users expect basic services from IT IT staff taxed by operational challenges Users come up with their own IT solutions Self-assessing and continuous improvement Easy, secure access to info from anywhere on Internet SLAs are linked to business objectives Clearly defined and enforced images, security, best practices Central Admin and configuration of security Standard desktop images defined, not adopted by all IT processes undefined Complexity due to localized processes and minimal central control Self provisioning and quarantine capable systems ensure compliance and high availability Automate identity and access management Automated system management Multiple directories for authentication Limited automated software distribution Patch status of desktops is unknown No unified directory for access mgmt BasicStandardizedRationalizedDynamic Improve IT Maturity while Gaining ROI $1320/PC Cost$580/PC Cost $230/PC Cost < $100/PC Cost