Top Banner
40

video demo X X Not policy compliant Policy compliant.

Dec 16, 2015

Download

Documents

Bruce Frampton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: video demo X X Not policy compliant Policy compliant.
Page 2: video demo X X Not policy compliant Policy compliant.

Unleashing the Power of Consumerization:How We Can Help WCL215

Jason Leznek Director of Product ManagementMicrosoft Corporation

Page 3: video demo X X Not policy compliant Policy compliant.

Life and Work are Becoming Indistinguishable

At home… At work…

And anywhere in between

Page 4: video demo X X Not policy compliant Policy compliant.

video

Consumerization of IT

Page 5: video demo X X Not policy compliant Policy compliant.

Unmanaged Devices Have Hidden CostsBusiness Risks

TheftSecurityPrivacyCorporate and government regulatory complianceIntellectual property (IP) protection

IT ChallengesUnknown patched stateUnknown application vendorsUnknown application compatibilityComplexity to access corporate dataUnique management requirements for each device

Page 6: video demo X X Not policy compliant Policy compliant.

Challenges

How do I…

Address the work/life blur?

Ensure anywhere productivity?

Protect data and maintain compliance?

Handle PC and device management?

Page 7: video demo X X Not policy compliant Policy compliant.

DATA

APPS

OS/HW

NETWORK

Consider the Essentials

Create the Conditions for Success.How will you control access to sensitive data?How will you manage data backup/restore?

How will you deliver business applications? How will you support compliance reporting?

Who owns the IP on the device?Who fixes the device if it breaks?

How will you enforce network security?

1

Page 8: video demo X X Not policy compliant Policy compliant.

Understand Principles to Enable Consumerization

Access to CorporateInformation based on:

Who you areRead, Read/Write, Full Access

How much you trust the deviceUnmanaged, Managed, Partially Managed

Where the device isCorporate networkInternetUntrusted network

2

Page 9: video demo X X Not policy compliant Policy compliant.

Support User Choice

Virtualization CloudComputing

EnterpriseManagement

Terminal ServerComputing

Evaluate Enabling Technologies

Enabling Technologies Can Help.

3

Manage the Essentials

Page 10: video demo X X Not policy compliant Policy compliant.

Access toCorporateApplications

Unified AccessGateway (UAG)Terminal ServerAccess Gateway (TSG)Virtual Desktop Infrastructure (VDI)

Isolate Devices and Data

Server andDomainIsolation (IPSec)Network AccessProtection (NAP)Rights Management Service

Enforce Policy

Password PolicyRemote WipeAuthorized Device

Using Technology to Enable Consumerization

1 2 3

Page 11: video demo X X Not policy compliant Policy compliant.

Enforce Policy1

Page 12: video demo X X Not policy compliant Policy compliant.

SCCM 2012: Mobile Device Management Through Exchange

Provide basic management for all Exchange ActiveSync (EAS) connected devicesFeatures Supported:

Discovery/InventorySettings policyRemote Wipe

Supports on-premises Exchange 2010 and hosted Exchange

Page 13: video demo X X Not policy compliant Policy compliant.

Connection Method to Exchange: EASConfiguration Manager Client Support only for WM 6.1, WP6.5,Symbian

.‘Light’ Management supportEAS Based policy deliverySupport includes:

Discovery/InventorySettings policyRemote Wipe

Announcing: SCCM 2012

Page 14: video demo X X Not policy compliant Policy compliant.

demo

SCCM 2012 Beta Device Management

Page 15: video demo X X Not policy compliant Policy compliant.

Isolate Devices and Data2

Page 16: video demo X X Not policy compliant Policy compliant.

Isolate: IPSec Server and Domain Isolation

Untrusted

Unmanaged

Domain Isolation

Active DirectoryDomain Controller

X

ServerIsolation

Servers withSensitive DataHR Workstation

ManagedComputer

X

ManagedComputer

TResource Server

CorporateNetwork

Define the logical isolation boundariesDistribute policiesand credentials

Managed computerscan communicate

Block inbound connectionsfrom untrusted

Enable tiered-accessto sensitive resources

Page 17: video demo X X Not policy compliant Policy compliant.

Isolate: Network Access Protection

Access requested

Health state sent to NPS (RADIUS)

NPS validates against health policy

If compliant, access granted

If not compliant, restricted network access and remediation

Microsoft NPS

Corporate Network

Policy Serverse.g., Patch, AV

DCHP, VPNSwitch/Router

RestrictedNetwork

Remediation Servers

e.g., Patch

Not policy compliant

Policy compliant

1

3

5

4

1

3

4

5

22

Page 18: video demo X X Not policy compliant Policy compliant.

Data Isolation: RMS

Author using Office The Recipient

Windows Server running RMS

SQL Server Active Directory

2

3

45

2. Author defines a set of usage rights and rules for their file; Application creates a “Publish License”and encrypts the file

3. Author distributes file

4. Recipient clicks file to open, the RMS-enabled application calls to the RMS server which validates the user and issues a “Use License.”

5. The RMS-enabled application renders file and enforces rights

1. Author receives a client licensor certificate the“first time” they rights-protect information

13

Page 19: video demo X X Not policy compliant Policy compliant.

Isolation Technologies: OS Support

Windows 7 Mac OSX iOS Android Windows Phone 7

AD integrated iPsec Domain Isolation Yes Yes

*3rd Party Offering No No No

Network Access Protection Yes Yes*3rd Party Offering

No No No

RMS Yes No No No No

Page 20: video demo X X Not policy compliant Policy compliant.

3 Access to Corporate Applications

Page 21: video demo X X Not policy compliant Policy compliant.

Access from Unmanaged Devices

Data Center/Corporate NetworkInternet

Page 22: video demo X X Not policy compliant Policy compliant.

Access: Forefront Unified Access Gateway

Direct Access

Data Center/Corporate Network

Business Partners/SubcontractorsRead/Write only to subset of siteson SharePoint

Internet

AD, ADFS, RADIUS, LDAP…

HTTPS (443)

UAGHome/Friend/KioskRead Only Access

Employees Managed MachinesFull Access only to sites defined User role

MobileExchangeCRMSharePointIIS basedIBM, SAP, Oracle

TS/RDS

Non web

HTTPS /

HTTP

AuthenticationEnd-point health detectionEnterprise ReadinessEdge ReadyInformation Leakage PreventionNon-Windows

Page 23: video demo X X Not policy compliant Policy compliant.

demo

Forefront Unified Access Gateway

Page 24: video demo X X Not policy compliant Policy compliant.

Access: Terminal Services GatewayRemote access to internal server resources

DMZInternet Corp LAN

Terminal Server

Hotel

ExternalFirewall

InternalFirewall

Home

Business Partner/Client Site

E-mail Server

Terminal ServerInternet

Terminal ServicesGateway Server

HTTPS/443

Page 25: video demo X X Not policy compliant Policy compliant.

Description

Personalized desktops hosted in datacenter

Key Considerations

ITInvestments in server, management, storage, and network infrastructure

Unified, centralizedmanagement of physical and virtual environments

User/VM Density

Business continuity

UserFlexibility of access

User Experience (personalization, graphics)

Performance & Scalability is best in class (over LAN, WAN)

Technology from Microsoft-Citrix

Windows desktop and session deliveryon-demand

Integrated Management with SC, Application Virtualization and RDS CAL

Desktop Virtualization platform (hypervisor)

Full-fidelity user experience over LAN and WAN

Lightweight, universal software client Self-service 'storefront' for enterprise applications

Our Advantage

Best in class technologies combined to provide most comprehensive and most Cost Effective solution

Most scalable with Hyper-V and Sessions

Better User Experience than PCoIP

Single Management Console for physical and virtual assets

Better TogetherAccess desktop, applications, data on any device, anywhere

Best user experience on LAN or WAN

Integrated desktop management

Server Hosted Virtual DesktopsVirtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktop

Page 26: video demo X X Not policy compliant Policy compliant.

Extending Virtualization to Unmanaged Devices:Citrix Receiver

Leverage Windows, iOS, Android, RIM deviceswith universal clientAccess your VDI Desktop or Remote PC Self-service installation and auto-updates

Thin and Diskless PCs PCs TabletsSmartphones

Page 27: video demo X X Not policy compliant Policy compliant.

demo

VDI Access

Page 28: video demo X X Not policy compliant Policy compliant.

Access Technologies OS Support

Windows 7 Mac OSX iOS Android Windows Phone 7

UAG SSL VPN Yes Yes Yes Yes Yes

Citrix Receiver Remote Desktop Yes Yes Yes Yes Yes

Terminal Services Gateway Yes Yes Yes Yes No

Page 29: video demo X X Not policy compliant Policy compliant.

Access toCorporateApplications

Isolate Devicesand Data

Enforce Policy

Using Technology to Enable Consumerization

1 2 3

Page 30: video demo X X Not policy compliant Policy compliant.

Microsoft Windows 7 Commercial SlateStrategy and roadmap

Page 31: video demo X X Not policy compliant Policy compliant.

Building the Windows 7 Slate PCs

We’re working with…

Chipset manufacturers to build a heterogeneous high performance platform

OEMs to deliver slate PCs to meet enterprise end user and IT needs

Taking advantage of hardware innovations to optimize Slate Experience

Customers to understand how they will use slates in the enterprise

Working with developers to deliver consumer and enterprise touch apps for Windows

Page 32: video demo X X Not policy compliant Policy compliant.

Core Enterprise Requirements Solution Capabilities

Enterprise Security Device Encryption Support, Document DRM Support, Remote Data Wipe

Enterprise ManageabilityAutomated Application Delivery and Updates, OS and Application Patch Management, End User Remote Assistance

Choice In Hardware Device form factors available to support multiple vertical needs and end user preferences

Enterprise Application SupportSupport for mainstream and vertical enterprise LOB Applications, Microsoft Office Support, Flash and Silverlight Support

Enterprise Device Support Support for wide range of enterprise peripheral devices

Enterprise Collaboration Support for Audio and Videoconferencing, Full SharePoint Support, Office Communicator Support

Offline Application Usage Support for Offline Usage of Mainstream and Vertical Applications

Enterprise Support 24x7 Support available, Design Change Request options available

Infrastructure Integration Integrates easily with existing access, authentication, policy, and single sign on infrastructure

Why Windows 7: This is What Enterprise Customers Are TellingUs is Important:

Page 33: video demo X X Not policy compliant Policy compliant.

Hardware InnovationsOptimize Windows Slates

SSD drives for Rapid boot up and Fast System responsiveness

Intel Oaktrail Chipset enabling 8–10 hour battery life on Slates

Working with OEMs to optimize system speed and performanceWindows 7 trigger start servicesRapid wake from sleep delivers “instant on”

Page 34: video demo X X Not policy compliant Policy compliant.

Working with ISVs to deliver Touch Appsfor Windows 7Published developer guidance for touch on Windows 7

Immersive Consumer Apps on Windows Product Scout

Working with Enterprise ISVs to develop Enterprise Touch Apps

Page 35: video demo X X Not policy compliant Policy compliant.

Devices at home

Devices at Work

Devices for VerticalUse Cases

Windows Slates Connect to Your Devices

Page 36: video demo X X Not policy compliant Policy compliant.

Windows 7 Helps IT Embrace Consumerization

Empowered End Users Data and AppsDevices

Provide the choice of devices and form factors users desire

Enable seamless collaboration through existing investments

and infrastructure

Page 37: video demo X X Not policy compliant Policy compliant.

Related Sessions

SIM214 | Client Management and Security Roadmap and VisionMonday, May 16 | 1:15 PM - 2:30 PM | Room: B407

VIR201 | Virtualization: State of the UnionMonday, May 16 | 1:15 PM - 2:30 PM | Room: B402

WCL209 | Windows Intune: PC Management with Cloud Services and Windows 7 Wednesday, May 18 | 3:15 PM - 4:30 PM | Room: B213

Page 38: video demo X X Not policy compliant Policy compliant.

Resources

www.microsoft.com/teched

Sessions On-Demand & Community Microsoft Certification & Training Resources

Resources for IT Professionals Resources for Developers

www.microsoft.com/learning

http://microsoft.com/technet http://microsoft.com/msdn

Learning

http://northamerica.msteched.com

Connect. Share. Discuss.

Page 39: video demo X X Not policy compliant Policy compliant.

Complete an evaluation on CommNet and enter to win!

Page 40: video demo X X Not policy compliant Policy compliant.

© 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to

be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS

PRESENTATION.