Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the...
-
Upload
basil-miles -
Category
Documents
-
view
215 -
download
2
Transcript of Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the...
![Page 1: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/1.jpg)
Windows 10 Overview for Enterprise
![Page 2: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/2.jpg)
Are cybersecurity threats keeping you up at night?
Your people go everywhere with devices, do the apps and data they need go with them?
Can you adopt new technologies as fast as your business needs them?
Is it getting easier, or harder, to manage your infrastructure?
Do you have what it takes to succeed?The digital economy
![Page 3: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/3.jpg)
for Enterprise
Be more productiv
e
Innovative devices for
your business
Managed for continuous innovation
Protection against modern security
threats
![Page 4: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/4.jpg)
Protection against modern security
threats
![Page 5: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/5.jpg)
Device Protection
Information ProtectionIdentity Protection
Windows 10 Security Approach
![Page 6: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/6.jpg)
Identity Protection
![Page 7: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/7.jpg)
Microsoft Passport
Hyper-V “Virtual Secure Mode (VSM)”
Windows Hello
Identity Protection
![Page 8: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/8.jpg)
Utilize familiar devices
Secured by hardware
USER CREDENTIAL
An asymmetrical key pair Provisioned via PKI or created
locally via Windows 10
Device-based multi-factor
Identity Protection
![Page 9: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/9.jpg)
A new approach
Microsoft Passport
IDPActive Directory
Azure ADGoogle
FacebookMicrosoft Account
User proves identity
1
“Trust my unique key”
2
“Here is your authentication token”
3“We trust tokens from IDP"4
Windows10
Intranetresources
Identity Protection
![Page 10: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/10.jpg)
Simplest implementation optionWorks on existing devicesUser familiarity
PIN
Enables multi-factorEase of useImpossible to forget
Biometrics
Accessing credentials
Identity Protection
![Page 11: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/11.jpg)
Today’s Security
Challenge
Pass the Hash Attacks
1. Single IT Pro’s machine
is compromised
IT Pro manages kiosks/shared devices
on network
Attacker steals IT Pro’s access token
2. Using IT Pro’s access token attacker looks
for kiosk/shared devices and mines
them for tokens
3. Repeat
Access to one device can lead to access to
many
Identity Protection
![Page 12: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/12.jpg)
OSVirtual Secure Mode
VSM
CPU with Virtualization Extensions
Hyper-V
Identity Protection
![Page 13: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/13.jpg)
Information Protection
![Page 14: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/14.jpg)
Device Protection
![Page 15: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/15.jpg)
Securing the device
Device protection
Secure Boot Device Guard Device Health Windows Defender
Windows Update for Business
![Page 16: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/16.jpg)
Roll-out rings
Maintenance windows
Peer to peer delivery
Integration with your existing tools like System Center
Introducing Windows Update for Business
![Page 17: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/17.jpg)
Over 1 billion Windows usersHundreds of millions
Current BranchWindowsInsider Preview Branch
Several Million
Broad Microsoft Internal Validation
10’s of thousands
Engineering Builds
Time
Users
Contoso Internal Ring 1
Contoso Internal Ring 2
Contoso Internal Ring 3
Contoso Internal Ring 4
Market Driven Quality: External and Internal
Current Branch for Business
Device protection
![Page 18: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/18.jpg)
Innovative devices for your business
![Page 19: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/19.jpg)
One converged Windows platform
![Page 20: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/20.jpg)
Works great on existing devices
![Page 21: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/21.jpg)
Managed for continuous innovation
![Page 22: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/22.jpg)
Deployment Choices
Wipe-and-Load
Traditional process• Capture data and settings• Deploy (custom) OS image• Inject drivers• Install apps• Restore data and settings
Still an option for all scenarios
In-Place
Let Windows do the work• Preserve all data, settings,
apps, drivers• Install (standard) OS image• Restore everything
Recommended for existing devices (Windows 7/8/8.1)
Provisioning
Configure new devices• Transform into an Enterprise
device• Remove extra items, add
organizational apps and config
New capability for new devices
App, web and device compatibility
Managed for Continuous Innovation
![Page 23: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/23.jpg)
Management choices
Organizations may mix and match, depending on their specific scenario
Managed for Continuous Innovation
Identity Management Updates Infrastructure Ownership
Active Directory
Azure Active Directory
Group Policy
System Center Configuration Manager
3rd party PC management
Intune
3rd party MDM
Windows Update
Windows Update for Business
Windows Server Update Services (WSUS)
Intune
3rd party MDM
On-premises
In the cloud
Corporate-owned
CYOD
BYOD
![Page 24: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/24.jpg)
Introducing the Business Store
Storefront designed for organizations
Acquire, deploy and manage apps
Easy for your users
Application Protection
![Page 25: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/25.jpg)
This is what we hear your adoption needs are:
DVD
Parallel
Agili
AGILITYAccess to new technology
Microsoft to quickly implement your feedback
Transparency on the roadmap
Enterprise-grade capabilities to help you address the latest trends in the market
Flexibility for mixed environments
PCMCIA
CONTROLStability
Fewer upgrades
Long support lifecycle
Ample time to test and certify
Predictability
ISVs’ statement of Support
Managed for Continuous Innovation
![Page 26: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/26.jpg)
Consumer devices
Updates installed via Windows Update as they arrive
Keeping hundreds of millions of consumers up to date
Large and diverse user base helps drive quality of the OS updates
BYOD devices are up to date & secure
No new functionality on long term servicing branch
Regular security updates
Control with WSUS
Special systems
Examples: Air Traffic Control, Emergency Rooms
Windows as a Service
Update their devicesafter features are validated
in the market
Business users
![Page 27: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/27.jpg)
Windows System Update Services (WSUS)
Windows Update (WU)
Consumer devices
BYOD Scenarios
Test Machines
Special Systems
Factory floor machines
Emergency Room systems
Windows Update for Business (WUB)
Knowledge Workers
Salesforce
Non mission critical systems
Release Deployment Options
Managed for Continuous Innovation
![Page 28: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/28.jpg)
Get ready for Windows 10Test Windows 10 Preview
Join the Windows Insider Program
Give your feedback
Profile your systems for WU for Business
Start your deployment plan
![Page 29: Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.](https://reader035.fdocuments.in/reader035/viewer/2022062805/5697bfa51a28abf838c97b8f/html5/thumbnails/29.jpg)
© 2014 Microsoft Corporation. All rights reserved.