View
221
Download
0
Category
Preview:
Citation preview
As melhores soluçõesAs melhores soluçõesAs melhores soluções As melhores soluções servidoras empresariais e a servidoras empresariais e a ppmaior facilidade de gestãomaior facilidade de gestão
Sérgio MartinhoMicrosoft PortugalSergio.Martinho@microsoft.com31-05-2007
AgendaAgendaIT Solution Priorities by Vertical Marketgg
The milestoneThe milestone
y
1° 2° 3° 4°
Ranking of Top 4 Priorities in Western European Vertical MarketsThe milestoneThe milestoneTechnology InvestmentsTechnology Investments
1° 2° 3° 4°
Banking Security CRM BPM/Analytics Content/Document management
Insurance/Other Security BPM/Analytics Industry Specific Content/Document
FundamentalsFundamentalsThreat & Vulnerability mitigationThreat & Vulnerability mitigation
Insurance/Other finance
Security BPM/Analytics Industry Specific Content/Document management
Discrete manufacturing
Security ERP BPM/Analytics Supply Chain
Process Security ERP BPM/Analytics Industry SpecificThreat & Vulnerability mitigationThreat & Vulnerability mitigationIdentity & Access controlIdentity & Access control
Wi d Vi tWi d Vi t
Process manufacturing
Security ERP BPM/Analytics Industry Specific
Healthcare Security Industry Specific Content/Document management
BPM/Analytics
Telecom/Media/Tran Security BPM/Analytics Industry Specific Content/DocumentWindows VistaWindows VistaNext generation Security TechnologiesNext generation Security Technologies
Telecom/Media/Transport/Utilities
Security BPM/Analytics Industry Specific Content/Document management
Retail/Wholesale Security BPM/Analytics ERP Industry Specific
Business services Security Industry Specific Content/Document BPM/AnalyticsBusiness services Security Industry Specific Content/Document management
BPM/Analytics
Education Security Content/Document management
Collaborative technologies
DW and datamart technologies
Government Security Content/Document Industry Specific DW and datamartGovernment Security Content/Document management
Industry Specific DW and datamart technologies
Source: IDC European VM Survey, August 2006; N=1922
Software Security Is HardSoftware Security Is Hard
Comprehensive Comprehensive SecuritySecurityProduct PortfolioProduct Portfolio
ServicesServices
Product PortfolioProduct PortfolioWhale CommunicationsIntelligent Application Gateway
ServerServer
EdgeEdge
g pp y• SSL‐based access•Deep application protection•Endpoint security management
Information Information ProtectionProtection
Server Server ApplicationsApplications
IdentityIdentityManagementManagement
Client and Client and Server OSServer OS
SystemsSystemsManagementManagementActive DirectoryActive Directory
GuidanceGuidance
Active Directory Active Directory Federation Services Federation Services
(ADFS)(ADFS)
Developer Developer ToolsTools
HostedHosted ServicesServices
The most available infrastructure in the marketThe most available infrastructure in the market
12 Data Centers12 Data Centers Strong SLAStrong SLA12 Data Centers 12 Data Centers Activation by simple MX record Activation by simple MX record changechange4 500 customers worldwide (from 5 to4 500 customers worldwide (from 5 to
Strong SLAStrong SLA99,999% network availability99,999% network availability100% virus filtering100% virus filtering
4 500 customers worldwide (from 5 to 4 500 customers worldwide (from 5 to 100 000 users)100 000 users)+2.5 million mailboxes secured+2.5 million mailboxes secured+6 billion messages filtered per month+6 billion messages filtered per month
95% spam filtered95% spam filteredFalse positive rate: < 1/250,000 False positive rate: < 1/250,000
6 billion messages filtered per month6 billion messages filtered per month
Microsoft Exchange Hosted ServicesMicrosoft Exchange Hosted Servicesgg
RealReal time threat prevention featurestime threat prevention featuresRealReal--time threat prevention featurestime threat prevention featuresMultiMulti--layer antilayer anti--spam and antispam and anti--virusvirusCustomized content and policy enforcementCustomized content and policy enforcement
EE--mail retention for help with compliance and email retention for help with compliance and e--discoverydiscoveryCustomized report generation for help demonstrating complianceCustomized report generation for help demonstrating complianceFully indexed, searchable archiveFully indexed, searchable archive
Uninterrupted eUninterrupted e--mail accessibilitymail accessibilityUninterrupted eUninterrupted e--mail accessibilitymail accessibilityRapid recovery from unplanned disasters and network outagesRapid recovery from unplanned disasters and network outagesThirtyThirty--day rolling historical eday rolling historical e--mail storemail store
Full eFull e--mail encryption mail encryption No public and private key managementNo public and private key managementG t liG t li b db d il tiil tiGateway, policyGateway, policy--based ebased e--mail encryptionmail encryption
ExempleExemple: European customer; : European customer;
ServerServer
AntiAnti--virus Approachesvirus ApproachesInternet
pppp
Problem Single Point of Failure
VirusesWormsSpam
ISA ISA ServerServer
SMTP SMTP ServerServerA A
SharePointSharePointExchangExchang ExchangExchang
Single VendorSingle Engine
A A A
ee eeA
A AA
AntiAnti--virus Approachesvirus ApproachesInternet
pppp
Problem Management/Cost
VirusesWormsSpam
ISA ISA ServerServer
SMTP SMTP ServerServerA B
SharePointSharePointExchangExchang ExchangExchang
Multi-vendorMulti-engine
C ED
ee eeA
B C
Forefront Security forForefront Security forForefront Security for Forefront Security for Exchange ServerExchange ServerExchange ServerExchange Server
Secure Content MangementSecure Content Mangement
Content FilteringContent FilteringContent FilteringContent Filteringe.g. File types or sizes or key wordse.g. File types or sizes or key words
AntiAnti--Virus Scanning with multipleVirus Scanning with multipleAntiAnti Virus Scanning with multiple Virus Scanning with multiple AV enginesAV engines
A tiA ti S S iS S iAntiAnti--Spam ScanningSpam ScanningCompliments Exchange 2003 IMF Compliments Exchange 2003 IMF
Harnessing the Strength of Multiple EnginesHarnessing the Strength of Multiple Engines
Forefront Server Security Forefront Server Security Each scan job in a Forefront Each scan job in a Forefront products integrate and ship with products integrate and ship with industryindustry--leading antivirus scan leading antivirus scan engines fromengines from
Server Security product can run Server Security product can run up to five engines up to five engines simultaneouslysimultaneously
Internal Messaging and Collaboration Servers
A B C ED
Signature UpdatesSignature Updatesg pg pSober.P Virus Detection TimeSober.P Virus Detection Time
May 2, 2005 (GMT)May 2, 2005 (GMT)No. Updates/DayNo. Updates/Day
January 2005 UpdatesJanuary 2005 Updates
16:54:0016:39:00
F ProtKaspersky
Time KasperskyKaspersky 18.518.5Dr. WebDr. Web 10.710.7
SophosSophos 2.72.7
Time of DayHour : Minute
17:38:2417:27:0017:19:0016:56:0016:54:00
CommandSophos
BitDefenderAVK
F-Prot SophosSophos 2.72.7BitDefenderBitDefender 1.71.7ClamAVClamAV 1.51.5AntiVirAntiVir 1.41.4F f tF f t
18:44:0018:18:0018:18:0018:14:00
17:38:24
VirusBusterFortinet
F-SecureIkarus
CommandFF--SecureSecure 1.41.4PandaPanda 1.31.3IkarusIkarus 1.11.1
Forefront Forefront EnginesEngines
20:46:0020:24:00
19:54:0018:49:00
NormanAntiVir
eTrust- INOPanda SymantecSymantec 1.11.1
Trend MicroTrend Micro 1.01.0
21:38:0021:33:0021:27:0021:18:00
T t VETMcAfee
AvastAVG
Trend Micro AV-Test.org Feb. 2005
Note: the chart (left) represents a Note: the chart (left) represents a singlesinglevirus outbreak only. It does virus outbreak only. It does notnot represent represent
0:38:0023:15:00
SymanteceTrust-VET
AV-Test.org May 2005
us outb ea o y t doesus outb ea o y t does otot ep ese tep ese taverage response times for the listed average response times for the listed antivirus labs.antivirus labs.
Forefront Security forForefront Security forForefront Security for Forefront Security for SharePointSharePoint
Forefront Security for SharePointForefront Security for SharePoint
SQL Virus Protection for Document Libraries- Real-time scanning of documents uploaded
Document Library
Document
and downloaded from document library- Manual and scheduled scanning of
document library
SharePoint Server
Document
Users
Content Policy Enforcement- File filtering to block documents
frombeing posted based on name match, file type or file extension
- Content filtering by keywords withindocuments for inappropriate words pp pand phrases
Unified malware protection for business
desktops, laptops and server operating
systems that is easy to manage and controly y g
One solution for spyware and virus protectionBuilt on protection technology used by millions worldwideEffective threat response
One console for simplified security administrationDefine one policy to manage client protection agent settings Integrates with your existing infrastructure
One dashboard for visibility into threats and vulnerabilitiesView insightful reportsSt i f d ith t t t d it l tStay informed with state assessment scans and security alerts
orororor
PARAMETeRSPARAMETeRS REPORTSREPORTSPARAMETeRSPARAMETeRS REPORTSREPORTS
ManagementManagementServerServer
Reports and AlertsReports and AlertsServerServer
(or other solution)(or other solution) (or other solution)(or other solution)
EVENTSEVENTSDEFINITIONSDEFINITIONS
Workstation, laptops, files servers Workstation, laptops, files servers running Forefront Client Securityrunning Forefront Client Security
Security SummarySecurity SummarySecurity SummarySecurity SummarySecurity SummarySecurity SummarySecurity SummarySecurity Summary
Perimeter ProtectionPerimeter Protection
ISA ServerISA Server
caching
Contentli ti
Caching
Content filtering
application publishing
Web Filtering
Application Publishing
advanced application layer Advanced Application LayerfirewallAdvanced Application Layer Firewall / VPN
Intelligent Application Intelligent Application g ppg ppGatewayGateway SQL
Server
Active Directory
File Shares
ISA Server
S
Intelligent Application Gateway™
IIS
External Firewall
SharePoint
Exchange Server
Server
SSL VPNSSL VPN--based based Remote AccessRemote Access
Any DeviceAny Location Any Application
I t t/E t tIntranet/Extranet Policy-based Security
E f U S l I t tiO ti i d P d ti it Ease of Use Seamless IntegrationOptimized Productivity
IS good to have a plan…IS good to have a plan…
Be aware the way you Be aware the way you implement it.implement it.
© 2006 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
Recommended