identity & security. today's it security challenges rising internal attacks 75% of...
TRANSCRIPT
Identity & Security
Today's IT Security challenges
Rising Internal Attacks• 75% of companies report insiders
responsible for breaches
• Growing headcount reductions increase risk of intentional theft of intellectual
property
New Threats & Increased Sophistication• New forms of malware up 750% in 2008
• Profit-based cybercrime $276M in 2008
Costly Data Breaches• Average cost of data breach is $202/record or
$6.6M per breach
Increased Regulatory Pressure • Requirements for automated controls & new privacy
regulations (CoCo, SOX, HIPAA etc.)
Shrinking IT Budgets• 2009 IT spending flat-to-negative
• More than 300,000 UK jobs to be shed in 2009
Need for Increased Access & Sharing
• 70% of workforce will connect to corporate networks via mobile devices within 4 years
Reduce Costs
Increase Productivity
Retain Customers
Grow Sales
Adapt to Change
Mitigate Risks
Sources: Various
Highly Secure & Interoperable Platform
Identity
Business Ready SecurityHelp securely enable business by managing risk and empowering people
Block
from:
Enable
Cost Value
Siloed Seamless
to:
Protect everywhere,access anywhere
Integrate and extendsecurity across the enterprise
Simplify the security experience, manage compliance
Identity & Security Solutions
Secure Messaging
& Collaboratio
n
Pro
duct
s&
Te
chnolo
gie
s
Solu
tions
ComprehensiveProtection
Secure Client &
Infrastructure
Information Protection
Identity Manageme
nt
Integrated Security
IntegratedInfrastructure
Simplified Management
Rights Management ServicesADDS, ADLDS, ADCS, ADFSBitLockerTM, Encrypting File
System, Applocker
Secure Messaging & CollaborationHelp secure IT infrastructure and information with a family of easy-to-manage technologies that provide integrated content and email protection, access control, information protection, and identity management
PROTECTION
PUBLISHING
PREVENTION
POLICY
PROVISION
Rights Management Services
Secure Client & InfrastructureHelp secure IT infrastructure and information with a family of easy-to-manage technologies that provide integrated security, access control, and information protection
PREVENTION
PROTECTION
Rights Management Services
BitLockerTM, Encrypting File System
Information ProtectionProtect information no matter where it is stored or where it goes, both within and outside organizational boundaries with a family of easy-to-manage technologies that provide integrated security, access control, and information protection
PROTECTION
PREVENTION
Rights Management ServicesFederation Services
BitLockerTM, Encrypting File System
Identity ManagementEnable integrated identity management across heterogeneous systems and audiences through the delivery of powerful self-service capabilities for Office end-users, rich administrative tools and enhanced automation for IT professionals and extensibility for developers.
PROTECTION
POLICY
PROVISION
Code Name “Geneva”
Certificate Services
Integrated SecurityEnable comprehensive, coordinated protection across endpoints, messaging and collaboration servers, and the network edge with a solution that is easier to manage and control.
PROTECTION
PREVENTION
POLICY
Business Ready Security – The Road AheadCurrently Available CY 2009
H2
Subject to Change
CY 2010H1
ADFederation Services
Lightweight Directory Services
Certificate ServicesDomain Services
Windows Cardspace
NAP
AD RMS
Management Consoles
Managem
ent
Pro
tect
ion &
Acc
ess
Solu
tions
Pla
tform
AD FS 2.0
Windows CardSpace 2.0
AD RMS
AD FSAD LDSAD CSAD DS
Windows Identity Foundation
Windows CardSpace
NAP
H2
2010
Questions and answers
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after
the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.