microsoft system center 2012 delivering better it management
DESCRIPTION
Presentation at Intergen's event: Delivering IT Performance across Devices, Data Centres and Clouds. Understand how Microsoft System Center helps you to empower your people to use their devices and theapplications they need to be productive, while maintaining corporate compliance and control. How do you managethe influx of devices, of various shapes, sizes, ownership and provenance all while maintaining the compliance anddata protection needs of your enterprise?TRANSCRIPT
Microsoft System Center 2012:
Delivering Better IT Management
Stu Fox
Microsoft NZ
I want to connect to
people and be
productive
anywhere, anytime
How can IT provide
access to apps and
data while maintaining
security?
How can IT support
and manage all
those devices?
I want to use the
device I prefer
Challenges to enabling Consumerization
Devices User
Corporate
Consumer
Application
Infrastructure
Management of
diverse devices
Secure, anywhere
access to apps
& data
Security and Access
Infrastructure Considerations
Shift from device centric to user centric
Applications
Device vs User, Corp vs Consumer
App Infrastructure Security &
Access
Corporate Owned
and Compliant
Full Access
Consumer Owned
or Not Compliant
No Access
Consumer Owned
and Compliant
Secure access to
apps and data
Shift from corporate owned only… To supporting consumer owned devices
alongside corporate devices
Not Compliant
No Access
Device vs User, Corp vs Consumer
App Infrastructure Security &
Access
Modern
Gateway
Intranet Internet
Collaboration
Virtual
Desktops
VPN
Secure the devices
Secure the network
Secure the data
Modern Security and Access Model
Device vs User, Corp vs Consumer
App Infrastructure Security &
Access
Apply end to end
security and access
models
Build an optimized
application
infrastructure
Provide user-centric unified
management on premises and from
the cloud
Paradigms for supporting Consumerization
Management of
diverse devices
Secure, anywhere
access to apps
& data
How can Microsoft infrastructure
solutions help?
Support management of diverse devices
Provide secure, anywhere access to apps and data
Intelligent Infrastructure for Flexible
Workstyles
Optimized application
infrastructure
Unified management
on-premises and from
the cloud
End to end security
and access
Unified Management on
premises and from the cloud
Asset and Inventory
Settings Management
Application Delivery
Cloud Management for Windows
Exchange Active
Sync Connector
• Licensing Management
• Software Inventory
• Hardware Inventory
• User
Unified Asset Inventory
• User
• Hardware ID
• Mobile Device OS
Virtualization
Aware
EAS Protocol
Unified management on-
premises and in the cloud
Windows
Devices
EAS-enabled
Devices
Virtualized
Desktops
Unified Settings Management
Exchange Active
Sync Connector
(MDOP)
• PIN / Password
• Remote Wipe
Unified management
on-premises and in the cloud
• Policy Control
• Compliance Reporting
Portable
Desktop
User-Centric Application Delivery
Software
Distribution
Virtualization
Aware
RDS +
RemoteFX
• User identity
• App dependencies
• Device types
• Network characteristics
Unified management
on-premises and in the cloud
Demo User-centric application
delivery
Cloud Management for Windows
Virtualized
Desktops
Windows
Devices
Inventory
Settings
Perform security and
management tasks
remotely from a web-based
console
Help secure PCs from
malware and virus threats
with endpoint protection
Deploy updates and line of
business applications
through the cloud
Greater performance and security with the ability to upgrade
to the latest and best version of Windows.
Application
Distribution
Unified management
on-premises and in the cloud
Other devices
Demo Windows Intune
Modern Security and Access AntiMalware
System Integrity and Device Encryption
• Management and Security
Convergence
• Unified Infrastructure
• User Centric Reporting
• Automatic Settings Management
Modern security
and access AntiMalware
Consolidated tools,
processes, and
infrastructure to create
new efficiencies and
lower desktop
ownership costs
A unified view of
configuration and
security information
that makes it easier to
identify and remediate
vulnerabilities
Highly accurate
signatures along with
behavioral detection
techniques to protect
against both known
and unknown threats.
• OS Deployment
with BitLocker
• Provisioning
• Deployment
• Recovery
EAS Connector Device Encryption
Remote Wipe
(MDOP)
Datacenter security,
image management
and backup
Modern security
and access System Integrity + Device Encryption
Demo Antimalware and Settings Management
Intelligent Infrastructure for Flexible
Workstyles
Optimized application
infrastructure
Unified management
on-premises and from
the cloud
End to end security
and access
End to end security
and access models
Optimized
application
infrastructure
Unified management on premises
and from the cloud
Paradigms for supporting Consumerization
Management of
diverse devices
Secure, anywhere
access to apps
& data
Support device diversity, balancing
user needs and IT compliance
Efficient
application
management and
productive users
Anywhere,
anytime,
on any device
Consumerization of
IT
realized…
Device diversity supported
Productivity with secure,
anytime, anywhere access
Implemented with Microsoft
Flexible Workstyle Solutions
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.