Download presentation
Presentation is loading. Please wait.
Published byRegina Stanley Modified over 9 years ago
3
Delightful and responsive UX Never regret installing an app Integrated experiences Battery friendly Network conscience Hardened services Health UX
4
Captivating and Productive Experiences Works with Existing Infrastructure Powerful Platform for Solutions
6
Overview Risk Management (security model, application security, security management) Deployment & Device Management of Windows Phone 7 with Exchange Server SharePoint and Windows Phone 7, UAG LOB Application Options (distribution, data encryption, and authentication) Private Distribution IRM Lync Mobile
8
GOAL CONTROLS WEAKNESSES
9
Device Lock Remote Wipe Mechanisms to help protect data Data leak prevention with IRM e-mail and RMSData leak prevention with IRM e-mail and RMS
10
Single partition HD model files system SD cards are locked via a standard SD card lock mechanism Access to the SD card is prevented from any another device
11
GOAL CONTROLS WEAKNESSES
12
Application model Marketplace Internet Explorer Mobile Lock DownInternet Explorer Mobile Lock Down Windows Phone updateWindows Phone update
13
Phone only installs.xap packages signed by marketplace Phone handles all aspects of.xap installation based on the manifest Users control install, update, and uninstall, while the marketplace controls revocation
14
Phone only runs apps that have a valid marketplace license Apps are sandboxed into separate security accounts while installed and at runtime Resource allocation policy keeps the foreground app responsive and ensures the user can always use Start to run a new app
15
GOAL CONTROLS WEAKNESSES
16
HTTP and HTTPS – 128-bit or 256-bit SSL Wi-Fi – Open, WEP, WPA (PSK, ENT) and WPA2 (PSK, ENT), Hidden Bluetooth 2.1 (Microsoft driver only) WinSockets (UDP, TCP)WinSockets (UDP, TCP) Authentication
17
ApplicationApplication Application deploymentApplication deployment Application licenseApplication license
19
Policy System makes security decisionsPolicy System makes security decisions Chamber ModelChamber Model CapabilitiesCapabilities
23
* All other EAS policies not explicitly mentioned always return False Windows Phone Supported EAS Policies* Remote Wipe
27
EAS FeatureExchange Server 2003Exchange Server 2007Exchange Server 2010 Direct PushXXX Email SyncXXX Calendar SyncXXX Contacts SyncXXX Remote WipeXXX Sync Multiple FoldersXXX 128-bit SSL Encrypted TransmissionXXX User Initiated Remote Wipe XX HTML E-mail XX GAL LookupX*XX Follow-up Flags XX Meeting Attendee Information XX Autodiscover XX Bandwidth Reductions XX Reply State X Nickname Cache X Block/Allow/Quarantine List X Allow Attachment Download X 256-bit SSL Encrypted Transmission X Server SearchX IRM EmailX**
28
Infrastructure requirements Exchange requirements Device requirements
29
The following requirements apply
31
Installing certificates via Windows Internet Explorer ® Installing certificates via e-mail Root Certificates For further details on certificates configuration and other IT Pro infoIT Pro info For further details on certificates configuration and other IT Pro infoIT Pro info
38
*Users who obtain deeplink can access 38 BetaTargetedPublic Number of users 100Unlimited App Price Must be “free”Can be “paid” Time Limited Yes, expires after 90 daysNo Updateable NoYes Certification Required NoYes Publicly Discoverable NoNo*Yes Access Control Yes - limited to test usersNo Target Users Beta UsersTargeted UsersPublic Users
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.