SlideShare a Scribd company logo
Enable consumerization-of-it
•
•
•
•




    Worldwide PC Market: 4Q11 Review,”












I want to
connect to
people and be
productive
anywhere,
anytime


                How can IT
                support and
                manage all
                those devices?
Choice of Windows PCs,           System Center manages desktops &            Exchange Active Sync for mobile          Best practices for LOB apps
Slates, Phones                   mobile                                      management
                                                                                                                      Microsoft IT “Garage”
TPM Chip on hardware             Direct Access saved $300,000 per facility   Unified Communications saved more than
                                 per year                                    U.S. $215 million annually
1 million+ devices on Corp Net
                                 Unified Access Gateway eases secure         5,000+ employees on My Site
                                 remote access
Enable consumerization-of-it
Data
Protection
The hub for identity across
cloud and on-premise
Enable consumerization-of-it
Enable consumerization-of-it
Microsoft Desktop Virtualization
The right solution for each business scenario
Enable consumerization-of-it
Data
Protection
Enable consumerization-of-it
Effective Access
                       Device                    Identity              Policy Applied              Policy Compliant

                 Services: Full Application Access, User-Centric
                                                  User Name
                                                                          Domain Join, Group
                 Where:Known
                         Anywhere with internet seamlessly OR Offline BitLocker and DirectAccess
                                        Physical Windows PC with TPM,
                                                   Password
                                                                          Policy, SCCM client
                                                                                                    SCCM, SCEP, NAP   Full Access
                 Data: HBI, MBI, LBI              CertificateVirtualation machine (VDI)
                                                    Desktop



                 Services: Limited local, Remoteconnected device
                                            EAS options
                                                  User Name
                 Where: Offline & Online
                                 Non-domain joined PC with Windows Intune Domain Join,
                                                                      EAS,
                        Known                      Password
                 Data: EAS – LBI or MBI/HBI with AD RMS of compliance Group Policy
                                     Domain joined PC out                                           Partial Access
                                             Certificate (Optional)
                 PCs – LBI-HBI with bitlocker & manage to compliance
         Trust




                 Services: Remote Desktop, Remote Apps, Web
                 Apps, Modern Gateway Phone, Android, iPad,
                    Windows, Windows          User Name
                       Unknown
                 Where: Online only iPhone     Password
                                                                       Remote Access
                 Data: Remote only, No local



                    Services: none                                                                                     Services and
                     Any Device
                    Where: CORP
                     Any Device
                      Unknown                  No Access                                                                  Device
                                                                                                                       Data Access
                    Data: none                                                                                           Examples
                                                                                                                        Examples


                                                                Access
MGT309 – Microsoft System Center 2012 Configuration Manager Overview
SIA206 – Keep Your Data Safe!
SIA207 – Windows Server 2012 Dynamic Access Control Overview
       –
       –

        –
        –
        –
        –



MGT11-HOL Introduction to Microsoft System Center 2012 Configuration Manager
SIA21-HOL Using Dynamic Access Control to Automatically and Centrally Secure Data in Windows Server 2012
http://edge.technet.com

http://www.Microsoft.com/consumerization
http://aka.ms/consumerIT
Enable consumerization-of-it

More Related Content

PPTX
Consumerization of IT MSL Jumpstart Keynote
PDF
Cloud desktop for byod
PPTX
Cloud 101 & BPOS - Microsoft Webinar
PDF
Telesemana ce nominum:mef
PDF
Exchange 2013
PPTX
Audio card - VoIP - Phonecard
PDF
Stcc tech comm handout 2012 09-20
PDF
Mdc Brochure
Consumerization of IT MSL Jumpstart Keynote
Cloud desktop for byod
Cloud 101 & BPOS - Microsoft Webinar
Telesemana ce nominum:mef
Exchange 2013
Audio card - VoIP - Phonecard
Stcc tech comm handout 2012 09-20
Mdc Brochure

What's hot (12)

PPSX
Windows7/8 Migration Strategies
PDF
A complete bi solution for the microsoft platform adam mor panorama
PPTX
Ms discovery days the new exchange - overview_dpa_juris smits
PDF
Lecture2 network attack
PDF
Over the Air 2011 Security Workshop
DOCX
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
PPTX
Web conferancing
PDF
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
PPTX
PPTX
CH11-Managing Computing Securely, Safely and Ethically
PDF
Citrix Receiver: the road ahead
PDF
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Windows7/8 Migration Strategies
A complete bi solution for the microsoft platform adam mor panorama
Ms discovery days the new exchange - overview_dpa_juris smits
Lecture2 network attack
Over the Air 2011 Security Workshop
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
Web conferancing
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
CH11-Managing Computing Securely, Safely and Ethically
Citrix Receiver: the road ahead
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Ad

Viewers also liked (8)

PPTX
3 Ways To UP Your OPs Game
PPTX
Mobile App Instrumentation Experimentation FTW
PPTX
building microservices
PPTX
Microsoft & Internet of Things
PPTX
Internet of things (IoT) with Azure
PPTX
Business Transformation with Microsoft Azure IoT
PPTX
DevOps, Microservices, and Azure Container Service
PPTX
Azure Cloud PPT
3 Ways To UP Your OPs Game
Mobile App Instrumentation Experimentation FTW
building microservices
Microsoft & Internet of Things
Internet of things (IoT) with Azure
Business Transformation with Microsoft Azure IoT
DevOps, Microservices, and Azure Container Service
Azure Cloud PPT
Ad

Similar to Enable consumerization-of-it (20)

PPTX
Windows 7 For Itpro
PDF
Windows 7 security enhancements
PDF
Desktop direct competitive analysis and value proposition
PPTX
W8 client management
PPTX
What’s new in windows server 2012
PDF
Sccm 2012 overview - chris_estonina
PDF
DirectAccess
PPTX
Windows server 2012 security Webinar
PDF
Webinar: Understanding the System Center suite & Windows Server 2012
PPTX
Windows Server 8: Remote Desktop Services with RemoteFX, more than a word!
PDF
System Center webinar
PDF
SystemCenter webinar 12 6 12
PDF
Moderne device management door middel van cloud
PDF
Microsoft System Center 2012 Delivering better IT Management
PDF
Session 1: Windows 8 with Gerry Tessier
PDF
Wallix AdminBastion - Privileged User Management & Access Control
PDF
Presentación Novedades vSphere 5.1
PPTX
VDI in Windows Server 2012
PDF
Windows Server 2008 Security Overview Short
PDF
Windows Server 2008 Security Overview Short
Windows 7 For Itpro
Windows 7 security enhancements
Desktop direct competitive analysis and value proposition
W8 client management
What’s new in windows server 2012
Sccm 2012 overview - chris_estonina
DirectAccess
Windows server 2012 security Webinar
Webinar: Understanding the System Center suite & Windows Server 2012
Windows Server 8: Remote Desktop Services with RemoteFX, more than a word!
System Center webinar
SystemCenter webinar 12 6 12
Moderne device management door middel van cloud
Microsoft System Center 2012 Delivering better IT Management
Session 1: Windows 8 with Gerry Tessier
Wallix AdminBastion - Privileged User Management & Access Control
Presentación Novedades vSphere 5.1
VDI in Windows Server 2012
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
sap open course for s4hana steps from ECC to s4
Per capita expenditure prediction using model stacking based on satellite ima...

Enable consumerization-of-it

  • 2. • • • • Worldwide PC Market: 4Q11 Review,”      
  • 3. I want to connect to people and be productive anywhere, anytime How can IT support and manage all those devices?
  • 4. Choice of Windows PCs, System Center manages desktops & Exchange Active Sync for mobile Best practices for LOB apps Slates, Phones mobile management Microsoft IT “Garage” TPM Chip on hardware Direct Access saved $300,000 per facility Unified Communications saved more than per year U.S. $215 million annually 1 million+ devices on Corp Net Unified Access Gateway eases secure 5,000+ employees on My Site remote access
  • 7. The hub for identity across cloud and on-premise
  • 10. Microsoft Desktop Virtualization The right solution for each business scenario
  • 14. Effective Access Device Identity Policy Applied Policy Compliant Services: Full Application Access, User-Centric User Name Domain Join, Group Where:Known Anywhere with internet seamlessly OR Offline BitLocker and DirectAccess Physical Windows PC with TPM, Password Policy, SCCM client SCCM, SCEP, NAP Full Access Data: HBI, MBI, LBI CertificateVirtualation machine (VDI) Desktop Services: Limited local, Remoteconnected device EAS options User Name Where: Offline & Online Non-domain joined PC with Windows Intune Domain Join, EAS, Known Password Data: EAS – LBI or MBI/HBI with AD RMS of compliance Group Policy Domain joined PC out Partial Access Certificate (Optional) PCs – LBI-HBI with bitlocker & manage to compliance Trust Services: Remote Desktop, Remote Apps, Web Apps, Modern Gateway Phone, Android, iPad, Windows, Windows User Name Unknown Where: Online only iPhone Password Remote Access Data: Remote only, No local Services: none Services and Any Device Where: CORP Any Device Unknown No Access Device Data Access Data: none Examples Examples Access
  • 15. MGT309 – Microsoft System Center 2012 Configuration Manager Overview SIA206 – Keep Your Data Safe! SIA207 – Windows Server 2012 Dynamic Access Control Overview – – – – – – MGT11-HOL Introduction to Microsoft System Center 2012 Configuration Manager SIA21-HOL Using Dynamic Access Control to Automatically and Centrally Secure Data in Windows Server 2012

Editor's Notes

  • #6: Timing: 5 minutes Key Points:Technology is playing an increasingly important role in people’s personal lives, and these consumer technology experiences are spilling over into their professional lives: People expect to be able to use the same technology at work as they use at home. The enterprise can realize a number of benefits from the consumerization of IT trend with the right approach. The key is to strike a balance between user expectations and enterprise requirements for security, privacy, control, and compliance.There are four key areas where Microsoft can help you to embrace and make the most of the consumerization trend: Windows-based devices; Security and management; Productivity; Application development. Script:As technology plays an increasingly important role in people’s personal lives, it is having a profound effect on their expectations for and use of technology in their work lives. People have access to powerful and affordable PCs and laptops, they are using mobile devices more and more, they expect “always on” connectivity, and they’re connecting with each other in new ways using social networks. Ultimately, they have more choice, more options, and more flexibility in the technology they use every day, and as that technology spills over into their professional lives, the line between personal and professional is blurring. People want to be able to choose what technology they use at work, and they increasingly want to use that same technology in all aspects of their lives, not just at work. In fact, according to a study by Unisys (conducted by IDC), a full 95 percent of information workers use at least one self-purchased device at work. The study also found that information workers “report using an average of four consumer devices and multiple third-party applications, such as social networking sites, in the course of their day.” Somewhat worryingly, the Unisys-IDC study further revealed a discrepancy between what technology employees report using at work and what their employers believe they are using: for example, “69 percent of [information workers] say they can access non-work-related websites, while only 44 percent of their employers report this to be the case.”For IT, it’s about striking a balance between user expectations and enterprise requirements. Consumer technology without a doubt poses some risks to the business—such as to security, privacy, and compliance. However, there are also many benefits to the consumerization of IT trend that businesses can capitalize on with the right approach. People love their consumer technology because it makes it easier for them to connect with each other, access and share information, and collaborate. Those same benefits are there for the taking for businesses. To achieve the right balance—to minimize the risks and maximize the benefits—in some cases could mean embracing certain consumer technologies into the workplace and in others it could mean providing enterprise alternatives that will keep both users and regulators happy.I’d like to break today’s discussion down into four areas where Microsoft can help you make the most of the consumerization trend:Windows-based devices. As the devices continue to evolve and change so does the way that individuals interact with those devices. New scenarios are created at home and at work. The challenge for IT is to have the flexibility to evolve their scenarios to meet the needs of the way people interact with devices without compromising control and security. With a diverse range of devices based on the Windows platform, you can meet your enterprise requirements while delivering an experience that your people will love. Security and management. Our philosophy for our security and management platform is to help you manage this proliferation of devices with a single pane of glass, whether from management tools in your own infrastructure or from cloud services. Today we’ll look at the investments that we’re making to expand our management capabilities beyond Windows to the other platforms in use in your business to help you protect your enterprise.Productivity. We’re continually evolving our productivity platform to deliver the kinds of experiences that people want and to make it easier and more fun to work and collaborate from any location, on any device. The success of Microsoft® Office 2010 speaks for itself: it is the fastest-selling version of Office ever. Nearly 50 million people worldwide now use Office Web Apps. With the system of Office 2010 server products and cloud-based Office 365, we’re providing the best productivity experience on Windows and a best-in-class productivity experience on other devices, enabling the kind of social and connected experiences that people want based on their consumer experiences while delivering the security and privacy that you require in the enterprise.Application development. Application development is as important as ever. And as the industry moves to address this with next-generation applications, we are investing in tools that will simplify and enrich the developer experience within their familiar development environment. Additional Information:“Unisys Consumerization of IT Benchmark Study: Summary Survey Results,” Unisys, 2010, http://www.unisys.com/unisys/ri/pub/bl/detail.jsp?id=1120000970004010071“A history of Windows,” http://windows.microsoft.com/en-US/windows/history“IDC Forecasts Worldwide Smartphone Market to Grow by Nearly 50% in 2011,” IDC, March 29, 2011,http://www.idc.com/getdoc.jsp?containerId=prUS22762811“Office 2010: A record-breaking first year,” Office Blogs, June 15, 2011, http://blogs.office.com/b/office-exec/archive/2011/06/15/office-2010-record-breaking-first-year.aspx