PPT素材库合集

合集下载
相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Smart Personal Objects
One-way network Information consumption
Windows® CE
Windows Mobile
Windows XP
Network Defense
From Home (VPN, Dial up) Health checkup
1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group
Commerce Web Commerce
Commerce Data
Application Center
Commerce Data
Data
Data
Live Communications Client Roadmap
2003
LC 1.2 Client Platform
Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy management
IT checks “health” of client
Returning Laptops
Network Access Control
Clients who pass get network access Clients who do not pass are fixed or blocked (aka “quarantined”)
Notebook PC
Complex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework available Centrino Solutions
The Soft Underbelly
90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8
Implications
Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation File Sharing Piracy HR Issues Shareholder Suits
Customer Impact
Application Layer Attacks
Identity Theft
Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption
Runtime Servers
Database and Staging Servers
Indicates Staged Data Flow Business Users
Business Data Servers Test Servers
Development Servers
Corporate LAN – Internal Servers
Smartphone
Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework ASP.NET mobile controls
Tablet PC
Project Management and Accounting ERP Primarily in US and Latin America
Guiding Principles
Productive Integrated Extensible
Short learning curve Minimal administrative overhead
Capable
Staging Architecture
Data entry Test
Cluster controller Cluster controller ACS Cluster
Application Center
ACS Cluster
Commerce Web Commerce
Application Center
Unhealthy Desktops
Health maintenance
Quarantined clients can be given access to resources to get healthy
Consultants Guests
Microsoft Business Solutions ERP Positioning
第一篇
区块篇
Mobile Device Solutions
Pocket PC and Pocket PC Phone
View and some data entry Integrated PDA with phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale Solutions
Windows XP SP2
Block virus or malicious code at the “point of entry”
Communicate and collaborate in a more secure manner without sacrificing information worker productivity
Complex document authoring, editing and active reading Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition API’s Centrino Solutions
Add value to one-step Failover Clustering Expanded scripting support
Global ERP Multinationals Advanced manufacturers Mid-market ERP Rich out-of-the-box functionality
Mid-market ERP Typically customized for unique business processes
Types Of SRP Rules
Hash Rule

Certificate Rule


Compares the MD5 or SHAห้องสมุดไป่ตู้ hash of a file to the one attempted to be run Use when you want to allow/prohibit a certain version of a file from being run
Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX content
Path Rule

Internet Zone Rule
2H04
LC 1.5 Client Platform
Roll up of QFEs MPOP Additions Federation/Archiving Notification HA Additions
Longhorn
LC 2.0 Client Platform
Next generation of RTC experiences More coming!
Tools integrated tightly Automates common tasks
Customizable for your process Integrates with 3rd party tools Remotely accessible Robust, secure, scalable
Enterprise Deployment Update
Internet
Firewall
Crawl/Search Load Balanced Web Database Servers Offline Servers
Firewall
Infrastructure Servers
Firewall
Staging Servers
Controls how Internet Zones can be accessed Use when in high security environments to control access to web applications
SQL Server 2005 Themes
Supportability & Quality Patch Solutions Enterprise Enhancements Unified & Flexible Administration Prevention, Readiness, Recovery Ease of use Patch Installs Patch in integrated step
Security Issues Today
At Risk
14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5



Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict
相关文档
最新文档