Download presentation
Presentation is loading. Please wait.
1
Security Insights: How Microsoft Secures IT
2
The Worlds Most. Attacked Network
The Worlds Most* Attacked Network *The US Government is lots of small isolated networks
3
Microsoft IT Environment
111K+ server accounts 1.9 Tb Db Single Instance SAP 334K+ PCs and devices Dublin Redmond Tukwila Tokyo SVC 3M+ internal messages per day 10M+ s from the Internet per day 9M+ rejected as spam 99.99% availability Singapore 106K+ end users 98 countries 441 buildings 9.5M+ remote connections per month
4
Microsoft IT Spend Breakdown
FY05 Breakdown Cost Element View People 72% Data & Voice 16% Hardware 5% Facilities 5% Software 2% Software 5% (adjusted to include estimate if MS software were included) Functional View Applications 60% App Development (29%) App Support (31%) Infrastructure 40% Network (14%) Data Center (7%) Employee Services (5%) Voice (5%) Helpdesk (5%) Security (3%) Employee Services = monitoring/Tier 2 (2%), messaging (1%), software deployment (1%), collaboration (0.5%), data protection (0.5%)
5
Key Strategies and Tactics
Secure the Network Identity & Access Management IP and Data Protection Enhanced Auditing & Monitoring Awareness Secure Extranet and Partner Connections Secure Remote Access Network Segmentation Network Intrusion Detection Systems Hardening the Wireless Network Strong Passwords Public Key Infrastructure: Certificate Services Hygiene and Trustworthy Messaging Least Privileged Access Managed Source Code Security Development Lifecycle - IT Securing Mobile Devices Automated Vulnerability Scans Combating Malware Security Event Collection Information Security Policies Training and Communications For More Information
6
Key Messages A Windows infrastructure can be made Highly Secure
Security doesn’t have to cost money Security doesn’t have to be complicated ISA Server used on the edge
7
Resources Demo on the stand Free eval. from the stand
Expert assistance on the stand Resources on-line IH
8
Security Insights – Coming Up
11:15 Secure Messaging 11:45 Identity Theft 12:15 How Microsoft Secures IT 12:45 User Security 13:15 Secure Messaging 13:45 Spyware 14:15 Identity Theft 14:45 How Microsoft Secures IT 15:15 User Security 15:45 Spyware
9
www.microsoft.com/uk/security www.microsoft.com/uk/technet/learning
© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.