Title: Partnering with Microsoft Server and Tools
1Partnering with MicrosoftServer and Tools
- Joseph Landes
- Director of Marketing
- Central and Eastern Europe
2Agenda
- Why Windows Server?
- Opportunities with Small Business Server
- Opportunities with Security
3(No Transcript)
4(No Transcript)
5(No Transcript)
6Server Functions
Workloads
- Networking
- Remote Access
- Security
- Identity Management
- Terminal Server
Operational Infrastructure
- Storage (file, portal)
- Print
- Email
- Collaboration
Information Worker Infrastructure
- Application/Web Server
- Unix integration services
- Database
- High Performance Computing
Application Platform
- Software Distribution
- Virtualization
- Operations Management
Management
- General Purpose Enterprise
- Medium Business
- Small Business
Solutions
7Windows Server Release Cycle
Mainstream Service Packs Updates
Extended Support
At least 5 years from major release
At least 5 years
8Product OverviewWindows Small Business Server
2003 R2
- Advanced solution for productivity and security,
designed for small businesses
- Small Businesses
- A complete, affordable network
- solution designed to help small
- business owners
- Protect their business information
- Keep their business up and running
- Get more done with less resources
- Connect with customers better
- IT Solution Providers
- An opportunity to build lifelong
- customer relationships and a
- profitable business
- Attract new customers
- Deepen existing customer relationships
- Build a profitable business by providing an
integrated solution and value-added services
9(No Transcript)
10Product OverviewWindows Small Business Server
2003 R2Technology building block for small
businesses
IDC Study A new SBS 2003 deployment is often
accompanied by the opportunity to sell desktop PC
hardware and Microsoft Office 2003 and Windows
XP Professional,
11Increasingly Challenging Security Environments
Fragmentation ofsecurity technology
Threats are moredangerous than ever
Difficult to use,deploy and manage
- More advanced
- Application-oriented
- More frequent
- Profit motivated
- Too many point products
- Poor interoperability
- Lack of integration
- Multiple consoles
- Uncoordinated event reporting analysis
- Cost and complexity
Security Solution Requirements
12- Microsoft Forefront provides greater protection
and control over the security of your business
network infrastructure by providing - A comprehensive line of information protection
and secure access products - Integration with your existing IT infrastructure
- Simplified deployment, management, and analysis
- Technical and industry guidance
13Tenets of Forefront Security Products
- Protect Information and Control Access at
- Operating system
- Server applications
- Network edge
- Content
- Heterogeneity
- Third-party products
- Secure custom apps
- 24/7 security research and response
- Cross-product integration
- MS security products
- MS server applications
- Integrates with Microsoft IT infrastructure
- AD, SQL, MOM, etc.
- Integration with ecosystem partners and custom
apps
- Unified view and analytics
- Reduced number of management consoles
- Simplified deployment
- Appliances and appliance-like experience
- Technical and industry guidance
- Simplified licensing
14Comprehensive Security
Product Portfolio
15ISA Server 2006
An integrated edge security gateway that helps
protect your IT environment from Internet-based
threats while providing your users fast and
secure remote access to applications and data.
16A Traditional Firewalls ViewOf A Packet
- Only packet headers are inspected
- Application layer content appears as black box
17ISA Servers View Of A Packet
- Packet headers and application content are
inspected
18Outlook Web Access Traditional Firewall
OWA Traffic
Password Guessing
SSL Tunnel
Internet
Web Server Attacks
Exchange Server
- Web traffic to OWA is encrypted
- Standard SSL encryption
- Security against eavesdropping and impersonation
- Limitation
- OWA server is only defense against application
layer attacks
19How ISA Server Protects OWA
OWA Traffic
Password Guessing
SSL Tunnel
Internet
Web Server Attacks
Inspection Authentication
Exchange Server
- Authentication
- Unauthorized requests are blocked before they
reach the Exchange server - Enforces all OWA authentication methods
- Optional forms-based authentication prevents
caching of credentials - Inspection
- Invalid HTTP requests or requests for non-OWA
content are blocked - Inspection of SSL traffic before it reaches
Exchange server - Confidentiality
- Ensures encryption of traffic over the Internet
- Can prevent the downloading of attachments to
client computers
20Network Access Quarantine
- Client script checks whether client meets
corporate security policies - Personal firewall enabled?
- Latest virus definitions used?
- Required patches installed?
- If checks succeed, client gets full access
- If checks fail client gets disconnected after
timeout period
21VPN Quarantine Process (1)
Quarantine Resources
Internal Network
?
VPN Client
Client computer connects.
1
22VPN Quarantine Process (2)
Quarantine Resources
?
VPN Client
Client computer connects.
1
23Whale
The IAG provides SSL-based application access and
protection with endpoint security management,
enabling granular access control and content
inspection from a broad range of devices and
locations to line-of-business, intranet, and
client-server resources.
24Protect messaging and collaboration servers
against viruses, worms, spam and inappropriate
content
Multiple scan engines at multiple
layers
Maximize protection against e-mail and
collaboration threats
Advanced Protection
Maximizes availability and management control
Tight integration with Exchange, SharePoint, and
Live Communications Servers
Availability Control
Protects your organization from malicious content
Helps eliminate inappropriate language and
dangerous attachments
Secure Content
25Gartners Magic Quadrant on Email Security
Gartner Sept. 2006 Microsoft is poised to become
the de facto leader in the e-mail security
market. .it will be difficult to compete
with the addition of anti-spam and antivirus
services as part of both standard and enterprise
licenses for Exchange 2007.
26Unified malware protection that is easier to
manage and control for desktops, laptops and
server operating systems
- One solution for spyware and virus protection
- Built on technology used by millions worldwide
- Effective threat response
- One console for simplified administration
- Define one policy to manage agent settings
- Integrates with your existing infrastructure
- One dashboard for visibility into threats
- View insightful reports
- Stay informed with state assessment scans
27Security Services Opportunities Infrastructure
Optimization by Capability
Security is THE KeyBusiness Opportunityfor Core
IO !
Capabilities46 Core Security,29 Sec.
Related Avg. 55 of customers misseach of the
capabilities
28Security Product Roadmap
Current
Dec 2006
2007
Client
Server
TBD
Edge
TBD
29Resources Next Steps
- Take our web based product training
http//www.microsoft.com/forefront
- Learn about the Microsoft Core IO Model
http//www.microsoftio.com
- Download a trial versions of our security products
http//www.microsoft.com/forefront
- http//www.microsoft.com/isaserver/2006
- Register for beta information
http//www.microsoft.com/clientsecurity
- Contact your Microsoft PAM or reseller for
information on how to begin selling Microsoft
Forefront Security products