Secure Collaboration
PresenterTitleDate
Business Ready Security Solutions
Agenda
• Business and IT Challenges
• Business Ready Security
• Secure Collaboration
• Customer Testimonial
• The Road Ahead
• Solution Resources and Tools
• Summary
Difficulty in extending business
resources
Increasing volume of sensitive
information
Financially motivated evolving
threats
Multiple locations and devices
Business Needs and IT Challenges
Agility and Flexibility ControlBUSINESS Needs IT Needs
Prevent sensitive information from leaking
Provide secure access to
applications from anywhere
Simplify user experience for
collaboration
Protect from threats
Protect everywhere,access anywhere
Simplify the security experience,
manage compliance
Block
from:
Enable
Cost Value
Siloed Seamless
to:
Business Ready SecurityHelp securely enable business by managing risk and empowering people
Integrate and extendsecurity across the
enterprise
Highly Secure & Interoperable Platform
Identity
Business Ready Security Solutions
Information Protection
Identity and Access Management
Secure Messaging Secure EndpointSecure Collaboration
PROTECT everywhere
ACCESS anywhere
SIMPLIFY security,
MANAGE compliance
Enable more secure business collaboration from virtually anywhere and across devices,
while preventing unauthorized use of confidential information
INTEGRATE and
EXTEND security
Secure Collaboration
• Secure, seamless access
• Protect sensitive information in documents
• Best-in-class anti-malware
• Enterprise-wide visibility
• Easier partner management
• Deep Microsoft SharePoint and Office integration
• Standards-based interoperability
“Source: Easy, Integrated Solution Gives Workers Remote Access, Improved Productivity. Microsoft case study, July 2007 http://www.microsoft.com/emea/partnersolutionmarketplace/CaseStudyDetail.aspx?casestudyid=4000000405
Provide More Secure, Anywhere Access
• Simplified, always-on access
• Consolidated secure portal to simplify remote access
• Restricted, policy-based access to SharePoint
• Automatically secure sensitive documents with AD RMS
• Ensure only authorized usage through persistent policies
• Works online and offline, across organizations
• Restricts users from sharing inappropriate content
Protect Sensitive Information
“Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
Protect Documents from Malware
Automatic Engine Updates
Single Engine Multiple Engines
38 times faster response
Tom Booth, Sr. Collaboration Engineer
Eliminates single point of failure
An AV-Test of consumer antivirus products revealed:
On average, Forefront engine sets provided a response in 3.1 hours or less.
Single-engine vendors provided responses in 5 days, 4 days, and 6 days respectively.
“Source: SAS Gains Extranet Benefits with Confidence – Security Solution Makes it Easy. Microsoft case study, March 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201164
Enable Collaboration Across Organizations
“
• Ability to move seamlessly between applications
• Eliminate the need to manage external accounts
• Simplified and flexible claims-based federation
• Simplified partner on-boarding through administrative tools and wizards
Source: RSA: Microsoft Pushes 'Geneva' In War On Passwords. Information Week, April 2009. http://www.informationweek.com/news/security/app-security/showArticle.jhtml?articleID=216600105&pgno=2&queryText=
Simplified Management, Enterprise-Wide Visibility
“
• Manage information protection policies through SharePoint
• Information protection integrated into user workflow and processes
• Single console for managing SharePoint security across the enterprise
Source: Comprehensive Security Solution Provides Telecommunications Firm Stronger Protection. Microsoft case study, November 2007. www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid=4000000967
Sensitive information is sent via
e-mail since partners do not have
access to collaboration site
Malware on non-trusted
machines
Current SituationLimited collaboration impacts user productivity
Limited to no access
Limited to no access
Secure CollaborationSimple and easy
“
Provides on-demand identity management, collaboration, and supply
chain software solutions to the aerospace and defense industries
Customer TestimonialSecure collaboration for aerospace and defense firms
• Provide greater collaboration between companies
• Better meet changing regulatory requirements
• Protect confidential information
BUSINESS SITUATION
• Greater protection and easier access to information
• Improved regulatory compliance
• Cloud services
BENEFITS PROVIDEDSOLUTION
Source: Secure Collaboration for Aerospace and Defense Firms. Microsoft case study, April 2009. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000003996
Man
ag
em
en
tP
rote
ctio
n &
Acc
ess
Pla
tfo
rm
The Road Ahead
Subject to Change
Management Consoles
DirectAccess
Data Protection Using Rights Management Services
Application Server Protection
Operations Guides
Administrator Guides
Troubleshooting Guides
Hands-on Labs and VMs
Evaluation Guides
Proof of Concepts
Solution Resources and Tools
Architecture Planning and Design Guides
Infrastructure Planning Guide
Secure Remote Application Publishing
PROTECT everywhere
ACCESS anywhere
SIMPLIFY security,
MANAGE compliance
Enable more secure business collaboration from virtually anywhere and across devices,
while preventing unauthorized use of confidential information
INTEGRATE and
EXTEND security
Secure Collaboration
• Secure, seamless access
• Protect sensitive information in documents
• Best-in-class anti-malware
• Enterprise-wide visibility
• Easier partner management
• Deep Microsoft SharePoint and Office integration
• Standards-based interoperability
Learn more at: www.microsoft.com/forefront
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date ofthis presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Top Related