Partnering with Microsoft Server and Tools - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

Partnering with Microsoft Server and Tools

Description:

Information Protection. Encrypting File System (EFS) BitLocker Network ... Register for beta information. Download a trial versions of our security products ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 30
Provided by: toddgre
Category:

less

Transcript and Presenter's Notes

Title: Partnering with Microsoft Server and Tools


1
Partnering with MicrosoftServer and Tools
  • Joseph Landes
  • Director of Marketing
  • Central and Eastern Europe

2
Agenda
  • Why Windows Server?
  • Opportunities with Small Business Server
  • Opportunities with Security

3
(No Transcript)
4
(No Transcript)
5
(No Transcript)
6
Server Functions
Workloads
  • Networking
  • Remote Access
  • Security
  • Identity Management
  • Terminal Server

Operational Infrastructure
  • Storage (file, portal)
  • Print
  • Email
  • Collaboration

Information Worker Infrastructure
  • Application/Web Server
  • Unix integration services
  • Database
  • High Performance Computing

Application Platform
  • Software Distribution
  • Virtualization
  • Operations Management

Management
  • General Purpose Enterprise
  • Medium Business
  • Small Business

Solutions
7
Windows Server Release Cycle
Mainstream Service Packs Updates
Extended Support
At least 5 years from major release
At least 5 years
8
Product OverviewWindows Small Business Server
2003 R2
  • Advanced solution for productivity and security,
    designed for small businesses
  • Small Businesses
  • A complete, affordable network
  • solution designed to help small
  • business owners
  • Protect their business information
  • Keep their business up and running
  • Get more done with less resources
  • Connect with customers better
  • IT Solution Providers
  • An opportunity to build lifelong
  • customer relationships and a
  • profitable business
  • Attract new customers
  • Deepen existing customer relationships
  • Build a profitable business by providing an
    integrated solution and value-added services

9
(No Transcript)
10
Product OverviewWindows Small Business Server
2003 R2Technology building block for small
businesses
IDC Study A new SBS 2003 deployment is often
accompanied by the opportunity to sell desktop PC
hardware and Microsoft Office 2003 and Windows
XP Professional,
11
Increasingly Challenging Security Environments
Fragmentation ofsecurity technology
Threats are moredangerous than ever
Difficult to use,deploy and manage
  • More advanced
  • Application-oriented
  • More frequent
  • Profit motivated
  • Too many point products
  • Poor interoperability
  • Lack of integration
  • Multiple consoles
  • Uncoordinated event reporting analysis
  • Cost and complexity

Security Solution Requirements
12
  • Microsoft Forefront provides greater protection
    and control over the security of your business
    network infrastructure by providing
  • A comprehensive line of information protection
    and secure access products
  • Integration with your existing IT infrastructure
  • Simplified deployment, management, and analysis
  • Technical and industry guidance

13
Tenets of Forefront Security Products
  • Protect Information and Control Access at
  • Operating system
  • Server applications
  • Network edge
  • Content
  • Heterogeneity
  • Third-party products
  • Secure custom apps
  • 24/7 security research and response
  • Cross-product integration
  • MS security products
  • MS server applications
  • Integrates with Microsoft IT infrastructure
  • AD, SQL, MOM, etc.
  • Integration with ecosystem partners and custom
    apps
  • Unified view and analytics
  • Reduced number of management consoles
  • Simplified deployment
  • Appliances and appliance-like experience
  • Technical and industry guidance
  • Simplified licensing

14
Comprehensive Security
Product Portfolio
15
ISA Server 2006
An integrated edge security gateway that helps
protect your IT environment from Internet-based
threats while providing your users fast and
secure remote access to applications and data.
16
A Traditional Firewalls ViewOf A Packet
  • Only packet headers are inspected
  • Application layer content appears as black box

17
ISA Servers View Of A Packet
  • Packet headers and application content are
    inspected

18
Outlook Web Access Traditional Firewall
OWA Traffic
Password Guessing
SSL Tunnel
Internet
Web Server Attacks
Exchange Server
  • Web traffic to OWA is encrypted
  • Standard SSL encryption
  • Security against eavesdropping and impersonation
  • Limitation
  • OWA server is only defense against application
    layer attacks

19
How ISA Server Protects OWA
OWA Traffic
Password Guessing
SSL Tunnel
Internet
Web Server Attacks
Inspection Authentication
Exchange Server
  • Authentication
  • Unauthorized requests are blocked before they
    reach the Exchange server
  • Enforces all OWA authentication methods
  • Optional forms-based authentication prevents
    caching of credentials
  • Inspection
  • Invalid HTTP requests or requests for non-OWA
    content are blocked
  • Inspection of SSL traffic before it reaches
    Exchange server
  • Confidentiality
  • Ensures encryption of traffic over the Internet
  • Can prevent the downloading of attachments to
    client computers

20
Network Access Quarantine
  • Client script checks whether client meets
    corporate security policies
  • Personal firewall enabled?
  • Latest virus definitions used?
  • Required patches installed?
  • If checks succeed, client gets full access
  • If checks fail client gets disconnected after
    timeout period

21
VPN Quarantine Process (1)
Quarantine Resources
Internal Network
?
VPN Client
Client computer connects.
1
22
VPN Quarantine Process (2)
Quarantine Resources
?
VPN Client
Client computer connects.
1
23
Whale
The IAG provides SSL-based application access and
protection with endpoint security management,
enabling granular access control and content
inspection from a broad range of devices and
locations to line-of-business, intranet, and
client-server resources.
24
Protect messaging and collaboration servers
against viruses, worms, spam and inappropriate
content
Multiple scan engines at multiple
layers
Maximize protection against e-mail and
collaboration threats
Advanced Protection
Maximizes availability and management control
Tight integration with Exchange, SharePoint, and
Live Communications Servers
Availability Control
Protects your organization from malicious content
Helps eliminate inappropriate language and
dangerous attachments
Secure Content
25
Gartners Magic Quadrant on Email Security
Gartner Sept. 2006 Microsoft is poised to become
the de facto leader in the e-mail security
market. .it will be difficult to compete
with the addition of anti-spam and antivirus
services as part of both standard and enterprise
licenses for Exchange 2007.
26
Unified malware protection that is easier to
manage and control for desktops, laptops and
server operating systems
  • One solution for spyware and virus protection
  • Built on technology used by millions worldwide
  • Effective threat response
  • One console for simplified administration
  • Define one policy to manage agent settings
  • Integrates with your existing infrastructure
  • One dashboard for visibility into threats
  • View insightful reports
  • Stay informed with state assessment scans

27
Security Services Opportunities Infrastructure
Optimization by Capability
Security is THE KeyBusiness Opportunityfor Core
IO !
Capabilities46 Core Security,29 Sec.
Related Avg. 55 of customers misseach of the
capabilities
28
Security Product Roadmap
Current
Dec 2006
2007
Client
Server
TBD
Edge
TBD
29
Resources Next Steps
  • Take our web based product training
    http//www.microsoft.com/forefront
  • Learn about the Microsoft Core IO Model
    http//www.microsoftio.com
  • Download a trial versions of our security products

http//www.microsoft.com/forefront
  • http//www.microsoft.com/isaserver/2006
  • Register for beta information

http//www.microsoft.com/clientsecurity
  • Contact your Microsoft PAM or reseller for
    information on how to begin selling Microsoft
    Forefront Security products
Write a Comment
User Comments (0)
About PowerShow.com