SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Microsoft System Center 2012:
Delivering Better IT Management


Stu Fox
Microsoft NZ
Challenges to enabling Consumerization


         I want to use the      How can IT support
         device I prefer        and manage all
                                those devices?



         I want to connect to   How can IT provide
         people and be          access to apps and
         productive             data while maintaining
         anywhere, anytime      security?
Infrastructure Considerations


Management of               Devices  User
diverse devices               Corporate 
                               Consumer



Secure, anywhere
access to apps      Application       Security and Access
& data             Infrastructure
Device vs User, Corp vs Consumer

Shift from device centric to user centric   App Infrastructure   Security &
                                                                 Access




                        Applications
Device vs User, Corp vs Consumer

Shift from corporate owned only…                              App Infrastructure   Security &
                                                                                   Access

To supporting consumer owned devices
alongside corporate devices

          Corporate Owned       Consumer Owned     Consumer Owned
                                                    Not Compliant
           and Compliant         and Compliant     or Not Compliant


                                Secure access to
             Full Access         apps and data        No Access
Device vs User, Corp vs Consumer
                                                        App Infrastructure   Security &

Modern Security and Access Model                                             Access




                                                                       Email




                                   Secure the devices
               VPN
              Modern                                             Collaboration
                                   Secure the network
              Gateway
                                   Secure the data



                                                                      Virtual
   Internet             Intranet                                     Desktops
Paradigms for supporting Consumerization


Management of             Provide user-centric unified
diverse devices        management on premises and from
                                   the cloud



Secure, anywhere
                   Build an optimized     Apply end to end
access to apps
                       application       security and access
& data
                     infrastructure            models
Support management
How can Microsoft infrastructure   of diverse devices

                solutions help?    Provide secure, anywhere
                                   access to apps and data
Intelligent Infrastructure for Flexible
Workstyles
 Optimized application   Unified management     End to end security
     infrastructure      on-premises and from       and access
                               the cloud
Asset and Inventory
    Unified Management on
                              Settings Management
premises and from the cloud   Application Delivery
                              Cloud Management for Windows
Unified management on-

Unified Asset Inventory                                 premises and in the cloud




                     •   Licensing Management
                     •   Software Inventory
    Virtualization   •   Hardware Inventory
    Aware            •   User




                                  Exchange Active
   EAS Protocol                   Sync Connector
                                   • User
                                   • Hardware ID
                                   • Mobile Device OS
Unified management

Unified Settings Management               on-premises and in the cloud




   Windows
   Devices                                         (MDOP)


    Portable     • Policy Control
    Desktop      • Compliance Reporting



   Virtualized
   Desktops



                       Exchange Active
                       Sync Connector
   EAS-enabled         • PIN / Password
    Devices            • Remote Wipe
Unified management
   User-Centric Application Delivery                      on-premises and in the cloud




           Software
           Distribution


 RDS +                      •   User identity
RemoteFX                    •   App dependencies
                            •   Device types
                            •   Network characteristics
           Virtualization
           Aware
Demo
User-centric application
               delivery
Unified management

Cloud Management for Windows                                                     on-premises and in the cloud




   Windows
   Devices

                                Inventory
                                Settings          Application
                                                  Distribution
   Virtualized
   Desktops




   Other devices
                      Perform security and
                                                  Help secure PCs from       Deploy updates and line of
                       management tasks
                                                malware and virus threats      business applications
                   remotely from a web-based
                                                 with endpoint protection        through the cloud
                             console


                              Greater performance and security with the ability to upgrade
                                       to the latest and best version of Windows.
Demo
Windows Intune
AntiMalware
Modern Security and Access   System Integrity
                             and Device Encryption
Modern security

AntiMalware                                                                          and access




                           •   Management and Security
                               Convergence
                           •   Unified Infrastructure
                           •   User Centric Reporting
                           •   Automatic Settings Management




      Highly accurate            Consolidated tools,              A unified view of
   signatures along with           processes, and                 configuration and
    behavioral detection       infrastructure to create          security information
   techniques to protect         new efficiencies and          that makes it easier to
    against both known              lower desktop              identify and remediate
   and unknown threats.            ownership costs                  vulnerabilities
Modern security

System Integrity + Device Encryption                          and access




                                                             (MDOP)
    Datacenter security,
                                           • Provisioning
    image management
                                           • Deployment
    and backup
                                           • Recovery




    Device Encryption
                           EAS Connector
    Remote Wipe


                                           • OS Deployment
                                             with BitLocker
Demo
Antimalware and Settings Management
Intelligent Infrastructure for Flexible
Workstyles
 Optimized application   Unified management     End to end security
     infrastructure      on-premises and from       and access
                               the cloud
Paradigms for supporting Consumerization


Management of         Support management on premises
                      Unified device diversity, balancing
diverse devices         user needs and IT compliance
                             and from the cloud




Secure, anywhere       Efficient
                      Optimized           End Anywhere,
                                              to end security
access to apps        application
                      application              anytime,
                                          and access models
& data             management and
                    infrastructure          on any device
                   productive users
Device diversity supported




Consumerization of                  Productivity with secure,
IT                                  anytime, anywhere access
realized…

                     Implemented with Microsoft
                     Flexible Workstyle Solutions
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other
countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must
respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information
provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Contenu connexe

Tendances

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
Lilian Schaffer
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
Lilian Schaffer
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
Arrow ECS UK
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
Agora Group
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
Advantec Distribution
 

Tendances (20)

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM Solution
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 

En vedette

En vedette (13)

Social media emergency management in the cloud
Social media emergency management in the cloudSocial media emergency management in the cloud
Social media emergency management in the cloud
 
Intergen Dynamics Day '11 - GFC v2.0 presented by Bernard Hickey
Intergen Dynamics Day '11 - GFC v2.0 presented by Bernard HickeyIntergen Dynamics Day '11 - GFC v2.0 presented by Bernard Hickey
Intergen Dynamics Day '11 - GFC v2.0 presented by Bernard Hickey
 
An Update On IDC's Top 10 Predictions For 2008
An Update On IDC's Top 10 Predictions For 2008An Update On IDC's Top 10 Predictions For 2008
An Update On IDC's Top 10 Predictions For 2008
 
Cross Platform Mobile Development
Cross Platform Mobile DevelopmentCross Platform Mobile Development
Cross Platform Mobile Development
 
Dynamics Day 2013 Microsoft Dynamics CRM Tips and Tricks 45 in 45
Dynamics Day 2013 Microsoft Dynamics CRM Tips and Tricks 45 in 45Dynamics Day 2013 Microsoft Dynamics CRM Tips and Tricks 45 in 45
Dynamics Day 2013 Microsoft Dynamics CRM Tips and Tricks 45 in 45
 
Consumerisation and Commodity IT: Emerging Trends in Enterprise IT
Consumerisation and Commodity IT: Emerging Trends in Enterprise ITConsumerisation and Commodity IT: Emerging Trends in Enterprise IT
Consumerisation and Commodity IT: Emerging Trends in Enterprise IT
 
In the Know about Knowledge Management
In the Know about Knowledge ManagementIn the Know about Knowledge Management
In the Know about Knowledge Management
 
Producing Testable Requirements
Producing Testable RequirementsProducing Testable Requirements
Producing Testable Requirements
 
Introducing Microsoft SQL Server 2012
Introducing Microsoft SQL Server 2012Introducing Microsoft SQL Server 2012
Introducing Microsoft SQL Server 2012
 
Intergen - Dynamics in the Cloud
Intergen - Dynamics in the CloudIntergen - Dynamics in the Cloud
Intergen - Dynamics in the Cloud
 
Dynamics Day '11 - Business Intelligence Now and in the Future
Dynamics Day '11 - Business Intelligence Now and in the FutureDynamics Day '11 - Business Intelligence Now and in the Future
Dynamics Day '11 - Business Intelligence Now and in the Future
 
Dynamics Day 2012: Dynamics CRM case study - Young New Zealanders Foundation
Dynamics Day 2012: Dynamics CRM case study - Young New Zealanders FoundationDynamics Day 2012: Dynamics CRM case study - Young New Zealanders Foundation
Dynamics Day 2012: Dynamics CRM case study - Young New Zealanders Foundation
 
Dynamics Day 2013 AX 2012 Product Update and Roadmap
Dynamics Day 2013 AX 2012 Product Update and RoadmapDynamics Day 2013 AX 2012 Product Update and Roadmap
Dynamics Day 2013 AX 2012 Product Update and Roadmap
 

Similaire à Microsoft System Center 2012 Delivering better IT Management

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
F5 Networks
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
DirectReader
 

Similaire à Microsoft System Center 2012 Delivering better IT Management (20)

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
V mware view
V mware viewV mware view
V mware view
 

Plus de Intergen

Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
Intergen
 

Plus de Intergen (20)

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
 
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplace
 
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)
 
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
 
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
 
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journey
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformation
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterprise
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is here
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safe
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer Engagement
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important asset
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first look
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project Service
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Microsoft System Center 2012 Delivering better IT Management

  • 1. Microsoft System Center 2012: Delivering Better IT Management Stu Fox Microsoft NZ
  • 2.
  • 3. Challenges to enabling Consumerization I want to use the How can IT support device I prefer and manage all those devices? I want to connect to How can IT provide people and be access to apps and productive data while maintaining anywhere, anytime security?
  • 4. Infrastructure Considerations Management of Devices  User diverse devices Corporate  Consumer Secure, anywhere access to apps Application Security and Access & data Infrastructure
  • 5. Device vs User, Corp vs Consumer Shift from device centric to user centric App Infrastructure Security & Access Applications
  • 6. Device vs User, Corp vs Consumer Shift from corporate owned only… App Infrastructure Security & Access To supporting consumer owned devices alongside corporate devices Corporate Owned Consumer Owned Consumer Owned Not Compliant and Compliant and Compliant or Not Compliant Secure access to Full Access apps and data No Access
  • 7. Device vs User, Corp vs Consumer App Infrastructure Security & Modern Security and Access Model Access Email Secure the devices VPN Modern Collaboration Secure the network Gateway Secure the data Virtual Internet Intranet Desktops
  • 8. Paradigms for supporting Consumerization Management of Provide user-centric unified diverse devices management on premises and from the cloud Secure, anywhere Build an optimized Apply end to end access to apps application security and access & data infrastructure models
  • 9. Support management How can Microsoft infrastructure of diverse devices solutions help? Provide secure, anywhere access to apps and data
  • 10. Intelligent Infrastructure for Flexible Workstyles Optimized application Unified management End to end security infrastructure on-premises and from and access the cloud
  • 11. Asset and Inventory Unified Management on Settings Management premises and from the cloud Application Delivery Cloud Management for Windows
  • 12. Unified management on- Unified Asset Inventory premises and in the cloud • Licensing Management • Software Inventory Virtualization • Hardware Inventory Aware • User Exchange Active EAS Protocol Sync Connector • User • Hardware ID • Mobile Device OS
  • 13. Unified management Unified Settings Management on-premises and in the cloud Windows Devices (MDOP) Portable • Policy Control Desktop • Compliance Reporting Virtualized Desktops Exchange Active Sync Connector EAS-enabled • PIN / Password Devices • Remote Wipe
  • 14. Unified management User-Centric Application Delivery on-premises and in the cloud Software Distribution RDS + • User identity RemoteFX • App dependencies • Device types • Network characteristics Virtualization Aware
  • 16. Unified management Cloud Management for Windows on-premises and in the cloud Windows Devices Inventory Settings Application Distribution Virtualized Desktops Other devices Perform security and Help secure PCs from Deploy updates and line of management tasks malware and virus threats business applications remotely from a web-based with endpoint protection through the cloud console Greater performance and security with the ability to upgrade to the latest and best version of Windows.
  • 18. AntiMalware Modern Security and Access System Integrity and Device Encryption
  • 19. Modern security AntiMalware and access • Management and Security Convergence • Unified Infrastructure • User Centric Reporting • Automatic Settings Management Highly accurate Consolidated tools, A unified view of signatures along with processes, and configuration and behavioral detection infrastructure to create security information techniques to protect new efficiencies and that makes it easier to against both known lower desktop identify and remediate and unknown threats. ownership costs vulnerabilities
  • 20. Modern security System Integrity + Device Encryption and access (MDOP) Datacenter security, • Provisioning image management • Deployment and backup • Recovery Device Encryption EAS Connector Remote Wipe • OS Deployment with BitLocker
  • 22. Intelligent Infrastructure for Flexible Workstyles Optimized application Unified management End to end security infrastructure on-premises and from and access the cloud
  • 23. Paradigms for supporting Consumerization Management of Support management on premises Unified device diversity, balancing diverse devices user needs and IT compliance and from the cloud Secure, anywhere Efficient Optimized End Anywhere, to end security access to apps application application anytime, and access models & data management and infrastructure on any device productive users
  • 24. Device diversity supported Consumerization of Productivity with secure, IT anytime, anywhere access realized… Implemented with Microsoft Flexible Workstyle Solutions
  • 25. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.