Download presentation
Presentation is loading. Please wait.
Published byJosie Priddle Modified over 9 years ago
1
Secure Desktop Name Title Microsoft Corporation
2
Agenda
3
Business Needs and IT Challenges
4
Microsoft Security Drives Core Optimization
5
Business Ready Security Solutions
6
Secure Desktop Secure Access Information Protection
7
Advanced Protection from Malware Malware Protection Malware Protection "We like Microsoft’s strategy to integrate Forefront Endpoint Protection with System Center Configuration Manager. We expect this approach of merging endpoint security with overall endpoint management will simplify deployment and management, lowering the total cost of ownership per desktop." Kristaps Čudars Senior System Virtualization Specialist Rigas Stradina University
8
Provides a familiar and consistent experience for desktop management and protection Improves visibility to help identify and remediate potentially vulnerable endpoints Minimizes costs and complexity by using existing infrastructure Reduced Costs through Integration
9
Protection Against Web-based Threats Malware Protection Malware Protection "Forefront Threat Management Gateway is a perfect tool for us to protect our clients and servers from malware and web based threats, and it doesn’t require the additional IT manpower required by more complex systems." George Podolak Director of IT Pei Cobb Freed & Partners
10
Information Protection “Because of the critical nature of the information we manage, we needed a system that offered the ultimate protection. Forefront and BitLocker combined really make us more secure than ever before.” John Rodgers, Director of Technical Infrastructure Support
11
“We could use other products to make sure that remote clients are fully compliant with our environment before we allow them access, but our IT staff would need to spend a lot of time monitoring the process; with UAG and NAP, we can do all this automatically.” David Feng IT Director Sporton International Secure Access Secure Access Secure Access DIRECT ACCESS
12
Integrated with Microsoft Technologies BitLocker BitLocker To Go AppLocker Device Control
13
DIRECT ACCESS
14
Easier Management, Improved Protection “When we first deployed Forefront Client Security, we discovered that we had at least four times as many infections as we thought. Since then, we have seen a downward trend in the number of computers infected.” –Andrew Julian, Lead Operating Systems Programmer, Allina Hospitals & Clinics Source: Secure Collaboration for Aerospace and Defense Firms. Microsoft case study, April 2009
15
http://www.microsoft.com/services Working with Microsoft Services
16
Try the endpoint solution at Microsoft.com/forefront/trial Speak with a Microsoft representative about your needs Deploy solutions that empower your business needs Overall Resources and Next Steps
17
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.