Windows 10: Preview, Adoption and Updates
-
Upload
susan-lambeth -
Category
Technology
-
view
121 -
download
2
Transcript of Windows 10: Preview, Adoption and Updates
From Carolinas ITWindows 10
Presented by William GarnerTechnical Services Director
• Place partner logo and/or Microsoft Partner Program logo here
What customers are telling MicrosoftPasswords are no longer sufficient We need to be adopting new technologies as fast as our customers
My users need access to their apps and data anywhere, anytime
Too many tools and too much fragmentation
No more big deployments
We want more transparency and an open dialogue with Microsoft
IT Budgets are under pressure. Show us how we can cut IT costs
How do I protect my corporate data
Security of our mobile devices is a top concern
Enable mobility of the experienceNatural interactionsMost trusted platformInnovative new hardwareWindows as a service
Create morepersonal computing
One converged Windows platform
Be more productiveProtections against modern security threats Innovative devices for your businessManaged for continuous innovation
Be more productive
Simple to useEasy for Windows 7 usersFamiliar experience across devicesTailored to form factor
Cortana – your clever new personal assistantSpeak naturally or type in the search boxKeep track of your calendar, change events and set remindersAnswer questionsFind documents on yourPC or search the webCortana’s Notebook
• Place partner logo and/or Microsoft Partner Program logo here
• Place partner logo and/or Microsoft Partner Program logo here
• Place partner logo and/or Microsoft Partner Program logo here
• Place partner logo and/or Microsoft Partner Program logo here
• Place partner logo and/or Microsoft Partner Program logo here
• Place partner logo and/or Microsoft Partner Program logo here
Protections against modern security threats
REVOLUTIONTODAY, WE’RE EXPERIENCING A
OF CYBER-THREATS
TARGET “The Target hackers broke into the network using a stolen user name and password that had been created for the company servicing their air conditioning systems.”
The Target credit card breach resulted in millionsof credit cards appearing in the marketplace
BRAIN KREBS (SECURITY BLOGGER)
Source: “Cards Stolen in Target Breach Flood Underground Markets,” KrebsOnSecurity.com, December 20, 2013
“For now, our defenses are strong enough to counter the threat, and many attackers know that, so they go after suppliers. But of course they are always trying to develop new ways to attack.”
Confidential report lists U.S. weapons system designs compromised by CyberspiesWashington PostMay 27, 2013
LOCKHEED BREACH - UNPRECEDENTED IP THEFT
“The [malware] sample with the Sony computer names in it was designed to systematically connect to each server on the list. ‘It contains a user name and password and a list of internal systems and it connects to each of them and wipes the hard drives.”Jaime Blasco, AlienVault
Sony Got Hacked Hard: What We Know and Don’t Know So FarKIM ZETTER WiredDecember 2, 2014
Source: Sony Got Hacked Hard: What We Know and Don’t Know So Far, Kim Zetter, Wired Magazine, December 3, 2014
SONY BREACH - EXTRAORDINARY DAMAGE
Source: Hackers Threaten Sony Employees in New Email: ‘Your Family Will Be in Danger’, Dave McNary, MSN, December 5, 2014. Image: G. Hodan
Sony Hackers Threaten 9/11 Attack on Movie TheatersBRENT LANG Variety December 5, 2014
“The world will be full of fear, remember the 11th of September 2001. We recommend you to keep yourself distant from the places at that time.”
SONY BREACH – ADDING TERROR TO PLAYBOOK
THE EVOLUTION OF ATTACKS
Volume and ImpactScript Kiddies
BLASTER, SLAMMERMotive: Mischief
2003-2004
THE EVOLUTION OF ATTACKS2005-PRESENT
Organized CrimeRANSOMWARE, CLICK-FRAUD, IDENTITY THEFT
Motive: ProfitScript Kiddies
BLASTER, SLAMMERMotive: Mischief
2003-2004
THE EVOLUTION OF ATTACKS2005-PRESENT
Organized CrimeRANSOMWARE, CLICK-FRAUD, IDENTITY THEFT
Motive: ProfitScript Kiddies
BLASTER, SLAMMERMotive: Mischief
2012 - Beyond
Nation States, Activists, Terror GroupsBRAZEN, COMPLEX, PERSISTENTMotives:IP Theft,Damage,Disruption
2003-2004
DEFENDING AGAINST MODERN SECURITY THREATSSECURED DEVICES SECURED IDENTITIES
INFORMATIONPROTECTIONTHREAT RESISTANCE
DEVICE ENCRYPTIONBitLocker
Devices can be encrypted out-of-box with BitLocker
Easiest deployment, leading security, reliability, and performanceSingle sign-on for modern devices and configurable Windows 7 hardwareEnterprise grade management (MBAM) and compliance (FIPS)
Increased global acceptance of TPM TPM pervasive on Windows devices by end 2015
Next Generation CredentialsBreach, theft, and phish proofingTwo-factor authentication
INTRODUCING MICROSOFT PASSPORT DEVICE-BASED MULTI-FACTOR
UTILIZE FAMILIAR DEVICESSECURED BY HARDWARE
USER CREDENTIAL
An asymmetrical key pairProvisioned via PKI or created locally via Windows 10
MULTIFACTOR WITH EXISTING DEVICESSIMPLIFYING DEPLOYMENT
IDPActive DirectoryAzure ADGoogleFacebookMicrosoft Account
1
User2
Windows10
3IntranetResource 4
4IntranetResource
A NEW APPROACH
PINSimplest implementation optionNo hardware dependenciesUser familiarityWindows Hello Higher securityEase of useImpossible to forgetFingerprint, Facial, Iris
ACCESSING CREDENTIALS
Sample design, UI not final
DEVICE PROTECTION DATA SEPARATION LEAK PROTECTION SHARING PROTECTIONContainmentBYOD separation
DATA SEPARATIONPrevent unauthorized apps from accessing data
LEAK PROTECTION
INTRODUCINGEnterprise Data Protection
A DIFFERENT APPROACH
Corporate vs personal data identifiable wherever it rests on the device
Protects data at rest, and wherever it rests or may roam toSeamless integration into the platform, No mode switching and use any app
Prevents unauthorized apps from accessing business dataIT has fully control of keys and data and can remote wipe data on demandCommon experience across all Windows 10 devices with cross platform support
Annual Report Draft 1ContosoPersonal
2014 total return has increased significantly, outperforming both the S&P 500 and NASDAQ indices.
Britta Simon
“HARD” BLOCK OPTION
Britta SimonWARNING!Pasting content from a corporate document to a public location is not allowed.
OK
“HARD” BLOCK OPTION
2014 total return has increased significantly, outperforming both the S&P 500 and NASDAQ indices.
Britta Simon
“SOFT” BLOCK OPTION
Britta Simon
WARNING!You are about to paste content from a corporate document to a public domain.To continue, tell us why you are doing this.
Paste anywayCancelCancel
“SOFT” BLOCK OPTION
HARDWARE ROOTED TRUSTTWO-FACTOR FOR EVERYONEDATA LOSS PREVENTION
ACTIVE THEAT PROTECTIONSECURED DEVICES SECURED IDENTITIES
INFORMATIONPROTECTIONTHREAT RESISTANCE
Managed for continuous innovation
Wipe-and-LoadTraditional process• Capture data and settings• Deploy (custom) OS image• Inject drivers• Install apps• Restore data and settingsStill an option for all scenarios
In-PlaceLet Windows do the work• Preserve all data, settings, apps, drivers• Install (standard) OS image• Restore everything
Recommended for existing devices (Windows 7/8/8.1)
ProvisioningConfigure new devices• Transform into an Enterprise device• Remove extra items, add organizational apps and config
New capability for new devices
• Supported with Windows 7, Windows 8, and Windows 8.1• Consumers use Windows Update, but enterprises want more control• Use System Center Configuration Manager or MDT for managing the process• Uses the standard Windows 10 image• Automatically preserves existing apps, settings, and drivers• Fast and reliable, with automatic roll-back if issues are encountered
• Popular for Windows 8 to Windows 8.1• Piloted process with a customer to upgrade from Windows 7 to Windows 8.1, as a learning process• Feedback integrated into Windows 10 to provide additional capabilities for automation, drivers, logging, etc.• Working with ISVs for disk encryption
Preferred option for enterprises Simplified process, builds on prior experience
• Place partner logo and/or Microsoft Partner Program logo here
*Conceptual illustration only
Current Branch for BusinessCurrent BranchMicrosoftInsider Preview BranchBroad Microsoft internal validation
Engineering builds
Customer Internal Ring I Customer Internal Ring II Customer Internal Ring III Customer Internal Ring IV
Users10’s of thousands Several Million
Hundredsof millions
Long Term Servicing Branch
Deploy for mission critical systems via WSUS
Windows Insider Preview Branch
Specific feature and performance feedbackApplication compatibility validation
Customer journeyOngoing engineering development
Feedback and asks Stage broad deployment via WU for Business
Current Branch for Business
Deploy to appropriate audiences via WU for BusinessTest and prepare for broad deployment
Current Branch
Delivery of UpdatesWindows 10 Desktop EditionsEdition BenefitsHomeConsumers & BYOD
• Familiar and personal experience• All-new browser great for doing things online• New ways to get organized and be productive• Up-to-date with latest security and features• Management for BYOD scenarios
ProSmall, lower mid-size businesses
• Management of devices and apps• Support for remote and mobile scenarios • Cloud technologies for organizations • Update quality confidence with broad market validation
Enterprise2Mid-size and large enterprises
• Advanced security• Full flexibility of OS deployment• Advanced device and app management• Microsoft Desktop Optimization Pack (MDOP)
1. For qualified Windows 7/8.1 devices2. Some of these benefits require Software Assurance
Path to buy• OEM• Retail/ESD• Free upgrade1
• OEM• Retail/ESD• VL• Free upgrade1
• VL
Deployment Options• Windows Update • Current Branch
• Windows Update• Windows Update for Business• WSUS
• Current Branch• Current Branch for Business
• Windows Update• Windows Update for Business• WSUS
• Current Branch• Current Branch for Business• Long Term Servicing Branch
“The bottom line? Microsoft is going to bend over backwards to make the business transition to Windows 10 as easy as possible.”
“Windows as a Service makes Windows 10 the most attractive development platform ever.” Paul ThurrottThurrott.comMark HartmanPC World