Threats Increased volume Current Solutions Business Landscape Increased regulatory and compliance pressure Product proliferation More connectivity and collaboration Greater sophistication Profit motivated Greater need for identity-based protection and access Greater IT choice; lower budgets Lack of integration High.

Download Report

Transcript Threats Increased volume Current Solutions Business Landscape Increased regulatory and compliance pressure Product proliferation More connectivity and collaboration Greater sophistication Profit motivated Greater need for identity-based protection and access Greater IT choice; lower budgets Lack of integration High.

Threats

Increased volume Greater sophistication Profit motivated

Business Landscape

Increased regulatory and compliance pressure More connectivity and collaboration Greater need for identity-based protection and access Greater IT choice; lower budgets

Current Solutions

Product proliferation Lack of integration High cost of ownership

Help securely enable business by managing risk and empowering people

Identity

Highly Secure & Interoperable Platform

Across on-premises & cloud

from:

Block Cost Siloed

to:

Enable Value Seamless

Secure Messaging Secure Collaboration Secure Endpoint Active Directory® Federation Services 2.0

Information Protection Identity and Access Management

“The tearing down of walls between businesses and the opening up of our information, processes and systems to outside parties – whether these are contractors, outsourcers, partners and customers. Nearly every enterprise I speak with is being asked to enable and foster secure collaboration with external entities. The massive uptake I see from clients using SharePoint in extranet scenarios is a testament to this.” – Neil Macdonald, VP & Gartner Fellow at Gartner

Six Trends That Will Further Reshape Information Security in 2010

Limited to no access Malware on non-trusted machines Sensitive information is sent via e-mail since partners do not have access to collaboration site Limited to no access

Enable more secure business collaboration from virtually anywhere and across devices, while preventing unauthorized use of confidential information

PROTECT

everywhere

ACCESS

anywhere

INTEGRATE

and

EXTEND

security

SIMPLIFY

security,

MANAGE

compliance • • Secure, seamless access Protect sensitive information in documents • Best-in-class anti-malware • Deep Microsoft SharePoint and Office integration • Standards-based interoperability • • Centralized management Improved visibility across business productivity application security

• • Simplified, always-on access Consolidated secure portal to simplify remote access • Restricted, policy-based access to SharePoint

Source:

Easy, Integrated Solution Gives Workers Remote Access, Improved Productivity

. Microsoft case study, July 2007 http://www.microsoft.com/emea/partnersolutionmarketplace/CaseStudyDetail.aspx?casestudyid=4000000405

• • • • Ability to move seamlessly between applications Eliminate the need to manage external accounts Simplified and flexible claims based federation Simplified partner on-boarding through administrative tools and wizards

Source: RSA:

Microsoft Pushes 'Geneva' In War On Passwords.

Information Week, April 2009. http://www.informationweek.com/news/security/app-security/showArticle.jhtml?articleID=216600105&pgno=2&queryText =

Multiple Engines Single Engine 38 times faster response An AV-Test of consumer antivirus products revealed:  On average, Forefront engine sets provided a response in Automatic Engine Updates  Single-engine vendors provided responses in 5 days, 4 days, and 6 days respectively. Eliminates single point of failure

Source: SAS Gains Extranet Benefits with Confidence – Security Solution Makes it Easy. Microsoft case study, March 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201164

• • • • Automatically secure sensitive documents with AD RMS Ensure only authorized usage through persistent policies Works online and offline, across organizations Restricts users from sharing inappropriate content

Source:

Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data

. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482

“Securing collaboration through SharePoint Server is the lifeline of our business operations. ”

Jonathan Wynn, Manager of Advanced Technology and Collaborative Services, Del Monte Foods

Del Monte Drives Growth with Secure Collaboration Solution

 Del Monte wanted to provide employees with controlled access to intranet resources, while enhancing the protection of sensitive corporate data. The company also wanted to gain real-time insight into the performance of its collaboration environment without the need to dedicate additional staff to health-monitoring tasks.  Del Monte upgraded to Microsoft Forefront Protection 2010 for SharePoint. Which combines advanced detection with ease of use on the management side.

   Increased collaboration, sharing and access to information Tighter control of business assets, including intellectual property Maximum operational flexibility through granular configuration

Products Shipped

        Forefront Protection 2010 for Exchange Server Forefront Online Protection for Exchange Forefront Protection 2010 for SharePoint Forefront Threat Management Gateway 2010 Forefront Unified Access Gateway 2010 Windows Identity Foundation Forefront Identity Manager 2010 AD Services in Windows Server 2008 R2

Customer Testimonials

“Because I can get a comprehensive security status update in minutes, I can quickly prioritize the issues I need to address and then move on to other tasks.”

Jonathan Wynn, Manager of Advanced Technology and Collaborative Services, Del Monte Foods Industry Endorsement

"Converging endpoint security and operations can improve an organization's overall security posture and efficiency. As security management overlaps with other IT functions, Microsoft's integration of Forefront Endpoint Protection and System Center Configuration Manager just makes sense.“

Chris Christiansen of analyst firm IDC puts Partner Growth

Active Directory® Services • Securely migrate to the cloud on your terms • Maximize your existing investments • Simplify management

Learn more about our solutions:

http://www.microsoft.com/forefront

Try our products:

http://www.microsoft.com/forefront/trial

www.microsoft.com/teched http://microsoft.com/technet www.microsoft.com/learning http://microsoft.com/msdn

Sign up for Tech·Ed 2011 and save $500 starting June 8 – June 31

st

http://northamerica.msteched.com/registration

You can also register at the North America 2011 kiosk located at registration Join us in Atlanta next year

Simplify user experience for collaboration Provide secure access to applications from anywhere Prevent sensitive information from leaking Protect from threats

BUSINESS Needs Agility

and

Flexibility

Difficulty in extending business resources Multiple location and devices Increasing volume of sensitive information Financially motivated evolving threats

IT Needs Control