SlideShare une entreprise Scribd logo
1  sur  37
Saying Yes to Consumerization
Life and Work are Becoming Indistinguishable At home… At work… And anywhere in between
Challenges How do I… Address the work/life blur? Ensure anywhere productivity? Protect data and maintain compliance? Handle PC and device management?
Unmanaged Devices Have Hidden Costs Business Risks Theft Security Privacy Corporate and government regulatory compliance Intellectual property (IP) protection IT Challenges Unknown patched state Unknown application vendors Unknown application compatibility Complexity to access corporate data Unique management requirements for each device
Consider the Essentials Create the Conditions for Success. How will you control access to sensitive data? How will you manage data backup/restore? DATA How will you deliver business applications?  How will you support compliance reporting? APPS Who owns the IP on the device? Who fixes the device if it breaks? OS/HW How will you enforce network security? NETWORK
Understand Principles to Enable Consumerization Access to CorporateInformation based on: Who you are Read, Read/Write, Full Access How much you trust the device Unmanaged, Managed, Partially Managed Where the device is Corporate network Internet Untrusted network
Evaluate Enabling Technologies Enabling Technologies Can Help.  Virtualization CloudComputing EnterpriseManagement Terminal ServerComputing Support User Choice Manage the Essentials
Using Technology to Enable Consumerization Isolate Devices and Data Server andDomainIsolation (IPSec) Network AccessProtection (NAP) Rights Management Service Access toCorporateApplications Unified AccessGateway (UAG) Terminal ServerAccess Gateway (TSG) Virtual Desktop Infrastructure (VDI) Enforce Policy Password Policy Remote Wipe Authorized Device 1 2 3
Enforce Policy 1
SCCM 2012: Mobile Device Management Through Exchange Provide basic management for all Exchange ActiveSync (EAS) connected devices Features Supported: Discovery/Inventory Settings policy Remote Wipe Supports on-premises Exchange 2010 and hosted Exchange
Announcing: SCCM 2012 . ‘Light’ Management support EAS Based policy delivery Support includes: Discovery/Inventory Settings policy Remote Wipe
DemoSCCM 2012 Beta Device Management
Isolate Devices and Data 2
Servers withSensitive Data ServerIsolation HR Workstation ManagedComputer ManagedComputer Domain Isolation Isolate: IPSec Server and Domain Isolation Define the logical isolation boundaries Distribute policiesand credentials Managed computerscan communicate Block inbound connectionsfrom untrusted Enable tiered-accessto sensitive resources Active DirectoryDomain Controller CorporateNetwork Resource Server X Unmanaged X Untrusted
Isolate: Network Access Protection Policy Serverse.g., Patch, AV 1 1 Access requested Health state sent to NPS (RADIUS) NPS validates against health policy If compliant, access granted If not compliant, restricted network access and remediation Microsoft NPS 3 2 Remediation Serverse.g., Patch 5 Not policy compliant 2 3 RestrictedNetwork 4 Policy compliant DCHP, VPN Switch/Router Corporate Network 5 4
NAP Demo
Data Isolation: Rights Mgmt Server 1.	Author receives a client licensor certificate the“first time” they rights-protect information  Active Directory SQL Server 2.	Author defines a set of usage rights and rules for their file; Application creates a “Publish License”and encrypts the file Windows Server running RMS 3 3.	Author distributes file 4 1 5 4.	Recipient clicks file to open, the RMS-enabled application calls to the RMS server which validates the user and issues a “Use License.” 2 3 5.	The RMS-enabled application renders file and enforces rights Author using Office The Recipient
Isolation Technologies: OS Support
Access to Corporate Applications 3
Two Ways To Provide Access from Unmanaged Devices Data Center/Corporate Network Internet
Forefront Unified Access Gateway Exchange CRM SharePoint IIS based IBM, SAP, Oracle Mobile UAG Home/Friend/KioskRead Only Access HTTPS / HTTP TS/RDS HTTPS (443) Internet Direct Access Non web Authentication End-point health detection Enterprise Readiness Edge Ready Information Leakage Prevention Non-Windows Business Partners/Subcontractors Read/Write only to subset of sites on SharePoint AD, ADFS, RADIUS, LDAP… Data Center/Corporate Network Employees Managed Machines Full Access only to sites defined User role
RDS via Remote Desktop GatewayRemote access to internal server resources Internet DMZ Corp LAN ExternalFirewall InternalFirewall Terminal Server Home Terminal Server Internet HTTPS/443 Hotel Terminal ServicesGateway Server E-mail Server Business Partner/Client Site
Server Hosted Virtual DesktopsVirtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktop Technology from Microsoft-Citrix Windows desktop and session deliveryon-demand Description Personalized desktops hosted in datacenter Integrated Management with SC, Application Virtualization and RDS CAL Desktop Virtualization platform (hypervisor) Full-fidelity user experience over LAN and WAN Lightweight, universal software client  Self-service 'storefront' for enterprise applications Better Together Key Considerations Access desktop, applications, data on any device, anywhere  Best user experience on LAN or WAN Integrated desktop management IT Investments in server, management, storage, and network infrastructure Unified, centralizedmanagement of physical and virtual environments User/VM Density Business continuity User Flexibility of access  User Experience (personalization, graphics) Performance & Scalability is best in class (over LAN, WAN) Our Advantage Best in class technologies combined to provide most comprehensive and most Cost Effective solution Most scalable with Hyper-V and Sessions Better User Experience than PCoIP Single Management Console for physical and virtual assets
Extending Virtualization to Unmanaged Devices:Citrix Receiver Smartphones Leverage Windows, iOS, Android, RIM deviceswith universal client Access your VDI Desktop or Remote PC  Self-service installation and auto-updates PCs Thin and Diskless PCs Tablets
Demo: Citrix VDI Access
Access Technologies OS Support
Using Technology to Enable Consumerization Isolate Devicesand Data Access toCorporateApplications Enforce Policy 1 2 3
Microsoft Windows 7 Commercial SlateStrategy and roadmap
Windows Slate Common Questions	 ,[object Object]
Why not use a phone OS on a tablet?
Do I need to buy all new devices?
The best is yet to come… why?,[object Object]
Why Windows 7: This is What Enterprise Customers Are Telling Us Is ImportantTo Them
Hardware InnovationsOptimize Windows Slates SSD drives for Rapid boot up and Fast System responsiveness Intel Oaktrail Chipset enabling 8–10 hour battery life on Slates Working with OEMs to optimize system speed and performance Windows 7 trigger start services Rapid wake from sleep delivers “instant on”
Working with ISVs to deliver Touch Appsfor Windows 7 Published developer guidance for touch on Windows 7 Immersive Consumer Apps on Windows Product Scout Working with Enterprise ISVs to develop Enterprise Touch Apps
Windows Slates Connect to Your Devices Devices at home  Devices at Work Devices for VerticalUse Cases
DemoWindows 7 Slate PC Immersive Consumer Apps: USA Today, Kindle, andMosaic Apps Rich Enterprise Content Creation with Pen Support:Office and OneNote Ink Support Video Conferencing and Data Sharing with Microsoft Lync Windows 7 Handwriting Recognition Broad Device Support

Contenu connexe

Tendances

Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1) Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1) Ivanti
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance InfographicKenn Peterson
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suiteAli Mkahal
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6jasonlan
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Windows 7 Features & Demos
Windows 7 Features & DemosWindows 7 Features & Demos
Windows 7 Features & DemosAmit Gatenyo
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHappiest Minds Technologies
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
New Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareNew Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareArrow ECS UK
 

Tendances (20)

Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1) Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1)
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance Infographic
 
Happiest Minds
Happiest MindsHappiest Minds
Happiest Minds
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Windows 7 Features & Demos
Windows 7 Features & DemosWindows 7 Features & Demos
Windows 7 Features & Demos
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
New Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMwareNew Horizons for End-User Computing Event - VMware
New Horizons for End-User Computing Event - VMware
 

Similaire à Consumerization

Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization servicesAditi Shrivastava
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessRobert Crane
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 

Similaire à Consumerization (20)

Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Canada Windows 7 Tour
Canada Windows 7 TourCanada Windows 7 Tour
Canada Windows 7 Tour
 
silambarasan doc-1 (1)
silambarasan doc-1 (1)silambarasan doc-1 (1)
silambarasan doc-1 (1)
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
Smbtechedge
SmbtechedgeSmbtechedge
Smbtechedge
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 Business
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Sanjeev Kumar
Sanjeev KumarSanjeev Kumar
Sanjeev Kumar
 

Plus de Stephen Rose

Planning customizing office 2010 for your environment online
Planning  customizing office 2010 for your environment onlinePlanning  customizing office 2010 for your environment online
Planning customizing office 2010 for your environment onlineStephen Rose
 
Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deploymentStephen Rose
 
Office 2010 for IT Pros
Office 2010 for IT ProsOffice 2010 for IT Pros
Office 2010 for IT ProsStephen Rose
 
Desktop management and support
Desktop management and supportDesktop management and support
Desktop management and supportStephen Rose
 
Deploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VDeploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VStephen Rose
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityStephen Rose
 
Office 2010 For IT Pros
Office 2010 For IT ProsOffice 2010 For IT Pros
Office 2010 For IT ProsStephen Rose
 
MedV/AppV Overview
MedV/AppV OverviewMedV/AppV Overview
MedV/AppV OverviewStephen Rose
 
Born To Learn Certification Final
Born To Learn Certification FinalBorn To Learn Certification Final
Born To Learn Certification FinalStephen Rose
 
XP to Windows 7 with MDT
XP to Windows 7 with MDTXP to Windows 7 with MDT
XP to Windows 7 with MDTStephen Rose
 
Troubleshooting SQL Server
Troubleshooting SQL ServerTroubleshooting SQL Server
Troubleshooting SQL ServerStephen Rose
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalStephen Rose
 

Plus de Stephen Rose (13)

Planning customizing office 2010 for your environment online
Planning  customizing office 2010 for your environment onlinePlanning  customizing office 2010 for your environment online
Planning customizing office 2010 for your environment online
 
MDOP 2011
MDOP 2011MDOP 2011
MDOP 2011
 
Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deployment
 
Office 2010 for IT Pros
Office 2010 for IT ProsOffice 2010 for IT Pros
Office 2010 for IT Pros
 
Desktop management and support
Desktop management and supportDesktop management and support
Desktop management and support
 
Deploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VDeploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2V
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
 
Office 2010 For IT Pros
Office 2010 For IT ProsOffice 2010 For IT Pros
Office 2010 For IT Pros
 
MedV/AppV Overview
MedV/AppV OverviewMedV/AppV Overview
MedV/AppV Overview
 
Born To Learn Certification Final
Born To Learn Certification FinalBorn To Learn Certification Final
Born To Learn Certification Final
 
XP to Windows 7 with MDT
XP to Windows 7 with MDTXP to Windows 7 with MDT
XP to Windows 7 with MDT
 
Troubleshooting SQL Server
Troubleshooting SQL ServerTroubleshooting SQL Server
Troubleshooting SQL Server
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 

Dernier

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Dernier (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Consumerization

  • 1. Saying Yes to Consumerization
  • 2. Life and Work are Becoming Indistinguishable At home… At work… And anywhere in between
  • 3. Challenges How do I… Address the work/life blur? Ensure anywhere productivity? Protect data and maintain compliance? Handle PC and device management?
  • 4. Unmanaged Devices Have Hidden Costs Business Risks Theft Security Privacy Corporate and government regulatory compliance Intellectual property (IP) protection IT Challenges Unknown patched state Unknown application vendors Unknown application compatibility Complexity to access corporate data Unique management requirements for each device
  • 5. Consider the Essentials Create the Conditions for Success. How will you control access to sensitive data? How will you manage data backup/restore? DATA How will you deliver business applications? How will you support compliance reporting? APPS Who owns the IP on the device? Who fixes the device if it breaks? OS/HW How will you enforce network security? NETWORK
  • 6. Understand Principles to Enable Consumerization Access to CorporateInformation based on: Who you are Read, Read/Write, Full Access How much you trust the device Unmanaged, Managed, Partially Managed Where the device is Corporate network Internet Untrusted network
  • 7. Evaluate Enabling Technologies Enabling Technologies Can Help. Virtualization CloudComputing EnterpriseManagement Terminal ServerComputing Support User Choice Manage the Essentials
  • 8. Using Technology to Enable Consumerization Isolate Devices and Data Server andDomainIsolation (IPSec) Network AccessProtection (NAP) Rights Management Service Access toCorporateApplications Unified AccessGateway (UAG) Terminal ServerAccess Gateway (TSG) Virtual Desktop Infrastructure (VDI) Enforce Policy Password Policy Remote Wipe Authorized Device 1 2 3
  • 10. SCCM 2012: Mobile Device Management Through Exchange Provide basic management for all Exchange ActiveSync (EAS) connected devices Features Supported: Discovery/Inventory Settings policy Remote Wipe Supports on-premises Exchange 2010 and hosted Exchange
  • 11. Announcing: SCCM 2012 . ‘Light’ Management support EAS Based policy delivery Support includes: Discovery/Inventory Settings policy Remote Wipe
  • 12. DemoSCCM 2012 Beta Device Management
  • 14. Servers withSensitive Data ServerIsolation HR Workstation ManagedComputer ManagedComputer Domain Isolation Isolate: IPSec Server and Domain Isolation Define the logical isolation boundaries Distribute policiesand credentials Managed computerscan communicate Block inbound connectionsfrom untrusted Enable tiered-accessto sensitive resources Active DirectoryDomain Controller CorporateNetwork Resource Server X Unmanaged X Untrusted
  • 15. Isolate: Network Access Protection Policy Serverse.g., Patch, AV 1 1 Access requested Health state sent to NPS (RADIUS) NPS validates against health policy If compliant, access granted If not compliant, restricted network access and remediation Microsoft NPS 3 2 Remediation Serverse.g., Patch 5 Not policy compliant 2 3 RestrictedNetwork 4 Policy compliant DCHP, VPN Switch/Router Corporate Network 5 4
  • 17. Data Isolation: Rights Mgmt Server 1. Author receives a client licensor certificate the“first time” they rights-protect information Active Directory SQL Server 2. Author defines a set of usage rights and rules for their file; Application creates a “Publish License”and encrypts the file Windows Server running RMS 3 3. Author distributes file 4 1 5 4. Recipient clicks file to open, the RMS-enabled application calls to the RMS server which validates the user and issues a “Use License.” 2 3 5. The RMS-enabled application renders file and enforces rights Author using Office The Recipient
  • 19. Access to Corporate Applications 3
  • 20. Two Ways To Provide Access from Unmanaged Devices Data Center/Corporate Network Internet
  • 21. Forefront Unified Access Gateway Exchange CRM SharePoint IIS based IBM, SAP, Oracle Mobile UAG Home/Friend/KioskRead Only Access HTTPS / HTTP TS/RDS HTTPS (443) Internet Direct Access Non web Authentication End-point health detection Enterprise Readiness Edge Ready Information Leakage Prevention Non-Windows Business Partners/Subcontractors Read/Write only to subset of sites on SharePoint AD, ADFS, RADIUS, LDAP… Data Center/Corporate Network Employees Managed Machines Full Access only to sites defined User role
  • 22. RDS via Remote Desktop GatewayRemote access to internal server resources Internet DMZ Corp LAN ExternalFirewall InternalFirewall Terminal Server Home Terminal Server Internet HTTPS/443 Hotel Terminal ServicesGateway Server E-mail Server Business Partner/Client Site
  • 23. Server Hosted Virtual DesktopsVirtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktop Technology from Microsoft-Citrix Windows desktop and session deliveryon-demand Description Personalized desktops hosted in datacenter Integrated Management with SC, Application Virtualization and RDS CAL Desktop Virtualization platform (hypervisor) Full-fidelity user experience over LAN and WAN Lightweight, universal software client Self-service 'storefront' for enterprise applications Better Together Key Considerations Access desktop, applications, data on any device, anywhere Best user experience on LAN or WAN Integrated desktop management IT Investments in server, management, storage, and network infrastructure Unified, centralizedmanagement of physical and virtual environments User/VM Density Business continuity User Flexibility of access User Experience (personalization, graphics) Performance & Scalability is best in class (over LAN, WAN) Our Advantage Best in class technologies combined to provide most comprehensive and most Cost Effective solution Most scalable with Hyper-V and Sessions Better User Experience than PCoIP Single Management Console for physical and virtual assets
  • 24. Extending Virtualization to Unmanaged Devices:Citrix Receiver Smartphones Leverage Windows, iOS, Android, RIM deviceswith universal client Access your VDI Desktop or Remote PC Self-service installation and auto-updates PCs Thin and Diskless PCs Tablets
  • 27. Using Technology to Enable Consumerization Isolate Devicesand Data Access toCorporateApplications Enforce Policy 1 2 3
  • 28. Microsoft Windows 7 Commercial SlateStrategy and roadmap
  • 29.
  • 30. Why not use a phone OS on a tablet?
  • 31. Do I need to buy all new devices?
  • 32.
  • 33. Why Windows 7: This is What Enterprise Customers Are Telling Us Is ImportantTo Them
  • 34. Hardware InnovationsOptimize Windows Slates SSD drives for Rapid boot up and Fast System responsiveness Intel Oaktrail Chipset enabling 8–10 hour battery life on Slates Working with OEMs to optimize system speed and performance Windows 7 trigger start services Rapid wake from sleep delivers “instant on”
  • 35. Working with ISVs to deliver Touch Appsfor Windows 7 Published developer guidance for touch on Windows 7 Immersive Consumer Apps on Windows Product Scout Working with Enterprise ISVs to develop Enterprise Touch Apps
  • 36. Windows Slates Connect to Your Devices Devices at home Devices at Work Devices for VerticalUse Cases
  • 37. DemoWindows 7 Slate PC Immersive Consumer Apps: USA Today, Kindle, andMosaic Apps Rich Enterprise Content Creation with Pen Support:Office and OneNote Ink Support Video Conferencing and Data Sharing with Microsoft Lync Windows 7 Handwriting Recognition Broad Device Support
  • 38. Windows 7 Helps IT Embrace Consumerization Empowered End Users Data and Apps Devices Provide the choice of devices and form factors users desire Enable seamless collaboration through existing investments and infrastructure
  • 39. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notes de l'éditeur

  1. Key Point:We Can Help You Unleash the Potential of Consumerization.As consumers get their hands on smarter devices and applications, they are excited to bring these technologies to work and put them to good use. And they want you to support them. People are coming into work with much higher expectations of IT – they want better devices and applications, more options and freedom, and faster, uninterrupted service. These growing expectations are putting increasing pressure on IT to provide compelling solutions for their end users while maintaining a secure and well-managed environment. How can we help? Microsoft and Windows can help your business navigate these new realities of work – what many are calling the consumerization of IT. We can equip IT organizations with guidance on how to embrace and utilize consumerization responsibly, be your trusted advisor, and help you lead your business as you harness the potential of consumerization.OUTLINE OF THE PITCHSection 1:Consumerization – What is it? And why should you care? (slides 2-7)Approximate Time: 10 minSection 2: Guidance & Best Practices: Path to YES (slides 8-14)Approximate Time: 10 minSection 3: Why Microsoft? Why Windows? (slides 15-22)Approximate Time: 5 minSection 4: Specific Guidance – Windows BG (slides 23-31)Approximate Time: 20 minTotal Time: 45 min + Discussion
  2. Timing: 2 minutes Key Points:The ubiquitous and always-connected nature of today’s technology has made it possible to work from anywhere and to bring our personal lives into the workplace. The boundaries between work and home are blurring. Script:Technology has permeated every aspect of our lives. At home, it has become a tool for learning, for entertainment, and for social connections. At work, in particular for information workers, technology is the foundation for how we conduct business. And with constant connectivity regardless of location, it’s becoming impossible to separate the personal from the professional. At home, you might use your personal laptop to clear your work email or to put the finishing touches on a presentation and load it up to the company intranet after dinner. At work, you might arrange to meet a friend for drinks using instant messaging (IM), check out your colleague’s Facebook page, or help out with your kid’s homework by doing a little web research. In fact, according to a study that IDC recently conducted, between a third to more than a half of devices (including laptops, mobile phones, and smartphones) and web-based applications (including IM, professional social networks, and blogs) used in the workplace are used for both work and personal purposes. The days of the 8–5 workday, at least for the information worker, are essentially over. Today the lines between personal and professional have blurred, and we take both our personal and professional lives with us nearly everywhere we go. Additional Information:John Gantz, “A Consumer Revolution in the Enterprise” (sponsored by Unisys), IDC, June 2010, http://www.unisys.com/unisys/ri/report/detail.jsp?id=1120000970003910071
  3. Key Point: Many of companies today are experiencing consumerization in full force. Address the work/life blur?Ensure anywhere productivity?Protect data & maintain compliance?Streamline pc & device management?
  4. Timing: 2 minutes Key Points:There are hidden costs and risks in permitting the use of unmanaged devices to access internal resources and the corporate network. For the business, unmanaged devices present risks in terms of security, privacy, compliance, and intellectual property protection.For IT, unmanaged devices increase complexity and the management burden.  Script:There are huge potential productivity benefits with consumer technology, but this device proliferation also means that most enterprises now have numerous unmanaged devices being brought into the enterprise, trying to access the corporate network and confidential business resources. This presents some real challenges and risks:Business risks: Picture this scenario. Someone, let’s say an executive, needs to review the latest specifications for an innovative new product that’s about to launch or perhaps a highly confidential financial report. He or she is ready to leave the office for the day, and the perfect solution seems to be to put it on a slate to read later in the evening. But, worst case scenario, that slate never actually makes it home, because it gets lost in transit. Maybe it’s forgotten on the train or someone smashes the window of the executive’s car and steals it from the backseat. What do you do? Theft—and the consequent loss or exposure of sensitive information or confidential intellectual property (IP)—is a very real risk with unmanaged devices if they have no way to be encrypted, locked, and/or remotely wiped. And if that slate was a personal device, who is ultimately responsible for keeping that information secure and private? How are you preventing regulatory breaches?IT challenges: For IT, the challenges of device proliferation really come down to the added complexity of the IT environment. If a user has problems with a personal, unmanaged device being using for work purposes, he or she is likely to call the enterprise help desk for support, even if that device isn’t IT sanctioned. This raises new headaches for IT: If the device doesn’t have up-to-date patches, will it be stable? If the device has applications from an unknown or unverified vendor, how can they be sure there is no spyware? And will those applications introduce compatibility issues? How do they manage access to corporate information given these concerns? The more devices IT has to contend with, the more complicated and difficult it is to ensure the stability, performance, and security of those devices and the wider network. Regardless of what the device is, if it’s unmanaged, it poses some risks. We’re certainly not excluding Windows-based devices here. If an employee brings in a personal, unmanaged Windows-based tablet, you have no way of knowing whether it is compromised by spyware or infected with a virus that could put your other devices or your confidential business information at risk.
  5. Key Point: Next step is to create conditions for success by managing the essentials.DATAHow will you control access to sensitive data?How will you manage data backup/restore?APPSHow will you deliver business applications? How will you support compliance reporting?OS/HWWho owns the IP on the device?Who fixes the device if it breaks?NETWORKHow will you enforce network security?
  6. Key Point: Microsoft technologies such as desktop virtualization and cloud computing can help enable consumerization scenarios in a way that supports user choice and IT’s ability to manage and secure systemsMicrosoft server hosted Desktop Virtualization solutions offer the following potential benefits for users and IT:Simplify remote connectivity by enabling access to a rich desktop or web page or seamlessly integrated with a local desktopEnable flexible work scenarios such as hot-desking and work from homeDesktop environments centralized in the datacenter provide better business continuity and faster return to productivity for disaster recovery scenariosAccelerate and extend deployment of desktops and applications to a wide array of client devices, including clients on which the desktop operating system can’t run nativelyEnable rapid OS upgrades and patching by installing desktops only once in the data center and not locally on end point devicesWhen evaluating Desktop Virtualization technologies, enterprises can consider Remote Desktop Services (RDS) and Virtual Desktop Infrastructure (VDI). RDS provides session based desktops in the datacenter with higher scale and lower cost than VDI. VDI offers better user operating system isolation than RDS as well as better native application compatibility. VDI also provides the users with the ability to be admins of their own images. Cloud computing with Microsoft Windows InTuneoffers the following potential benefits for users and IT:Centrally manage the deployment of Microsoft updates and service packs to all PCsHelp protect PCs from malware threats with malware protection that can be managed from Web-based consoleReceive alerts on updates and threats to proactively identify and resolve problems with PCsResolve PC issues, regardless of location, with remote assistanceTrack hardware and software assets used in your businessCentrally manage update, firewall, and malware protection policies, even on remote machines outside corporate networkAs organizations evaluates technologies that enable them to embrace the reality of consumerization of IT, Microsoft offers a wide range of solutions to meet particular demands of users and IT.
  7. UAG application publishing: http://technet.microsoft.com/en-us/library/ee406221.aspxClient Health: http://blog.msedge.org.uk/
  8. Virtual Desktop Infrastructure (VDI): Another way to deliver the Windows desktopKey Messages:Best in class technologies combined to provide most comprehensive and most Cost Effective solution (See slide 17)Most scalable with Hyper-V and Sessions (See slide 18)Better User Experience than PCoIPSingle Management Console for physical and virtual assets (See Slide 24)Additional Resources:Telecom Italia VDI Case Study (Appendix)
  9. Any device, anywhere with Receiver™. Today’s digital workforce demands the flexibility to work from anywhere at any time using any device they’d like. Leveraging Citrix Receiver as a lightweight universal client, XenDesktop users can access their desktop and corporate applications from the latest tablets, smartphones, PCs, Macs, or thin client. This enables virtual workstyles, business continuity and user mobility. XenDesktop 5 includes new Citrix Receivers for all the latest tablets, smartphones, Macs and thin clients.
  10. Engineering and design guidance for slate PC apps -- http://code.msdn.microsoft.com/wintouchguideWindows Product Scout: http://www.microsoft.com/windows/product-scout/ ISV Engagement through ACE Framework