/
Moving Towards ‘End to End Trust’: Moving Towards ‘End to End Trust’:

Moving Towards ‘End to End Trust’: - PowerPoint Presentation

kittie-lecroy
kittie-lecroy . @kittie-lecroy
Follow
382 views
Uploaded On 2017-01-12

Moving Towards ‘End to End Trust’: - PPT Presentation

A Collaborative Effort Tim Rains Group Product Manager Microsoft Session Code SIA101 Threat Landscape Applications Continue To Be Vulnerable  Operating System 88 Threat Landscape Continues To Evolve ID: 508850

windows microsoft access security microsoft windows security access www political protection economic social required forces requirements resources slide platform

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Moving Towards ‘End to End Trust’:" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1
Slide2

Moving Towards ‘End to End Trust’:A Collaborative Effort

Tim Rains

Group Product Manager

Microsoft

Session Code:

SIA101Slide3

Threat Landscape

Applications Continue To Be Vulnerable 

Operating System 8.8%

Threat Landscape Continues To Evolve

Threats Are Distributed Worldwide

 

Data source: Microsoft Security Intelligence Report v6 July – Dec 2008

National Interest

Personal Gain

Personal Fame

Curiosity

Amateur

Expert

Specialist

Largest area by volume

Script-Kiddy

Largest segment by

$

spent on defense

Author

Vandal

Thief

Spy

Trespasser

Largest area by $ lost

Fastest growing segment

Crime Is On The Rise

 

www.microsoft.com/sir

Slide4

Top Threats in South Africa

Disinfected Threats by Category in 2H08

Category

Infected Computers

Trend from 1H08

Worms

24,318

+ 317.8%

Miscellaneous Trojans

17,773

+ 130.4%

Trojan Downloaders and Droppers

15,103

+39.8%

Miscellaneous

Potentially Unwanted Software

14,727

-13.4%

Adware

9,715

-18.3%

Backdoors

5,815

+122.7%

Password

Stealers and Monitoring Tools

5,674

+356.5%

Viruses

3,069

+228.6%

Spyware

608

-29.3%

Exploits

534

+111.1%

TOTAL

+ 64.6%Slide5

Political/

Legislative

Imperatives

Economic Forces

Social

Requirements

The Elements for End To End TrustSlide6
Slide7
Slide8

Political/

Legislative

Imperatives

Economic Forces

Social

Requirements

Windows Vista and Windows 7

Trusted Platform Module (TPM 1.2) protects user data and ensures that a PC has not been tampered with

offline

TPM and

BitLockerSlide9

Windows Vista and Windows 7

Trusted Platform Module (TPM 1.2) protects user data and ensures that a PC has not been tampered with

offline

TPM and

BitLocker

Windows 7

AppLocker

AppLocker

Helps Prevent Unauthorized Software from RunningSlide10

Windows 7

Direct Access

Seamlessly and securely access your corporate network without the need to VPN or RASSlide11

Windows 7

Direct Access

Seamlessly and securely access your corporate network without the need to VPN or RAS

Political/

Legislative

Imperatives

Economic Forces

Social

RequirementsSlide12

Business Ready Security

Protection

Access

Management

Highly Secure

& Interoperable Platform

Identity

Integrate and extend

security across

the enterprise

Protection in a

Direct Access World

Simplify the

security experience,

manage compliance

Help securely enable

business by managing risk and empowering

peopleSlide13

Identity and Security Division

Comprehensive management console

Manage protection as well as accessSlide14

Political/

Legislative

Imperatives

Economic Forces

Social

Requirements

An open platform for simplified user access

based on claims

Microsoft Code Name “Geneva

” ServerSlide15

Lake Washington School District Pilot

videoSlide16

Political/

Legislative

Imperatives

Economic Forces

Social

Requirements

Social, Political, Economic, and IT AlignmentSlide17

Work together to realize a safer, more Trusted Internet

Learn about the Threats

Focus on the Fundamentals

Develop new Scenarios

Participate and Enable Change

www.microsoft.com/endtoendtrust

Realizing End to End TrustSlide18

question & answerSlide19

www.microsoft.com/teched

International Content & Community

http://microsoft.com/technet

Resources for IT Professionals

http://microsoft.com/msdn

Resources for Developers

www.microsoft.com/learning

Microsoft Certification & Training Resources

Resources

Required Slide

Speakers,

TechEd 2009 is not producing

a DVD. Please announce that

attendees can

access session

recordings from Tech-Ed website. These will only be available after the event.

Tech

·Ed

Africa 2009 sessions will be made available for download the week after the event from:

www.tech-ed.co.zaSlide20

Related Content

Microsoft Security Intelligence Report (SIA206)

Security Management and Protection: What's in Microsoft Forefront Client Security Version 2 (SIA203)

Targeting SPAM with Forefront (SIA204)

Deploying Windows 7 BitLocker in the Enterprise (WCL308)Next Generation Messaging and Collaboration Protection Drilldown (SIA301)Windows Internet Explorer 8 Security, Inside and Out  (WCL305)12 Tips to Secure Your Windows Systems, Revisited: How Windows Vista, Windows Server 2008, and Windows 7 Change the Game (WSV301)

Overview of Microsoft Forefront Unified Access Gateway (SIA305)Access and Protection: A Technical Preview and Deep Dive of the Next Generation of Microsoft ISA Server (SIA303)Developing a Security Awareness Strategy (SIA202)

Required Slide

Speakers,

please list the Breakout Sessions,

TLC Interactive Theaters and Labs that are related to your session. Any queries, please check with your Track Owner.Slide21

Track Resourceswww.microsoft.com/endtoendtrust

www.microsoft.com/sir

http://www.microsoft.com/Forefront/en/us/business-ready-security.aspx

Required Slide

Track Owners

to provide guidance.Please address any queries to your track owners.Slide22

Required Slide

Complete a session evaluation and enter to win!

10 pairs of MP3

sunglasses

to be

wonSlide23

©

2009 Microsoft

Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.

MICROSOFT

MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Required Slide