SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
© 2015 IBM Corporation
A Guide to Secure Mobility in the Enterprise
Chuck Brown
Product Management
IBM Security
Windows 10
Jimmy Tsang
Product Marketing
IBM Security
2© 2016 IBM Corporation
Housekeeping items
ü Duration – 60 minutes
ü Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
ü Recording and slides will be
emailed to you
3© 2016 IBM Corporation
Agenda
ü Windows overview & trends
ü Windows 10 highlights
ü MaaS360 support for Windows 10
ü Demo
ü Q&A
4© 2016 IBM Corporation
Poll results from May 2015
9%
85%
4%
2%
0%
Windows 8
Windows 7
Windows XP
Mac OS X
Other
0% 20% 40% 60% 80% 100%
What operating system is installed on
most of your laptops and desktops?
5© 2016 IBM Corporation
Microsoft OS ecosystem
6© 2016 IBM Corporation
Convergence of Windows
7© 2016 IBM Corporation
Windows 10
8© 2016 IBM Corporation
Current State of Affairs
§ Windows 10 generally available on July 29, 2015
§ “Free” upgrades to majority of devices except for Enterprise users
§ First 24 hours – 14 million installs
– At peak - Windows 10 was being installed on about 1500 machines per second
§ Adoption is accelerating: >40% of new Win10 devices since Black Friday
§ Microsoft expects 1 billion devices to be running Windows 10 in 3 years
14
110
200
0
50
100
150
200
250
Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15
Millions
Windows 10 Installs
9© 2016 IBM Corporation
Windows 10 Migration
§ Shifting in Week 5
§ Previous – moves
from W8/8.1
– W8/8.1 has
highest
dissatisfaction
among users
§ Now migrating
more from
Windows 7
http://www.networkworld.com/article/2985121/windows/windows-10-begins-to-eat-into-windows-7s-usage-
share.html?phint=newt%3Dnetworkworld_daily_news_alert&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242#tk.NWWNLE_nlt_daily_am_2015-09-
22&siteid=&phint=tpcs%3D&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242
10© 2016 IBM Corporation
Laptop and Desktop OS Market Share
NetMarketShare.com
§ Windows operating systems constitute ~ 91% of the total market share
§ Current Windows 10 market share is 9.96%
§ At 10% growth rate month on month – 20.81% market share by 2016 Q3
NetMarketShare.com
Windows 7
58%
Windows
XP
16%
Windows 8
15%
OS X
6%
Other
3%
Windows
Vista
2%
April 2015
Windows 7
56%
Windows
XP
11%
Windows 8
13%
OS X
7%
Other
2%
Windows
Vista
1% Windows 10
10%
December 2015
11© 2016 IBM Corporation
§ Microsoft has an API set across Windows 10 PC/Tablet and Mobile
– API set is an extension to Windows Phone 8.1
– No API sets on Windows 7
§ Mac OS X provides a set of management APIs similar to iOS.
– Apple is working on convergence of management API sets
Device and OS are Creating a Continuum
Code for one.
Reach them all.
12© 2016 IBM Corporation
Where Are We?
13© 2016 IBM Corporation
Configuration Service Provider Reference
§ Up-to-date list of API features for
Windows 10
§ https://msdn.microsoft.com/en-
us/library/windows/hardware/dn92002
5%28v=vs.85%29.aspx
14© 2016 IBM Corporation
7 Reasons to Open Up Windows 10
§ Convergence of Windows (Continuum)
§ Similar API set and policies on all devices
§ Build once use anywhere (Universal Apps)
§ Greater data and program security
§ Enlightened applications – Application management
§ Consistent workflow
§ Spartan/Edge browser
© 2015 IBM Corporation
Windows 10 Policies
16© 2016 IBM Corporation
Security Policies
17© 2016 IBM Corporation
Device Restrictions
18© 2016 IBM Corporation
Network Restrictions
19© 2016 IBM Corporation
Configure Trusted Certificates
20© 2016 IBM Corporation
ActiveSync Settings
© 2015 IBM Corporation
Windows 10 Actions
22© 2016 IBM Corporation
Windows 10 Actions
§ Locate
§ Selective Wipe
§ Wipe
§ Change Policy
* Support for real-time notifications for these actions
§ Remove Control
§ Hide
§ Request Data Refresh
© 2015 IBM Corporation
Additional Security Options
24© 2016 IBM Corporation
Enterprise Data Protection – The Device is the BIG Container
§ Encrypt enterprise data on employee- and corporate-owned devices
§ Remotely wipe enterprise data off managed devices w/o affecting
personal data
§ Privileged Apps
– Select specific apps that can access data
– Block non-privileged apps from accessing data
§ Employees not interrupted while switching between personal and
enterprise apps while security policies are in place.
§ AppLocker
– The AppLocker configuration service provider is used to specify which
applications are allowed or disallowed for enterprise data protection
https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx
25© 2016 IBM Corporation
Additional Security Options
§ BitLocker for Full Disk Encryption
– New Features
• Encrypt and recover your device with Azure Active Directory.
• DMA port protection. You can use
the DataProtection/AllowDirectMemoryAccess MDM policy to block DMA
ports when the device is starting up.
• New Group Policy for configuring pre-boot recovery.
§ Windows Defender included with the OS
– Anti-virus & Anti-malware
• Auto updates
• Have not receive glowing reviews – “Just good enough” ?
§ Backup & Recovery
– Native integration with OneDrive
26© 2016 IBM Corporation
Assigned Access – Kiosk Mode – Device Lockdown
§ Use Cases
– Device in the lobby that customers can use to view your product catalog
– Portable device that drivers can use to check a route on a map
– Device that a temporary worker uses to enter data
§ Configure a persistent locked down state to create a kiosk-type device.
When the locked-down account is logged on, the device displays only the
app that you select.
§ Configure a lockdown state that
takes effect when a given user
account logs on. The lockdown
restricts the user to only the apps
that you specify.
§ Lockdown settings can also be
configured for device look and feel,
such as a theme or a custom
layout on the Start screen
27© 2016 IBM Corporation
Edge Browser
§ Stops phishers before they cast their bait
– Edge aims to prevent phishing attacks through its Passport technology
– Instead of using a shareable password, Edge will authenticate securely to
applications, including websites and networks
§ Operates in a sandbox
– Internet Explorer was the browser was built directly into Windows
– If the browser was compromised,
your entire computer might be taken
down along with it
– Edge, on the other hand, will be a
universal app, constantly running
in a partial sandbox
§ Deactivates extensions, such as
ActiveX & VB
© 2015 IBM Corporation
Patching
29© 2016 IBM Corporation
Security Patching
§ Security patching is mandatory for all versions except Enterprise
– Management
– Automatic download and installation when device is connect to internet
– Peer to Peer sharing of patch distribution inside the LAN
– Updates/patches/fixes can be granularly controlled on the Enterprise edition
(have not seen that yet)
§ Patching Bundles
– Multiple line items (bulletins) now bundled into one package
• Do not have the ability to test each item
• http://www.computerworld.com/article/2969850/microsoft-windows/patch-bundles-are-
the-new-norm-for-windows-10.html
§ OS Upgrades
– 2 speeds – Fast and Slow ring
© 2015 IBM Corporation
Applications & Software
Distribution
31© 2016 IBM Corporation
Universal Applications, Store and Software Distribution
§ Build once – install on all devices
§ Multiple types of applications
– Win32 – “legacy” type of application
– APPX, App-V
§ Business Store for Applications
– Acquire and Distribute Applications
– Bulk Acquisition of Apps (Free and Paid)
– Application Management – reclaim/re-use licenses
– Similarities to iTunes App Store
§ Software Catalogs
– Need to have a self-directed app catalog, like iOS/Android
32© 2016 IBM Corporation
Third Party Software Distribution
§ Standard third party Windows software
– Google (Chrome), Adobe, Java
– Many have msi and APPX versions
– Updates still necessary
© 2015 IBM Corporation
Windows 10 Enrollment
34© 2016 IBM Corporation
Starting the Enrollment
§ Same standard process in MaaS360 for over-the-air enrollment
§ Enroll a device – receive the request
35© 2016 IBM Corporation
MDM Enrollment
§ Installing the Company Hub
§ Click Continue
36© 2016 IBM Corporation
MDM Enrollment
§ Enrolled successfully
§ Click Done
37© 2016 IBM Corporation
Poll Results from May 2015
5%
22%
22%
35%
17%
Within 6 months
6-12 months
12-18 months
18 months or longer
We don’t plan to upgrade to
Windows 10
0% 5% 10% 15% 20% 25% 30% 35% 40%
Based on what your organization knows today,
when does it plan to upgrade to Windows 10?
© 2015 IBM Corporation
Demo
39© 2016 IBM Corporation
Customer Value
§ Greatly simplifies workflows
§ Support all devices from one window
§ Actionable intelligence on or off network
§ Upgrades and new features/functions made available without end-user
installations
§ Silent service
– Does not disturb the productivity of the end user
40© 2016 IBM Corporation
Why Should I Care?
§ Consistent unified workflow and information across all device platforms
§ No on-site infrastructure needed to support laptops, desktops, tablets and
smartphones
§ Easy and fast to turn on
§ No heavy lifting for upgrades
41© 2016 IBM Corporation
Complete Mobility Management and Security
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
42© 2016 IBM Corporation
Seamless Enterprise Integration
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
BYOD
Corporate
Shared
Mail systems
Directories
Certificates
File shares
43© 2016 IBM Corporation
Platform for Strong Mobile Security
Mobile Threat
Management
Risk & Event
Detection
Unified Endpoint
Management
Mobile Identity
Management
Integrated
App Security
App
Vulnerability &
Reputation
Automated Policy Compliance
Encryption & Data Protection
Authentication & Restrictions
Containerization & App VPN
Device Quarantine & Wipe
44© 2016 IBM Corporation
Why IBM MaaS360?
Integrated
solutions that connect
seamlessly to your
existing and external
environments
Scalable
data security with
intelligence for the
volume, speed, and
variability of mobile
Complete
management of
devices, apps, content
and users from a
single platform
45© 2016 IBM Corporation
Get Started Right Now
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices, apps
and content
Easy
Set up and
configure your
service in minutes
1
2 3
Click here
http://trymaas360.agilly.net
And enjoy your 30 days free trial
46© 2016 IBM Corporation
Une	division	de	
www.agilly.net
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security

Contenu connexe

Tendances

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suiteAli Mkahal
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Jan Ketil Skanke
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversMicrosoft Education AU
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldMicrosoft Education AU
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationMicrosoft Education AU
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Microsoft Education AU
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
September 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know WebinarSeptember 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know WebinarRobert Crane
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessRobert Crane
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustMicrosoft Education AU
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"iGlobe
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanDavid J Rosenthal
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 

Tendances (20)

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the Covers
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD world
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
September 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know WebinarSeptember 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know Webinar
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 

Similaire à Windows 10 A Guide to Secure Mobility in the Enterprise

7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10AGILLY
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaFlexera
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Alexander Benoit
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleAGILLY
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...eG Innovations
 
Splashtop Business Access Datasheet
Splashtop Business Access DatasheetSplashtop Business Access Datasheet
Splashtop Business Access DatasheetSplashtop Inc
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2James Jara
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerGeorge Kanellopoulos
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityStephen Rose
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationmoldovaictsummit2016
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITProceed
 
MMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_FinalMMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_Finalmentvanderplas
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksRogue Wave Software
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionIBM Danmark
 
A301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoringA301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoringMichael Dawson
 

Similaire à Windows 10 A Guide to Secure Mobility in the Enterprise (20)

7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
 
Splashtop Business Access Datasheet
Splashtop Business Access DatasheetSplashtop Business Access Datasheet
Splashtop Business Access Datasheet
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform Installer
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformation
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
 
MMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_FinalMMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_Final
 
Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecks
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in Action
 
A301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoringA301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoring
 

Plus de Gerard Konan

AGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptxAGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptxGerard Konan
 
AGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptxAGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptxGerard Konan
 
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptxUtilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptxGerard Konan
 
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connectéUtilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connectéGerard Konan
 
Cyber mois 2021 comment eviter les cyber risques pour les pme
Cyber mois 2021   comment eviter les cyber risques pour les pmeCyber mois 2021   comment eviter les cyber risques pour les pme
Cyber mois 2021 comment eviter les cyber risques pour les pmeGerard Konan
 
Protection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne finalProtection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne finalGerard Konan
 
Préserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du DigitalPréserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du DigitalGerard Konan
 
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes PratiquesFAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes PratiquesGerard Konan
 
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des LieuxFAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des LieuxGerard Konan
 
Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017Gerard Konan
 
Introduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaSIntroduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaSGerard Konan
 
Le cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entrepriseLe cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entrepriseGerard Konan
 
Une Présentation sur l'Effectuation
Une Présentation sur l'EffectuationUne Présentation sur l'Effectuation
Une Présentation sur l'EffectuationGerard Konan
 
Gestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de SolutionsGestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de SolutionsGerard Konan
 
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYODIBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYODGerard Konan
 

Plus de Gerard Konan (15)

AGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptxAGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptx
 
AGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptxAGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptx
 
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptxUtilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
 
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connectéUtilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
 
Cyber mois 2021 comment eviter les cyber risques pour les pme
Cyber mois 2021   comment eviter les cyber risques pour les pmeCyber mois 2021   comment eviter les cyber risques pour les pme
Cyber mois 2021 comment eviter les cyber risques pour les pme
 
Protection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne finalProtection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne final
 
Préserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du DigitalPréserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du Digital
 
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes PratiquesFAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
 
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des LieuxFAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
 
Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017
 
Introduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaSIntroduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaS
 
Le cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entrepriseLe cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entreprise
 
Une Présentation sur l'Effectuation
Une Présentation sur l'EffectuationUne Présentation sur l'Effectuation
Une Présentation sur l'Effectuation
 
Gestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de SolutionsGestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de Solutions
 
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYODIBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
 

Dernier

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Dernier (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Windows 10 A Guide to Secure Mobility in the Enterprise

  • 1. © 2015 IBM Corporation A Guide to Secure Mobility in the Enterprise Chuck Brown Product Management IBM Security Windows 10 Jimmy Tsang Product Marketing IBM Security
  • 2. 2© 2016 IBM Corporation Housekeeping items ü Duration – 60 minutes ü Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen ü Recording and slides will be emailed to you
  • 3. 3© 2016 IBM Corporation Agenda ü Windows overview & trends ü Windows 10 highlights ü MaaS360 support for Windows 10 ü Demo ü Q&A
  • 4. 4© 2016 IBM Corporation Poll results from May 2015 9% 85% 4% 2% 0% Windows 8 Windows 7 Windows XP Mac OS X Other 0% 20% 40% 60% 80% 100% What operating system is installed on most of your laptops and desktops?
  • 5. 5© 2016 IBM Corporation Microsoft OS ecosystem
  • 6. 6© 2016 IBM Corporation Convergence of Windows
  • 7. 7© 2016 IBM Corporation Windows 10
  • 8. 8© 2016 IBM Corporation Current State of Affairs § Windows 10 generally available on July 29, 2015 § “Free” upgrades to majority of devices except for Enterprise users § First 24 hours – 14 million installs – At peak - Windows 10 was being installed on about 1500 machines per second § Adoption is accelerating: >40% of new Win10 devices since Black Friday § Microsoft expects 1 billion devices to be running Windows 10 in 3 years 14 110 200 0 50 100 150 200 250 Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15 Millions Windows 10 Installs
  • 9. 9© 2016 IBM Corporation Windows 10 Migration § Shifting in Week 5 § Previous – moves from W8/8.1 – W8/8.1 has highest dissatisfaction among users § Now migrating more from Windows 7 http://www.networkworld.com/article/2985121/windows/windows-10-begins-to-eat-into-windows-7s-usage- share.html?phint=newt%3Dnetworkworld_daily_news_alert&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242#tk.NWWNLE_nlt_daily_am_2015-09- 22&siteid=&phint=tpcs%3D&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242
  • 10. 10© 2016 IBM Corporation Laptop and Desktop OS Market Share NetMarketShare.com § Windows operating systems constitute ~ 91% of the total market share § Current Windows 10 market share is 9.96% § At 10% growth rate month on month – 20.81% market share by 2016 Q3 NetMarketShare.com Windows 7 58% Windows XP 16% Windows 8 15% OS X 6% Other 3% Windows Vista 2% April 2015 Windows 7 56% Windows XP 11% Windows 8 13% OS X 7% Other 2% Windows Vista 1% Windows 10 10% December 2015
  • 11. 11© 2016 IBM Corporation § Microsoft has an API set across Windows 10 PC/Tablet and Mobile – API set is an extension to Windows Phone 8.1 – No API sets on Windows 7 § Mac OS X provides a set of management APIs similar to iOS. – Apple is working on convergence of management API sets Device and OS are Creating a Continuum Code for one. Reach them all.
  • 12. 12© 2016 IBM Corporation Where Are We?
  • 13. 13© 2016 IBM Corporation Configuration Service Provider Reference § Up-to-date list of API features for Windows 10 § https://msdn.microsoft.com/en- us/library/windows/hardware/dn92002 5%28v=vs.85%29.aspx
  • 14. 14© 2016 IBM Corporation 7 Reasons to Open Up Windows 10 § Convergence of Windows (Continuum) § Similar API set and policies on all devices § Build once use anywhere (Universal Apps) § Greater data and program security § Enlightened applications – Application management § Consistent workflow § Spartan/Edge browser
  • 15. © 2015 IBM Corporation Windows 10 Policies
  • 16. 16© 2016 IBM Corporation Security Policies
  • 17. 17© 2016 IBM Corporation Device Restrictions
  • 18. 18© 2016 IBM Corporation Network Restrictions
  • 19. 19© 2016 IBM Corporation Configure Trusted Certificates
  • 20. 20© 2016 IBM Corporation ActiveSync Settings
  • 21. © 2015 IBM Corporation Windows 10 Actions
  • 22. 22© 2016 IBM Corporation Windows 10 Actions § Locate § Selective Wipe § Wipe § Change Policy * Support for real-time notifications for these actions § Remove Control § Hide § Request Data Refresh
  • 23. © 2015 IBM Corporation Additional Security Options
  • 24. 24© 2016 IBM Corporation Enterprise Data Protection – The Device is the BIG Container § Encrypt enterprise data on employee- and corporate-owned devices § Remotely wipe enterprise data off managed devices w/o affecting personal data § Privileged Apps – Select specific apps that can access data – Block non-privileged apps from accessing data § Employees not interrupted while switching between personal and enterprise apps while security policies are in place. § AppLocker – The AppLocker configuration service provider is used to specify which applications are allowed or disallowed for enterprise data protection https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx
  • 25. 25© 2016 IBM Corporation Additional Security Options § BitLocker for Full Disk Encryption – New Features • Encrypt and recover your device with Azure Active Directory. • DMA port protection. You can use the DataProtection/AllowDirectMemoryAccess MDM policy to block DMA ports when the device is starting up. • New Group Policy for configuring pre-boot recovery. § Windows Defender included with the OS – Anti-virus & Anti-malware • Auto updates • Have not receive glowing reviews – “Just good enough” ? § Backup & Recovery – Native integration with OneDrive
  • 26. 26© 2016 IBM Corporation Assigned Access – Kiosk Mode – Device Lockdown § Use Cases – Device in the lobby that customers can use to view your product catalog – Portable device that drivers can use to check a route on a map – Device that a temporary worker uses to enter data § Configure a persistent locked down state to create a kiosk-type device. When the locked-down account is logged on, the device displays only the app that you select. § Configure a lockdown state that takes effect when a given user account logs on. The lockdown restricts the user to only the apps that you specify. § Lockdown settings can also be configured for device look and feel, such as a theme or a custom layout on the Start screen
  • 27. 27© 2016 IBM Corporation Edge Browser § Stops phishers before they cast their bait – Edge aims to prevent phishing attacks through its Passport technology – Instead of using a shareable password, Edge will authenticate securely to applications, including websites and networks § Operates in a sandbox – Internet Explorer was the browser was built directly into Windows – If the browser was compromised, your entire computer might be taken down along with it – Edge, on the other hand, will be a universal app, constantly running in a partial sandbox § Deactivates extensions, such as ActiveX & VB
  • 28. © 2015 IBM Corporation Patching
  • 29. 29© 2016 IBM Corporation Security Patching § Security patching is mandatory for all versions except Enterprise – Management – Automatic download and installation when device is connect to internet – Peer to Peer sharing of patch distribution inside the LAN – Updates/patches/fixes can be granularly controlled on the Enterprise edition (have not seen that yet) § Patching Bundles – Multiple line items (bulletins) now bundled into one package • Do not have the ability to test each item • http://www.computerworld.com/article/2969850/microsoft-windows/patch-bundles-are- the-new-norm-for-windows-10.html § OS Upgrades – 2 speeds – Fast and Slow ring
  • 30. © 2015 IBM Corporation Applications & Software Distribution
  • 31. 31© 2016 IBM Corporation Universal Applications, Store and Software Distribution § Build once – install on all devices § Multiple types of applications – Win32 – “legacy” type of application – APPX, App-V § Business Store for Applications – Acquire and Distribute Applications – Bulk Acquisition of Apps (Free and Paid) – Application Management – reclaim/re-use licenses – Similarities to iTunes App Store § Software Catalogs – Need to have a self-directed app catalog, like iOS/Android
  • 32. 32© 2016 IBM Corporation Third Party Software Distribution § Standard third party Windows software – Google (Chrome), Adobe, Java – Many have msi and APPX versions – Updates still necessary
  • 33. © 2015 IBM Corporation Windows 10 Enrollment
  • 34. 34© 2016 IBM Corporation Starting the Enrollment § Same standard process in MaaS360 for over-the-air enrollment § Enroll a device – receive the request
  • 35. 35© 2016 IBM Corporation MDM Enrollment § Installing the Company Hub § Click Continue
  • 36. 36© 2016 IBM Corporation MDM Enrollment § Enrolled successfully § Click Done
  • 37. 37© 2016 IBM Corporation Poll Results from May 2015 5% 22% 22% 35% 17% Within 6 months 6-12 months 12-18 months 18 months or longer We don’t plan to upgrade to Windows 10 0% 5% 10% 15% 20% 25% 30% 35% 40% Based on what your organization knows today, when does it plan to upgrade to Windows 10?
  • 38. © 2015 IBM Corporation Demo
  • 39. 39© 2016 IBM Corporation Customer Value § Greatly simplifies workflows § Support all devices from one window § Actionable intelligence on or off network § Upgrades and new features/functions made available without end-user installations § Silent service – Does not disturb the productivity of the end user
  • 40. 40© 2016 IBM Corporation Why Should I Care? § Consistent unified workflow and information across all device platforms § No on-site infrastructure needed to support laptops, desktops, tablets and smartphones § Easy and fast to turn on § No heavy lifting for upgrades
  • 41. 41© 2016 IBM Corporation Complete Mobility Management and Security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access
  • 42. 42© 2016 IBM Corporation Seamless Enterprise Integration Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access BYOD Corporate Shared Mail systems Directories Certificates File shares
  • 43. 43© 2016 IBM Corporation Platform for Strong Mobile Security Mobile Threat Management Risk & Event Detection Unified Endpoint Management Mobile Identity Management Integrated App Security App Vulnerability & Reputation Automated Policy Compliance Encryption & Data Protection Authentication & Restrictions Containerization & App VPN Device Quarantine & Wipe
  • 44. 44© 2016 IBM Corporation Why IBM MaaS360? Integrated solutions that connect seamlessly to your existing and external environments Scalable data security with intelligence for the volume, speed, and variability of mobile Complete management of devices, apps, content and users from a single platform
  • 45. 45© 2016 IBM Corporation Get Started Right Now Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, apps and content Easy Set up and configure your service in minutes 1 2 3 Click here http://trymaas360.agilly.net And enjoy your 30 days free trial
  • 46. 46© 2016 IBM Corporation Une division de www.agilly.net
  • 47. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security