Challenges in the Enterprise Sunjeev Pandey Sr. Director - GTS Microsoft IT.

Slides:



Advertisements
Similar presentations
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
Advertisements

EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
The future of Desktops Transform Your Desktop with Virtualization.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Citrix Partner Update The Citrix Delivery Centre.
jeffwettlaufer.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Piilo Makes HR Easy for Businesses of Any Size, Thanks to the Convenience of Its Mobile App and the Power of the Microsoft Azure Cloud Platform MICROSOFT.
Effectively Explaining the Cloud to Your Colleagues.
Cloud Computing.
Why consider Managed IT, even if you are IT? 1.Increase support availability 2.Give (Name) their job back 3.One stop shop 4.Increasing costs 5.Outgrown.
1 IS 8950 Managing Network Infrastructure and Operations.
Copyright Nevaeh Technology Pvt. Ltd. Stress-free IT REMOTE INFRASTRUCTURE MANAGEMENT A Presentation by Prabir Dasgupta Nevaeh Technology Pvt. Ltd.
The Evolution of Fleet Management How do you get device information now? Manually? Configuration pages?
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Corporate Information Systems Delivery of Infrastructure IT Services.
Embracing Technology Making IP Telephony Work Romolo Pallini GIPS, Director Networks, Internet Technologies & Telecom Getronics.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Robert Boccia Technology Strategist Microsoft Session Code: ISB201.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
1. 2 Tier I/II $Ks Tier III/IV $Ms Tier V/VI $Bs Create New Vulnerabilities Discover New Vulnerabilities Exploit Known Vulnerabilities.
A system sharing informati on and services with individuals and groups webster.com/dictionary/ne tworking webster.com/dictionary/ne.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Enabling IP Services on Industry Standard Platforms Triple Play Symposium Robert (Bob) Heymann Director, Market Development Communications Infrastructure.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
INTRODUCTION TO CLOUD COMPUTING ggg UNDERSTANDING CLOUD COMPUTING UNDERSTANDING CLOUD COMPUTING DEFINITION CLOUD COMPUTING.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Interaction Styles Interaction Designs. Interaction Style Selection 1.User Centered Design – Do the users like cartoons, video? – Visually and/or physically.
Consumerization of IT Microsoft in the Enterprise.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
Introduction TO Network Administration
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
The Business of IT How Microsoft does IT William McKnight Microsoft IT Microsoft Corporation.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Jeff Wettlaufer Sr. Technical Product Manager System Center SESSION CODE: MGT308 B T jeffwettlaufer E
Microsoft IT Team & Enterprise Collaboration Kimberly Malone Group Program Manager Microsoft IT Collaboration Services.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Secure Services Shared Hosted MS Exchange 2010.
INSTRUCTIONS FOR PARTNERS The following presentation is provided for partners to use in partner-led, customer-facing events. This is the “Cloud Productivity.
BLACKBERRY TECHNOLOGY PRESENTED BY SHAIK TABREZ (09J01A1225 )
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Managed IT Solutions More Reliable Networks Are Our Business
Unit 3 Virtualization.
Avenues International Inc.
Work on the Fly Hosted Solutions for Timeslips Customers
Mobile Device Management
Security Insights: How Microsoft Secures IT
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Azure Allays Data Security and Privacy Concerns for Solution Provider’s Cloud-Wary Customers “With Microsoft Azure, Jedox can deliver advanced enterprise.
Healthcare Cloud Security Stack for Microsoft Azure
Microsoft Services Provider License Agreement Program reference card
Securing the Threats of Tomorrow, Today.
Polycom® CMA™ 4000/5000 Polycom® CMA™ Desktop
TrinityIoT Premises Monitoring.
Cloud Computing LegalRun Solutions Why It’s Right for You!
The MobileIron® Threat Detection difference:
Internet Engineering Course
Microsoft Virtual Academy
In the attack index…what number is your Company?
Presentation transcript:

Challenges in the Enterprise Sunjeev Pandey Sr. Director - GTS Microsoft IT

Tokyo Dublin Singapore 10,000+ network devices RedmondTukwila 3M+ messages per day internally 99.99% availability 92,000 end users 408 Buildings in 89 Countries (25% ICO) 300,000+ PCs and devices Silicon Valley 9.5M+ remote connections per month Microsoft IT Data 500k+ intrusion attempts/probes/scans per month 100,000+ accounts

Applications60% App Development (29%) App Support (31%) Infrastructure40% Network (14%) Data Center (7%) Employee Services (5%) Voice (5%) Helpdesk (5%) Security (3%) Microsoft IT $ Spend Functional View FY05 Breakdown Cost Element View People 72% Data & Voice16% Hardware 5% Facilities 5% Software* 2% 30% New Capability 70% Sustaining & Running Existing Capability 45% New Capability 55% Existing Capability Increases value Decreases maintenance delivery * Software = 5% If MS software were included

Wish List Security – volume, sophistication, surface area of attacks increasing Security – volume, sophistication, surface area of attacks increasing Privacy/IP protection – globalization, technology presents new challenges Privacy/IP protection – globalization, technology presents new challenges End to End view – from the client perspective End to End view – from the client perspective Proactive – self detect faults, service view, “bread crumbs” for diagnosis Proactive – self detect faults, service view, “bread crumbs” for diagnosis Ubiquitous - Global, secure access from anywhere via any device Ubiquitous - Global, secure access from anywhere via any device Instrumented – standard instrumentation to enable utility view of costs, what if modeling, etc. Instrumented – standard instrumentation to enable utility view of costs, what if modeling, etc.