首页 经典PPT素材库合集

经典PPT素材库合集

举报
开通vip

经典PPT素材库合集nullnull第一篇 区块篇Mobile Device SolutionsMobile Device SolutionsIntegrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework ASP.NET mobile controlsComplex document authoring, editing and reading Keyboa...

经典PPT素材库合集
nullnull第一篇 区块篇Mobile Device SolutionsMobile Device SolutionsIntegrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework ASP.NET mobile controlsComplex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework available Centrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active reading Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition API’s Centrino SolutionsView and some data entry Integrated PDA with phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale SolutionsWindows® CEOne-way network Information consumptionSmart Personal ObjectsSmartphonePocket PC and Pocket PC PhoneNotebook PCTablet PCNetwork DefenseNetwork DefenseHealth checkup IT checks “health” of client Network Access Control Clients who pass get network access Clients who do not pass are fixed or blocked (aka “quarantined”) Health maintenance Quarantined clients can be given access to resources to get healthyFrom Home (VPN, Dial up)Returning LaptopsConsultants GuestsUnhealthy DesktopsMicrosoft Business Solutions ERP PositioningMicrosoft Business Solutions ERP PositioningGuiding PrinciplesGuiding PrinciplesProductiveIntegratedExtensibleCapableShort learning curve Minimal administrative overheadTools integrated tightly Automates common tasksCustomizable for your process Integrates with 3rd party toolsRemotely accessible Robust, secure, scalableStaging ArchitectureStaging ArchitectureData entryTestApplication CenterCommerce WebCommerceCommerce DataCommerce WebCommerceCommerce DataApplication CenterApplication CenterDataACS ClusterACS ClusterCluster controllerCluster controllerDataLive Communications Client RoadmapLive Communications Client RoadmapLC 1.2 Client Platform Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy managementLC 1.5 Client Platform Roll up of QFEs MPOP Additions Federation/Archiving Notification HA AdditionsLC 2.0 Client Platform Next generation of RTC experiences More coming!20032H04LonghornEnterprise Deployment UpdateEnterprise Deployment UpdateInternetFirewallFirewallFirewallRuntime ServersCorporate LAN – Internal ServersCrawl/SearchLoad Balanced WebInfrastructure ServersDevelopment ServersTest ServersBusiness Data ServersBusiness UsersDatabase and Staging ServersStaging ServersDatabase ServersOffline ServersIndicates Staged Data FlowWindows XP SP2 Block virus or malicious code at the “point of entry” Windows XP SP2 Block virus or malicious code at the “point of entry” Communicate and collaborate in a more secure manner without sacrificing information worker productivitySecurity Issues TodaySecurity Issues TodayThe Soft Underbelly1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8Customer ImpactCustomer ImpactApplication Layer AttacksIdentity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption ImplicationsCompliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation File Sharing Piracy HR Issues Shareholder SuitsTypes Of SRP RulesTypes Of SRP RulesSQL Server 2005 ThemesSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsTraditional FirewallsTraditional FirewallsCode Red, Nimda SSL-based attacksSecurity is complex IT is already overloadedBandwidth too expensive Too many moving partsNot easily upgradeable Don’t scale with businessChoosing the Right Type of Assessment Choosing the Right Type of Assessment Vulnerability Scanning Focuses on known weaknesses Of the three, requires the least expertise Generally easy to automatePenetration Testing Focuses on known and unknown weaknesses Requires advanced technical expertise Carries tremendous legal burden in certain countries/organizations IT Security Audits Focuses on security policies and procedures Of the three, requires the most expertise When done right is the most effective type of assessmentPerimeter Security EvolutionPerimeter Security EvolutionIntroducing: ISA Server 2004Introducing: ISA Server 2004The advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceISA Server 2004 New Features Continued commitment to integrationISA Server 2004 New Features Continued commitment to integrationWeb cacheSystem Service AccountsSystem Service AccountsLocal Service and Network Service No password to manage Runs with only slightly more permissions than Authenticated User Local Service cannot authenticate across the network, Network Service authenticates as the computer accountLocal System No password to manage Bypasses security checks User Accounts Run with less privilege than Local System Stores password as an LSA secret Can be complex to configure What’s New With IPSec?What’s New With IPSec?Management IP Security Monitor Command-line management with Netsh Logical addresses for local IP configuration Security Stronger cryptographic master key (Diffie-Hellman) Computer startup security Persistent policy for enhanced security Ability to exclude the name of the CA from certificate requests Better default exemption handlingInteroperability IPSec functionality over network address translation (NAT) Improved IPSec integration with Network Load BalancingISA Server 2004 New Features New management tools and user interfaceISA Server 2004 New Features New management tools and user interfaceNetwork templates and wizardsHow To Use Windows UpdateHow To Use Windows UpdateTo configure Automatic Updates:Select Keep my computer up to dateOpen the System application in Control Panel1On the Automatic Updates tab, select the option you want32Office UpdateOffice UpdateBenefits Limitation Single location for office patches and updates Easy to use Can be configured to update consumer or enterprise systemsDoes not support Automatic Updates; updating must be initiated manuallyOffice Update Web site: http://office.microsoft.com/officeupdateHow To Use Office UpdateHow To Use Office UpdateGo to http://office.microsoft.com/officeupdate1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSHow To Use SUSOn the SUS serverConfigure the SUS server at http:///SUSAdminOn each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, or use scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123How To Use MBSAHow To Use MBSADownload and install MBSA (once only)1Launch MBSA2Select the computer(s) to scan3Select relevant options4Click Start scan5View the Security Report6Software Update Service Deployment Best Practices (1)Software Update Service Deployment Best Practices (1)Software Update Service Deployment Best Practices (2)Software Update Service Deployment Best Practices (2)How To Use SMS To Deploy PatchesHow To Use SMS To Deploy PatchesSMS – MBSA IntegrationSMS – MBSA IntegrationMBSA integration included with SMS 2003 and the SUS Feature Pack for SMS 2.0 Scans SMS clients for missing security updates using mbsacli.exe /hfMBSA BenefitsMBSA BenefitsScans systems for Missing security patches Potential configuration issues Works with a broad range of Microsoft software Allows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can be downloaded from http://www.microsoft.com/mbsa MBSA ConsiderationsMBSA ConsiderationsMBSA reports important vulnerabilities Password weaknesses Guest account not disabled Auditing not configured Unnecessary services installed IIS vulnerabilities IE zone settings Automatic Updates configuration Internet Connection Firewall configurationMBSA – Scan OptionsMBSA – Scan OptionsMBSA has three scan options MBSA graphical user interface (GUI) MBSA standard command-line interface (mbsacli.exe) HFNetChk scan (mbsacli.exe /hf) Business Case For Patch ManagementBusiness Case For Patch ManagementDowntime Remediation time Questionable data integrity Lost credibility Negative public relations Legal defenses Stolen intellectual propertyWhen determining the potential financial impact of poor patch management, consider CommentsComments“We commend Microsoft for providing enhanced security guidance to its customers as well as for soliciting user input as part of the process of producing that guidance“ Clint Kreitner President/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance” Timothy Grance Manager Systems and Network Security GroupYou Need To…You Need To…ISA DeliversThe Unified Dimensional Model – The Best Of Relational And OLAPThe Unified Dimensional Model – The Best Of Relational And OLAPVisual Studio Team SystemVisual Studio Team SystemVisual Studio Team FoundationVisual Studio Team ArchitectVisual Studio Team DeveloperVisual Studio Team TestSQL Server 2000 Reporting Services ArchitectureSQL Server 2000 Reporting Services ArchitectureSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets (E-mail, SharePoint, Custom)RenderingOutput Formats (HTML, Excel, PDF, Custom)Data ProcessingSecurityQuarantine ArchitectureQuarantine ArchitectureInternetRAS ClientRRAS ServerIAS ServerRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitWhat is VS Team Foundation?What is VS Team Foundation?Microsoft BI Product SuiteMicrosoft BI Product SuiteAnalysis Services OLAP & Data MiningData Transformation ServicesSQL Server Relational EngineReporting ServicesManagement ToolsDev Tools Visual Studio .NetExcel OWC Visio Map Point Data AnalyzerSharePoint Portal Server Project ServerWindows ServerMBS BI ApplicationsCurrent ArchitectureCurrent Architecture Server ArchitectureServer ArchitectureApplication InteractionApplication InteractionnullTITLEAvailableTodayMicrosoft® Windows® Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureEAP architectureTLSGSS_API KerberosPEAPIKEMD5EAPPPP802.3802.5802.11Anything…method layerEAP layermedia layerMS-CHAPv2TLSSecurIDOffice Solution AcceleratorsOffice Solution AcceleratorsPartner Solutions OfferingsVALUE Proposition: Get more business value from your investment in OfficeFinance Sarbanes-Oxley Business Scorecard Excel Add-in for SQL Server Analysis ServicesOperations Six SigmaHR RecruitingSales ProposalsSolution AcceleratorsMicrosoft ProductsVALUE Proposition: Get more business value from your investment in OfficeEPM Involves….EPM Involves….Your PeopleYour Business Processes Your OrganizationYour Software Technology & ToolsAn orchestration of your people, processes, organization with technologyYour Business Processes…Your Business Processes…GovernancePrioritizationBudgetingHuman Resources… etc …InitiativesDecisionsYour Organization…Your Organization…Strategic Initiatives Development ProjectsOperational ImprovementsRepresentative Risks And TacticsRepresentative Risks And TacticsTactical SolutionsEnterprise RisksEmbody Trustworthy ComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source InitiativesFocus Controls Across Key AssetsRemote Access Security Remote Access Security ThreatRequirementSolutionMalicious usersTwo factor authenticationSmart Cards for RASMalicious softwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kit Corporate Security Group OrganizationCorporate Security Group OrganizationCorporate Security GroupThreat, Risk Analysis, and PolicyAssessment and ComplianceMonitoring, Intrusion Detection, and Incident ResponseShared Services OperationsThreat and Risk AnalysisPolicy DevelopmentProduct EvaluationDesign ReviewStructure StandardsSecurity ManagementSecurity AssessmentCompliance and RemediationMonitoring and Intrusion DetectionRapid Response and Resolution ForensicsIT InvestigationsPhysical and Remote AccessCertificate AdministrationSecurity ToolsInitiative ManagementServer Workloads FocusServer Workloads FocusServer FunctionsOperational InfrastructureApplication/Web Server Unix integration servicesWorkloadsSolutionsApplication PlatformInformation Worker InfrastructureDatabase High Performance ComputingSoftware Distribution Virtualization Operations Mgmt Terminal ServerEmail CollaborationBranch Office Medium Business Small BusinessNetworking Remote Access Security Identity MgmtStorage (file, portal) PrintWhat Is MapPoint Web Service?What Is MapPoint Web Service?Functionalities/APIs Maps, Geocoding, Reverse Geocoding, Proximity Search, Find Address etc.Development Tools Visual Studio .Net, Linux, Visual Basic, Mac, Java, C# …XML Web Service Points of Interest Database of more than 200,000 and 16 million business listingsCartographic data Extensive geographic coverage in 19 countries in Europe and North America.No UI constraints; device independent. Integration into a broad range of different applications and devices.nullWindows Small Business Server 2003 SP1 Windows Server 2003 for 64-Bit Extended Systems Windows Server 2003 Service Pack 1 (SP1) Windows XP Tablet Edition 2005 Windows XP Media Center Edition 2005 Windows XP Service Pack 2 (SP2) Virtual Server 2005 Additional Feature Packs (e.g. Windows Update Services)Windows Server: Codename “Longhorn” Beta 1 Windows Client: Codename “Longhorn” Beta 1 Windows Server 2003 Update: Codename “R2”Release Roadmapnull第二篇 表格篇Microsoft Patch Severity RatingsMicrosoft Patch Severity RatingsSecurity Bulletin List: http://www.Microsoft.com/TechNet/Security/Current.asp Patching Time FramesPatching Time FramesImproving The Patching ExperienceImproving The Patching ExperienceChoosing A Patch Management SolutionChoosing A Patch Management SolutionPatch Management Solution For Medium-Sized And Large OrganizationsPatch Management Solution For Medium-Sized And Large OrganizationsOther Sessions Of InterestOther Sessions Of InterestThe Importance Of Proactive Patch ManagementThe Importance Of Proactive Patch ManagementDREADDREADMicro Issues are 88%Micro Issues are 88%Simple to fix. Create “Noise” Five issues represent 88% of all upgrade issuesUpgradeUpgradeAnalysis Service and DTS Migration Wizards No new MDAC bits Reduced SQL Database services downtimeExample Goals Example Goals Example ScopeExample ScopeWhat to plan for…What to plan for…Patch Management Solution For Small And Medium-sized OrganizationsPatch Management Solution For Small And Medium-sized Organizationsnull
本文档为【经典PPT素材库合集】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
下载需要: 免费 已有0 人下载
最新资料
资料动态
专题动态
is_267260
暂无简介~
格式:ppt
大小:8MB
软件:PowerPoint
页数:0
分类:
上传时间:2013-07-03
浏览量:24