PPT素材库合集
1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group
2H04
LC 1.5 Client Platform
Roll up of QFEs MPOP Additions Federation/Archiving Notification HA Additions
Longhorn
LC 2.0 Client Platform
Next generation of RTC experiences More coming!
Commerce Web Commerce
Commerce Data
Application Center
Commerce Data
Data
Data
Live Communications Client Roadmap
2003
LC 1.2 Client Platform
Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy management
Unhealthy Desktops
Health maintenance
Quarantined clients can be given access to resources to get healthy
Consultants Guests
Microsoft Business Solutions ERP Positioning
Smart Personal Objects
One-way network Information consumption
Windows® CE
Windows Mobile
Windows XP
Network Defense
From Home (VPN, Dial up) Health checkup
Project Management and Accounting ERP Primarily in US and Latin America
Guiding Principles
Productive Integrated Extensible
Short learning curve Minimal administrative overhead
Security Issues Today
At Risk
14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5
Add value to one-step Failover Clustering Expanded scripting support
Global ERP Multinationals Advanced manufacturers Mid-market ERP Rich out-of-the-box functionality
Mid-market ERP Typically customized for unique business processes
Complex document authoring, editing and active reading Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition API’s Centrino Solutions
Capable
Staging Architecture
Data entry Test
Cluster controller Cluster controller ACS Cluster
Application Center
ACS Cluster
Commerce Web Commerce
Application Center
Enterprise Deployment Update
Internet
Firewall
Crawl/Search Load Balanced Web Database Servers Offline Servers
Firewall
Infrastructure Servers
Firewall
Staging Servers
Tools integrated tightly Automates common tasks
Customizable for your process Integrates with 3rd party tools Remotely accessible Robust, secure, scalable
Smartphone
Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework mobile controls
Tablet PC
Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX contRule
The Soft Underbelly
90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8
Controls how Internet Zones can be accessed Use when in high security environments to control access to web applications
SQL Server 2005 Themes
Supportability & Quality Patch Solutions Enterprise Enhancements Unified & Flexible Administration Prevention, Readiness, Recovery Ease of use Patch Installs Patch in integrated step
IT checks “health” of client
Returning Laptops
Network Access Control
Clients who pass get network access Clients who do not pass are fixed or blocked (aka “quarantined”)
第一篇
区块篇
Mobile Device Solutions
Pocket PC and Pocket PC Phone
View and some data entry Integrated PDA with phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework mobile controls Intel Xscale Solutions
Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict
Implications
Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation File Sharing Piracy HR Issues Shareholder Suits