Разделы презентаций


Windows Security Capabilities and Tools

Jump Start AgendaModule 1: Today’s Threat LandscapeModule 2: Key Principles of SecurityModule 3: Understanding your enemy!Module 4: Phases of HackersLunch BreakModule 5: What motivates hackers?Module 6: Pass the HashModule

Слайды и текст этой презентации

Слайд 1Windows Security Capabilities and Tools

Windows Security Capabilities and Tools

Слайд 2 Jump Start Agenda
Module 1: Today’s Threat Landscape
Module 2:

Key Principles of Security
Module 3: Understanding your enemy!
Module 4: Phases

of Hackers
Lunch Break
Module 5: What motivates hackers?
Module 6: Pass the Hash
Module 7: Windows Security Capabilities and Tools
Jump Start AgendaModule 1: Today’s Threat LandscapeModule 2: Key Principles of SecurityModule 3: Understanding your

Слайд 3Module Insights
Examine how Windows 8.1 can help your organization protect

their data, people and processes.

Module InsightsExamine how Windows 8.1 can help your organization protect their data, people and processes.

Слайд 4BYOD is increasing the volume of devices that are connecting

to corporate resources
and they’re far less managed and often times

less secure than we’re used to.
BYOD is increasing the volume of devices that are connecting to corporate resourcesand they’re far less managed

Слайд 5and so we designed Windows 8.1 specifically to address these

big challenges.
And we offer capability that you can’t find in

any other platform.
and so we designed Windows 8.1 specifically to address these  big challenges.And we offer capability that

Слайд 6Microsoft Security Intelligence Report

Microsoft Security Intelligence Report

Слайд 7Windows 8.1 Security Investment Areas
Malware
Resistance
Information Protection




Trustworthy Hardware
Identity and Access Control

Windows 8.1 Security Investment AreasMalwareResistanceInformation ProtectionTrustworthy HardwareIdentity and  Access Control

Слайд 8Trustworthy Hardware
Unified Extensible Firmware Interface
A strong two factor option that

is cost effective and eliminates the challenge of physical options

Trusted

Platform Module
A stronger single factor option based on what you “are” instead of what you “know”

Modern Biometric Readers
Digital identities need to be harder to steal than the things we “know”

Trustworthy HardwareUnified Extensible Firmware InterfaceA strong two factor option that is cost effective and eliminates the challenge

Слайд 9Secure Boot

Secure Boot

Слайд 10Virtual Smartcards
A strong two factor option that is cost effective

and eliminates the challenge of physical options

Biometrics
A stronger single factor

option based on what you “are” instead of what you “know”

Theft Proof Identity
Digital identities need to be harder to steal than the things we “know”

Identity and Access Control

Virtual SmartcardsA strong two factor option that is cost effective and eliminates the challenge of physical optionsBiometricsA

Слайд 11Biometrics

Biometrics

Слайд 12Virtual Smart Card

Virtual Smart Card

Слайд 13Device Encryption
A strong two factor option that is cost effective

and eliminates the challenge of physical options

Data Revocation
Control access to

apps and data and wipe it on demand using Remote Business Data Removal

Safe Sharing
Classify, protect, and control the use of sensitive data. Share protected data B2B or even B2C

Information Protection

Device EncryptionA strong two factor option that is cost effective and eliminates the challenge of physical optionsData

Слайд 14Remote Business Data Removal

Remote Business Data Removal

Слайд 15AppLocker

AppLocker

Слайд 16Device Integrity
Tamper proofing rooted in hardware ensures Windows defenses start

with integrity

Online Safety
The internet is a hostile environment for devices.

We have the answers.

Trust But Verify
Remote device verification and remediation from the Microsoft Cloud or a Remote Attestation

Malware Resistance

Device IntegrityTamper proofing rooted in hardware ensures Windows defenses start with integrityOnline SafetyThe internet is a hostile

Слайд 17Provable PC Health
Client send periodic heartbeat with state data
Measured Boot
Action

Center Status
Cloud service consumes data and analyzes it
If issue is

detected cloud sends message to Client with remediation recommendation
Client responds to recommendation
Machine Remediation
Account Remediation

Windows Cloud Service

Windows Client

Analysis and Response

Machine
Remediation

Account
Remediation

Provable PC HealthClient send periodic heartbeat with state dataMeasured BootAction Center StatusCloud service consumes data and analyzes

Слайд 18More Cool Capabilities and Tools

More Cool Capabilities and Tools

Слайд 19Baseline Security Analyzer

Baseline Security Analyzer

Слайд 20Attack Surface Analyzer

Attack Surface Analyzer

Слайд 21So what people are saying?
“In a world where cyberwarfare and

espionage is becoming ever more prevalent, Windows 8 is exactly

what companies and governments need to shore up their security…”

Ziff Davis - Sebastian Anthony,
Senior Editor

“the security advances from XP to Windows 7 are leaps and bounds … the advancements from 7 to 8 is just as great.”

IOActive - Chris Valasec,
Director of Security Intelligence

“Use Windows 8 as an opportunity to rethink endpoint protection”

Forrester - Chris Sherman, Security and Risk Analyst

“Along with the developments taking place in MBAM, BitLocker has stepped up to meet security, usability and management requirements for organizations.“

Gartner - Mario De Boer Ph.D, Research Director

“Our telemetry data is showing that Windows 8 customers are experiencing 3X less malware infections than Windows 7 and 6.5X fewer infections than Windows XP. Windows RT and Windows Phone 8 are experiencing virtually no infections”

Microsoft - Tim Rains, Director Trustworthy Computing

So what people are saying?“In a world where cyberwarfare and espionage is becoming ever more prevalent, Windows

Слайд 22Key Takeaways

Key Takeaways

Слайд 23@ErdalOzkaya
@MiladPFE
Connect with the speakers!
http://erdalozkaya.com/
https://www.facebook.com/milad.aslaner

@ErdalOzkaya@MiladPFEConnect with the speakers!http://erdalozkaya.com/https://www.facebook.com/milad.aslaner

Слайд 24Deep technical content and free product evaluations
Hands-on deep technical labs
Free,

online, technical courses
Download Microsoft software trials today.
Find Hand On Labs.
Take

a free online course.

Technet.microsoft.com/evalcenter

Technet.microsoft.com/virtuallabs

microsoftvirtualacademy.com

At the TechNet Evaluation Center you can download free, trial versions of Microsoft software, with no feature limits. Dozens of trials are available – all at no cost.
Try Windows Server 2012 for up to 180 days. Download the Windows 8 Enterprise 90-day evaluation. Or try Windows Azure at no-cost for up to 90 days.

Microsoft Hands On Labs offer virtual environments that will take you through guided, technically deep product learning experience.
Learn at your own pace in labs that you can complete in 90 minutes or less. There is no complex setup or installation is required to use TechNet Virtual Labs.

Microsoft Virtual Academy provides free online training on the IT scenarios that are important to your company and your career.
Learn at your own pace and boost your IT skills with over 100 courses across more than 15 Microsoft technologies including Windows Server, Windows 8, Windows Azure, Office 365, virtualization, Windows Phone, and more.

TechNet Virtual Labs

Deep technical content and free product evaluationsHands-on deep technical labsFree, online,  technical coursesDownload Microsoft software trials

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика