23

Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling
Page 2: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Srinivas LTechnology Specialist - SecurityMicrosoft CorporationSession Code:

Page 3: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Agenda

Security and Access Challenges

Forefront Today

Forefront Codename “Stirling”Comprehensive Protection

Simplified Management

Critical Visibility

Demo

Q&A

Page 4: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Security And Access Challenges

More users

More locations/devices

Intranet/Extranet access

Full connectivity is risky

Poor apps integration

Lack of scalability

Changing legal rules

Changing business rules

Limited granularity

Growing MobilityTraditional VPNs

Inadequate

Difficult to

Enforce Policies

More advanced

Increased volume

Profit motivated

Many point products

Poor interoperability

Lack of integration

Multiple consoles

Uncoordinated reports

Complex and costly

Escalating Threats Fragmented SecurityDifficult to

Manage and Deploy

Security Challenges

Access Challenges

Page 5: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

A comprehensive line of business security products that helps you gain greater protection

and secure access through deep integration and simplified management

Network EdgeServer ApplicationsClient And Server OS

Page 6: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Dynamic Response

Network EdgeServer ApplicationsClient And Server OS

An Integrated Security System

Page 7: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Integrated protection across clients, server and edge

Dynamic responses to emerging threats

Next generation protection technologies

Comprehensive

Protection

Manage from a single role-based console

Asset and policy centric model

Integrates with your existing infrastructure

Simplified

Management

Know your security state in real-time

View insightful reports

Investigate and remediate security issues

Critical

Visibility

An Integrated Security System that delivers

comprehensive, coordinated protection with

simplified management and critical visibility

across clients, servers, and the network edge

Page 8: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Comprehensive

Protection

Page 9: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Comprehensive ProtectionIntegrated security system

Silo’d Best of Breed Solutions are not enoughCustomers do this today and still have security issues

Manual coordination is difficult and often incomplete

Expensive and difficult to understand if “I’m secure”

Stirling and Dynamic Response are the answerLayered Protection across the organization

Protection technologies that work together

Protection technologies that share security state information

Protection technologies that take action together

Customers need anIntegrated Security System

Stirling’s protection technologies work together to better protect customers

Page 10: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Manual: Launch a scan

WEB

Manual: Disconnect the Computer

Zero Day ScenarioToday

Page 11: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Enterprise Security

Too much or too little data

Efficient and focused investigation

Today

High rates of false positive/negative

Manual enterprise wide response

Low visibility on enterprise security

Standard channel for security information

Share contextual Information

Automatic responseand shield up

StirlingDynamic Response

Stirling delivers:Better Protection - Faster Response - Lower Cost

Page 12: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Stirling Protection Technologies

AntivirusAntispyware

Host Firewall

NAP Integration

Vulnerability Assessment & Remediation

Exchange Protection

Content Filtering

SharPoint Protection

Firewall

Web AV

Remote Access

Dynamic Response

Coordinated Defense Adaptive InvestigationInformation Sharing

Content Filtering

And More…

Page 13: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Simplified

Management

Page 14: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Security ManagementToday

Jumping between consoles waste timeEach console has its own policy paradigm

Product’s are in silos with no integration

Lack of integration with infrastructure generate inefficiencies

Difficult to know if solutions are protecting from emerging threats

Management Console Management Console Management Console

Reporting Console Reporting Console Reporting Console

Console

Endpoint ProtectionServer Application

ProtectionNetwork Edge

Vulnerability Assessment

Page 15: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Simplified Management With StirlingProtect your business with greater efficiency

One console for simplified, role-based security management

Define one security policy for your assets across protection technologies

Deploy signatures, policies and software quickly

Integrates with your existing infrastructure: SCOM, SQL, WSUS, AD, NAP, SCCM

Page 16: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Critical Visibility

And Control

Page 17: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Know your security state

View insightful reports

Investigate and remediate security risks

Critical Visibility And ControlKnow where action is required

Page 18: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Overview of Stirling Beta 2Srinivas LTechnology Specialist - Security

Page 19: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

RoadmapH2 2008

Codename “Stirling”BETA

H1 2008 H1 2009

Page 20: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

Summary

Stirling is an Integrated Enterprise Security System that delivers comprehensive, coordinated protection with simplified management and critical visibility across clients, servers, and the network edge

Dynamic, coordinated responses to threats

Focus on protecting assets

Manage security, not security products

Coherent and meaningful reports

Page 21: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling
Page 23: Srinivas L - download.microsoft.comdownload.microsoft.com/.../forefront_stirling_srinivas.pdf · Srinivas L Technology Specialist - Security . Roadmap H2 2008 Codename “Stirling

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,

IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.