A Collaborative Effort Tim Rains Group Product Manager Microsoft Session Code SIA101 Threat Landscape Applications Continue To Be Vulnerable Operating System 88 Threat Landscape Continues To Evolve ID: 508850
Download Presentation The PPT/PDF document "Moving Towards ‘End to End Trust’:" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1Slide2
Moving Towards ‘End to End Trust’:A Collaborative Effort
Tim Rains
Group Product Manager
Microsoft
Session Code:
SIA101Slide3
Threat Landscape
Applications Continue To Be Vulnerable
Operating System 8.8%
Threat Landscape Continues To Evolve
Threats Are Distributed Worldwide
Data source: Microsoft Security Intelligence Report v6 July – Dec 2008
National Interest
Personal Gain
Personal Fame
Curiosity
Amateur
Expert
Specialist
Largest area by volume
Script-Kiddy
Largest segment by
$
spent on defense
Author
Vandal
Thief
Spy
Trespasser
Largest area by $ lost
Fastest growing segment
Crime Is On The Rise
www.microsoft.com/sir
Slide4
Top Threats in South Africa
Disinfected Threats by Category in 2H08
Category
Infected Computers
Trend from 1H08
Worms
24,318
+ 317.8%
Miscellaneous Trojans
17,773
+ 130.4%
Trojan Downloaders and Droppers
15,103
+39.8%
Miscellaneous
Potentially Unwanted Software
14,727
-13.4%
Adware
9,715
-18.3%
Backdoors
5,815
+122.7%
Password
Stealers and Monitoring Tools
5,674
+356.5%
Viruses
3,069
+228.6%
Spyware
608
-29.3%
Exploits
534
+111.1%
TOTAL
+ 64.6%Slide5
Political/
Legislative
Imperatives
Economic Forces
Social
Requirements
The Elements for End To End TrustSlide6Slide7Slide8
Political/
Legislative
Imperatives
Economic Forces
Social
Requirements
Windows Vista and Windows 7
Trusted Platform Module (TPM 1.2) protects user data and ensures that a PC has not been tampered with
offline
TPM and
BitLockerSlide9
Windows Vista and Windows 7
Trusted Platform Module (TPM 1.2) protects user data and ensures that a PC has not been tampered with
offline
TPM and
BitLocker
Windows 7
AppLocker
AppLocker
Helps Prevent Unauthorized Software from RunningSlide10
Windows 7
Direct Access
Seamlessly and securely access your corporate network without the need to VPN or RASSlide11
Windows 7
Direct Access
Seamlessly and securely access your corporate network without the need to VPN or RAS
Political/
Legislative
Imperatives
Economic Forces
Social
RequirementsSlide12
Business Ready Security
Protection
Access
Management
Highly Secure
& Interoperable Platform
Identity
Integrate and extend
security across
the enterprise
Protection in a
Direct Access World
Simplify the
security experience,
manage compliance
Help securely enable
business by managing risk and empowering
peopleSlide13
Identity and Security Division
Comprehensive management console
Manage protection as well as accessSlide14
Political/
Legislative
Imperatives
Economic Forces
Social
Requirements
An open platform for simplified user access
based on claims
Microsoft Code Name “Geneva
” ServerSlide15
Lake Washington School District Pilot
videoSlide16
Political/
Legislative
Imperatives
Economic Forces
Social
Requirements
Social, Political, Economic, and IT AlignmentSlide17
Work together to realize a safer, more Trusted Internet
Learn about the Threats
Focus on the Fundamentals
Develop new Scenarios
Participate and Enable Change
www.microsoft.com/endtoendtrust
Realizing End to End TrustSlide18
question & answerSlide19
www.microsoft.com/teched
International Content & Community
http://microsoft.com/technet
Resources for IT Professionals
http://microsoft.com/msdn
Resources for Developers
www.microsoft.com/learning
Microsoft Certification & Training Resources
Resources
Required Slide
Speakers,
TechEd 2009 is not producing
a DVD. Please announce that
attendees can
access session
recordings from Tech-Ed website. These will only be available after the event.
Tech
·Ed
Africa 2009 sessions will be made available for download the week after the event from:
www.tech-ed.co.zaSlide20
Related Content
Microsoft Security Intelligence Report (SIA206)
Security Management and Protection: What's in Microsoft Forefront Client Security Version 2 (SIA203)
Targeting SPAM with Forefront (SIA204)
Deploying Windows 7 BitLocker in the Enterprise (WCL308)Next Generation Messaging and Collaboration Protection Drilldown (SIA301)Windows Internet Explorer 8 Security, Inside and Out (WCL305)12 Tips to Secure Your Windows Systems, Revisited: How Windows Vista, Windows Server 2008, and Windows 7 Change the Game (WSV301)
Overview of Microsoft Forefront Unified Access Gateway (SIA305)Access and Protection: A Technical Preview and Deep Dive of the Next Generation of Microsoft ISA Server (SIA303)Developing a Security Awareness Strategy (SIA202)
Required Slide
Speakers,
please list the Breakout Sessions,
TLC Interactive Theaters and Labs that are related to your session. Any queries, please check with your Track Owner.Slide21
Track Resourceswww.microsoft.com/endtoendtrust
www.microsoft.com/sir
http://www.microsoft.com/Forefront/en/us/business-ready-security.aspx
Required Slide
Track Owners
to provide guidance.Please address any queries to your track owners.Slide22
Required Slide
Complete a session evaluation and enter to win!
10 pairs of MP3
sunglasses
to be
wonSlide23
©
2009 Microsoft
Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT
MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Required Slide