Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Module 1: Overview of Microsoft ISA Server
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Module 5: Configuring Access to Internal Resources.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Chapter 7 HARDENING SERVERS.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Firewall Slides by John Rouda
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Barracuda Load Balancer Server Availability and Scalability.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
Chapter 9: Novell NetWare
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
PO320: Reporting with the EPM Solution Keshav Puttaswamy Program Manager Lead Project Business Unit Microsoft Corporation.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Implementing Microsoft Exchange Online with Microsoft Office 365
Comprehensive Project Management Solutions with the.NET Server family.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Barracuda NG Firewall ™
CONNECTING TO THE INTERNET
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Virtual Private Network
Designing IIS Security (IIS – Internet Information Service)
Using Software Restriction Policies
Security Insights: Secure Messaging
Presentation transcript:

Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications

2 ISA Server 2004 Sales Opportunities When to Recommend Recommend ISA Server 2004 to customers who: Need a new or supplemental firewall Use IIS, SharePoint Portal Server, Exchange Server, or Windows Server 2003 Experience slow network performance Run ISA Server 2000 Run Microsoft Small Business Server (SBS)

3 ISA Server 2004 Sales Opportunities New or Supplemental Firewall Advanced Protection Advanced application-layer filtering Ease of Use Quick and easy to configure Fits into existing Microsoft environment Fast, Secure Access Implement Internet access control Achieve bandwidth and network efficiency Immediate security and savings ISA Server 2004 provides the best protection for Microsoft-based networks

4 ISA Server 2004 Sales Opportunities New or Supplemental Firewall Use as main firewall ISA Server 2004 provides all the protection customers expect from a firewall, VPN, and caching solution Add new functionality to existing firewalls Caching Access control Application-layer inspection Defense-in-depth by using multiple firewall products ISA Server 2004 adds value by itself or when used in conjunction with an existing traditional firewall

5 Customer Benefits Technical and Business Value FeatureTechnical ValueBusiness Value Secure Internet Connectivity  Protect against hackers, viruses, and unauthorized access  Control outgoing Internet access  Defend Web servers and server  Revenue +  Customer retention +  Liability - Fast Web Access  Faster browsing  Reduce network bandwidth costs  Reduce stress on Web servers  More reliable data access  Performance + Customer satisfaction +  Revenue +  Capital expense - Integrated VPN  Single point of control at network perimeter  Operating cost -  Customer satisfaction + Simple Management  Access control to management tasks  Reduced management complexity, reduced staff/server ratio  Reduced time to manage  Operating cost -  Customer satisfaction + Extensible Open Platform  Flexible, customizable solution  Liability -  Operating cost -  Customer satisfaction +

6 Customer Benefits Key Messages IT Professional Rock-solid firewall security and high-performance Internet connectivity that’s easy to manage Customer Message Increase performance and security and reduce costs Reduce liability and enforce corporate Internet access policies in real time Protect critical information and manage information access with a single, scalable, easy-to-manage solution Business Decision Maker HR Manager CTO

7 ISA Server 2004 Sales Opportunities Use with IIS and SharePoint Built from the ground up to support Web protocols Efficient content checking Protection of critical resources Allows controlled, authenticated external access to SharePoint resources No IIS or SharePoint deployment is complete without ISA Server 2004

8 No IIS or SharePoint deployment is complete without ISA Server 2004 protection The ISA Server 2004 advantage Only ISA Server 2004 solves all of these customer problems Other firewalls are less capable and often more expensive Evolving Internet threats put Web servers at risk. Port 80 is being used more and more. Need fast access to Web sites at all times. SSL traffic is encrypted, introducing additional risk. Difficult to provide external access to internal SharePoint resources Application-layer security is necessary to protect Web servers from evolving types of attacks. Caching speeds access and increases availability. Inspection of SSL traffic improves network security. Link translation automatically changes Web pages CUSTOMER PROBLEMSOLUTION ISA Server 2004 Sales Opportunities Use with IIS and SharePoint

9 ISA Server 2004 Sales Opportunities Use with Exchange Server Support for OWA Secures and accelerates access Support for secure access to Exchange Server using the native Outlook protocols Users can use their regular client Support for all major mail protocols Content checking to reduce unwanted and dangerous No Exchange deployment is complete without ISA Server 2004

10 No Exchange Server deployment is complete without ISA Server 2004 protection The ISA Server 2004 advantage: Only ISA Server 2004 solves all of these customer problems Other firewalls are more expensive, don’t effectively secure all Exchange protocols, or are incapable of filtering Unwanted messages are plaguing my network Productivity is a tradeoff for secure communication Concerned about the security of Exchange OWA Eliminate unwanted by filtering it at the edge Enable secure, remote Outlook access without a VPN Inspect SSL-encrypted OWA CUSTOMER PROBLEMSOLUTION ISA Server 2004 Sales Opportunities Use with Exchange Server

11 ISA Server 2004 Sales Opportunities Use with Windows Server 2003 Integrates with Active Directory Uses existing user accounts for access control Centralized, easy administration Builds on security features of Windows Server 2003 Full-featured VPN capabilities with the ease of use of ISA Server 2004 Security templates and Group Policy to lock down computers ISA Server 2004 is built for Windows protocols Support for Network Access Quarantine

12 No Windows Server 2003 deployment is complete without ISA Server 2004 protection The ISA Server 2004 advantage: Only ISA Server 2004 solves all of these customer problems Other firewalls are more expensive and don’t provide network quarantine filtering, VPN client policies, or Active Directory integration Difficult to enforce security policies for VPN clients VPN clients have full access to corporate network Authentication for user-based Internet-access policy difficult Network access quarantine Firewall policy applies to VPN clients Integration with Active Directory provides transparent authentication CUSTOMER PROBLEMSOLUTION ISA Server 2004 Sales Opportunities Use with Windows Server 2003

13 ISA Server 2004 Sales Opportunities Slow Network Performance ISA Server 2004 provides immediate performance enhancements Caching increases response time for Web requests, increasing user productivity Caching reduces bandwidth requirements, saving money Can be implemented easily and without interruption in service Does not require network reconfiguration Immediate, measurable benefits for existing networks

14 ISA Server 2004 Sales Opportunities Reasons to Upgrade from ISA Server 2000 Improve on ISA Server 2000 More advanced application-layer protection Improved ease of use High performance Multiple network support New policy model Application-layer filtering Better performance Integrated policy enforcement for VPN clients VPN client quarantine Support for more protocols Packet filtering on all interfaces Better RPC publishing New authentication options Real-time monitoring Easier administration tools

15 ISA Server 2004 Sales Opportunities Use with Microsoft Small Business Server ISA Server 2004 is included only with SBS Premium Edition SBS Standard Edition only includes very limited firewall functionality SBS limited to 75 users As organization grows, investment in SBS can be leveraged by moving firewall policies to a separate server that is running the same firewall software Moving ISA Server 2004 to a separate computer increases security Many customers want firewall to be separate from SBS Many security professionals recommend moving the firewall functionality to a separate computer to increase security Added protection for small businesses

16 ISA Server 2004 Partner Products (1) Enhance existing features and add new features Application Filters Improve security and interoperability for other protocols with application- layer inspection Caching and Distribution Improve the caching capabilities of ISA Server or create content distribution networks that store content closer to end users and provide centralized delivery, management, and support for different content types. Content Security Intercept viruses, malicious code or other inappropriate content at your network's Internet gateway. High Availability and Load Balancing Enhance ISA Server with network-level scalability, fault tolerance, and load balancing. Intrusion Detection Recognize and react in real time to hacking attempts. Monitor incoming traffic, and trigger responses according to alarms and events. Monitoring and Administration Extend the maintenance and management features of ISA Server to make day-to-day monitoring and administration tasks easier.

17 ISA Server 2004 Partner Products (2) Enhance existing features and add new features Reporting Review traffic through ISA Server, and develop reports that can be used for calculating departmental charge-backs, identifying inappropriate usage, and categorizing Internet use SSL Acceleration and Key Management Use these hardware add-ons to improve the performance of SSL communications and the security of private keys used in creating SSL sessions, server identification, and PKI components Security Resellers Purchase ISA Server from authorized resellers who have technical product expertise Security Solution Providers Engage with authorized service partners to help build your Microsoft secure-connected infrastructure URL Filtering Restrict access to non-work-related sites, and filter sites that have objectionable or restricted content User Authentication Provide support for additional authentication methods and technologies for ISA Server VPN and Web access

18 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.