Presentation is loading. Please wait.

Presentation is loading. Please wait.

Marko Bohanec Regionalni vodja rešitev za upravljanje in varnost, Central & Eastern European Headquarters Microsoft, Munich 13. marec 2008 Marko Bohanec.

Similar presentations


Presentation on theme: "Marko Bohanec Regionalni vodja rešitev za upravljanje in varnost, Central & Eastern European Headquarters Microsoft, Munich 13. marec 2008 Marko Bohanec."— Presentation transcript:

1 Marko Bohanec Regionalni vodja rešitev za upravljanje in varnost, Central & Eastern European Headquarters Microsoft, Munich 13. marec 2008 Marko Bohanec Regionalni vodja rešitev za upravljanje in varnost, Central & Eastern European Headquarters Microsoft, Munich 13. marec 2008

2 Vizija – dinamična informacijska tehnologija Ocenjevanje zrelosti informacijske tehnologije Investicije v upravljanje IT Pregled rešitev Investicije v varovanje IT Pregled rešitev Zaključek in vprašanja

3

4 Magic Quadrant for PC Life Cycle Configuration Management, 2007* * Magic Quadrant for PC Life Cycle Configuration Management, 2007. Terrence Cosgrove, Ronni J. Colville. Publication Date: 21December 2007 / ID Number: G00153428

5 ITIL-based Process and Knowledge Embedded Capture knowledge in models WS- Management Multi-level: Operating systems System resources Applications

6 Uncoordinated, manual infrastructure; knowledge not captured Managed IT infrastructure with limited automation and knowledge capture automation and knowledge capture Managed and consolidated IT infrastructure infrastructure with extensive automation; knowledge captured and reused Fully automated management, dynamic resource usage, business linked SLAs; knowledge capture automated and use automated Dynamic Systems Initiative

7 100 200 300 400 0 500 76 $1,320/PC 172 $580/PC 442 $230/PC 600 Plan / Optimize Change Operate Support Plan/ Optimize Change Operate Support Plan/ Optimize Change Operate Support Plan/ Optimize Change Operate Support Note: $/PC represents costs – expenses of IT work per workstation Source:IDC, 2006; Microsoft studies, 2005-06

8 Fuels productivity by capturing built-in knowledge Optimizes business process performance from deep inside the OS, applications -SQL, Exchange, Office, and.NET applications Easily manages Windows systems and applications which you are already using Provides guidance and best practices – straight from development teams Closes gap between development, operations, and IT Corporate Campus or Branch Office The Desktop Mobile Worker Line of Business Application

9 CMDB Workflow Knowledge Knowledge Workflow Forms CMDB Data Warehouse Data Warehouse

10 Additional Platforms: Linux, UNIX, CISCO, F5, Intel, AMD Business Applications Windows Applications Windows Services: Active Directory, MS.NET, Virtualization, Powershell Microsoft Windows Platform StorageManagement Service Management Configuration & Release Management Event & Performance Management

11 Simplicity Up and running in minutes Simplified UI Advanced Task Sequencing Reduced SCCM infrastructure costs with branch office support Improved scheduling and greater control including Wake-on-LAN Common processes for Windows Mobile and embedded device Deployment Unified delivery of Windows operating system for clients and servers One worldwide image to manage with Vista Built on Windows Vista technologies including Windows Imaging Vista and Office 12 upgrade assessment and resolution planning Offline media support for full offline provisioning Security Integration with “Longhorn” Network Access Protection Simplified, comprehensive software updating w/ templates for common tasks Enterprise Vulnerability assessment Securely managing devices across the Internet Secure network storage of user state during Operating System deployment Configuration Knowledge-driven desired configuration management based on the Service Modeling Language (SML) IT policies for analyzing corporate and regulatory compliance Out of the box configuration policies for server workloads i.e. Exchange License and asset management Simplicity Deployment Security Configuration

12 Proactive Monitoring of Service Health End User perspective monitoring Service Oriented Views, Dashboards, and Reports Easy to use templates and Service Designer End to End Service Management Best of Breed for Windows Increased Efficiency and Control Proactive Monitoring of Service Health End User perspective monitoring Service Oriented Views, Dashboards, and Reports Easy to use templates and Service Designer Expertise for Microsoft apps, servers & clients Agentless exception monitoring Client monitoring of Vista, XP, and the Office suite Audit collection service archives security logs Single integrated console with role based security Leverages AD for discovery, accounts & agent config Self tuning thresholds adjust to business usage patterns Easier to use, customize, and author reports

13 Server Virtualization Desktop Virtualization Application Virtualization Presentation Virtualization

14 System Center Configuration Manager System Center Operations Manager System Center Virtual Machine Manager System Center Service Manager System Center Data Protection Manager System Center Essentials

15 Technology ITIL/MOF WS-Management Strategy Methodology

16 Fundamentally secure platforms enhanced by security products, services and guidance to help keep customers safe Excellence in fundamentals Security innovations Best practices, whitepapers and tools Authoritative incident response Security awareness and education through partnerships and collaboration Information sharing on threat landscape

17 Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Services Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge Intelligent Application Gateway

18 Gartner Magic Quadrant E-Mail Security Boundary 2006 Forrester Wave SSL VPN Appliances 2006 "Microsoft is one of the few vendors that can truly go end-to-end (cloud-edge-server-client) to make businesses more secure." - Enterprise Strategy Group Eric Ogren, “At the Forefront of Microsoft Security”, InternetNews.com June 15, 2006

19 An integrated edge security gateway that helps protect your IT environment from Internet- based threats while providing your users fast and secure remote access to applications and data. Safeguard your IT environment Protecting your environment from internal users accessing unwanted or harmful content on the Internet Streamline your network Deploying edge security gateways in branch offices and leveraging cache capabilities Secure your Microsoft application infrastructure Publish Exchange, SharePoint and Web application servers for secure remote access

20 The IAG provides SSL-based application access and protection with endpoint security management, enabling granular access control and content inspection from a broad range of devices and locations to line-of-business, intranet, and client-server resources. Comprehensive policy enforcement drives compliance with legal and business guidelines concerning access to sensitive data Ensure the integrity and safety of network and application infrastructure by blocking malicious traffic and attacks Secure, browser-based access to corporate applications and data from more locations and more devices

21 Forefront server security solutions help businesses protect their messaging and collaboration servers against viruses, worms, spam and inappropriate content Security for Office Communicator

22 Unified malware protection for business desktops, laptops and server operating systems that is easy to manage and control Client Security

23 Policy and Compliance Risk Assessment User Awareness Policy and Compliance Risk Assessment User Awareness Basic Standardized Rationalized Dynamic Legacy Platform Migration Secure Application Architecture Threat and Vulnerability Mitigation Secure Messaging and Collaboration Patch Management Identity and Access Management

24 Information Data Hardware OS Client & Server Protection Server Application Protection Bitlocker X64 DEP/TPM 2008 Core Hyper V Network Layer Network Access Protection Server and Domain Isolation Identity & Rights Management Active Directory & Group Policy AD Federation Services Identity Lifecycle Management 2007 Rights Management Services Forefront Stirling Edge Protection Terminal Services Gateway Forefront Intelligent Application Gateway

25 Anti-VirusSecurity SoftwarePatch Security Appliance Network Device System Integrator

26 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Marko Bohanec Regionalni vodja rešitev za upravljanje in varnost, Central & Eastern European Headquarters Microsoft, Munich 13. marec 2008 Marko Bohanec."

Similar presentations


Ads by Google