Presentation at Intergen's event: Delivering IT Performance across Devices, Data Centres and Clouds.
Understand how Microsoft System Center helps you to empower your people to use their devices and theapplications they need to be productive, while maintaining corporate compliance and control. How do you managethe influx of devices, of various shapes, sizes, ownership and provenance all while maintaining the compliance anddata protection needs of your enterprise?
3. Challenges to enabling Consumerization
I want to use the How can IT support
device I prefer and manage all
those devices?
I want to connect to How can IT provide
people and be access to apps and
productive data while maintaining
anywhere, anytime security?
4. Infrastructure Considerations
Management of Devices User
diverse devices Corporate
Consumer
Secure, anywhere
access to apps Application Security and Access
& data Infrastructure
5. Device vs User, Corp vs Consumer
Shift from device centric to user centric App Infrastructure Security &
Access
Applications
6. Device vs User, Corp vs Consumer
Shift from corporate owned only… App Infrastructure Security &
Access
To supporting consumer owned devices
alongside corporate devices
Corporate Owned Consumer Owned Consumer Owned
Not Compliant
and Compliant and Compliant or Not Compliant
Secure access to
Full Access apps and data No Access
7. Device vs User, Corp vs Consumer
App Infrastructure Security &
Modern Security and Access Model Access
Email
Secure the devices
VPN
Modern Collaboration
Secure the network
Gateway
Secure the data
Virtual
Internet Intranet Desktops
8. Paradigms for supporting Consumerization
Management of Provide user-centric unified
diverse devices management on premises and from
the cloud
Secure, anywhere
Build an optimized Apply end to end
access to apps
application security and access
& data
infrastructure models
9. Support management
How can Microsoft infrastructure of diverse devices
solutions help? Provide secure, anywhere
access to apps and data
10. Intelligent Infrastructure for Flexible
Workstyles
Optimized application Unified management End to end security
infrastructure on-premises and from and access
the cloud
11. Asset and Inventory
Unified Management on
Settings Management
premises and from the cloud Application Delivery
Cloud Management for Windows
12. Unified management on-
Unified Asset Inventory premises and in the cloud
• Licensing Management
• Software Inventory
Virtualization • Hardware Inventory
Aware • User
Exchange Active
EAS Protocol Sync Connector
• User
• Hardware ID
• Mobile Device OS
13. Unified management
Unified Settings Management on-premises and in the cloud
Windows
Devices (MDOP)
Portable • Policy Control
Desktop • Compliance Reporting
Virtualized
Desktops
Exchange Active
Sync Connector
EAS-enabled • PIN / Password
Devices • Remote Wipe
14. Unified management
User-Centric Application Delivery on-premises and in the cloud
Software
Distribution
RDS + • User identity
RemoteFX • App dependencies
• Device types
• Network characteristics
Virtualization
Aware
16. Unified management
Cloud Management for Windows on-premises and in the cloud
Windows
Devices
Inventory
Settings Application
Distribution
Virtualized
Desktops
Other devices
Perform security and
Help secure PCs from Deploy updates and line of
management tasks
malware and virus threats business applications
remotely from a web-based
with endpoint protection through the cloud
console
Greater performance and security with the ability to upgrade
to the latest and best version of Windows.
19. Modern security
AntiMalware and access
• Management and Security
Convergence
• Unified Infrastructure
• User Centric Reporting
• Automatic Settings Management
Highly accurate Consolidated tools, A unified view of
signatures along with processes, and configuration and
behavioral detection infrastructure to create security information
techniques to protect new efficiencies and that makes it easier to
against both known lower desktop identify and remediate
and unknown threats. ownership costs vulnerabilities
20. Modern security
System Integrity + Device Encryption and access
(MDOP)
Datacenter security,
• Provisioning
image management
• Deployment
and backup
• Recovery
Device Encryption
EAS Connector
Remote Wipe
• OS Deployment
with BitLocker
22. Intelligent Infrastructure for Flexible
Workstyles
Optimized application Unified management End to end security
infrastructure on-premises and from and access
the cloud
23. Paradigms for supporting Consumerization
Management of Support management on premises
Unified device diversity, balancing
diverse devices user needs and IT compliance
and from the cloud
Secure, anywhere Efficient
Optimized End Anywhere,
to end security
access to apps application
application anytime,
and access models
& data management and
infrastructure on any device
productive users