1 / 29

Is your IT working for you, or are you working for it?

Is your IT working for you, or are you working for it?. Presenter Name Partner Name Date. Insert Partner Logo. Insert Partner Logo. Insert Partner Logo. Insert Partner Logo. Insert Partner Logo. Welcome To Your Local Team. Meet other business people in your area

azia
Télécharger la présentation

Is your IT working for you, or are you working for it?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Is your IT working for you, or are you working for it? Presenter Name Partner Name Date Insert Partner Logo Insert Partner Logo Insert Partner Logo Insert Partner Logo Insert Partner Logo

  2. Welcome To Your Local Team • Meet other business people in your area • Share stories and insights • Find solutions to some of your biggest challenges • Tap into a local network full of resources • [List Presenters & Introduce them here]

  3. What Challenges Are You Facing Today? There are growing demands on our IT infrastructure, even while the slow economy keeps our IT budget and staff limited. Threats to system security continue to multiply. The number of mobile employees increases every year, but we have to make sure our system is secure.

  4. If your disaster recovery backup plan depends on tape, you’ve already accepted that you can afford to lose 24 hours of data. -- Bob Laliberte, analyst, Enterprise Strategy Group. Source: SearchCIO-Midmarket.com

  5. Growing Demands On Our IT Infrastructure • Put a system with advanced security and reliability in place • Move to a platform that’s proven to limit the risk of malicious software. • Minimize the attack surface on your system. • Troubleshoot efficiently with a detailed database of diagnostic procedures and easy-to-use solutions.

  6. Limit the risk of malicious software • Minimize the attack surface of your system • Troubleshoot efficiently Put A More Secure And Reliable System In Place • Windows 7® Enterprise and Internet Explorer 8 can identify malicious sites and block the download of malicious software. • Microsoft® System Center Essentials 2007 includes a detailed knowledgebase with easy step-by-step instructions. Windows Server® 2008 R2 allows you to configure the operating system for minimal installations in which only the server roles and features you need are installed. • [Insert Partner product here] • [Insert Partner product here] • [Insert Partner product here]

  7. In 2008, 22 million records were compromised as a result of data breaches. --Security Products magazine

  8. Threats To System Security Continue To Multiply • Set up multiple security layers that work together • to patrol your data perimeter • Help protect your network and systems from being compromised by unhealthy computers. • Protect your confidential data on lost, stolen, or decommissioned machines • Deploy a combination of network filters to help ensure the confidentiality and authenticity of your data.

  9. Protect your network and systems • Protect confidential data • Deploy a combination of network filters Set Up Multiple Security Layers That Work Together To Patrol Your Data Perimeter Windows Server 2008 R2 uses Network Access Protection to help ensure that client computers on a private network meet administrator-defined requirements for system health. Windows 7 Enterprise uses BitLocker Drive Encryption to help protect data stored in lost, stolen, or decommissioned computers. Microsoft Forefront™ client security includes application-specific filters that you can station throughout your network to help safeguard sensitive data and protect intellectual property. • [Insert Partner product here] • [Insert Partner product here] • [Insert Partner product here]

  10. By the end of 2011, almost 75% of the U. S. workforce will be mobile. --Source: IDC, Worldwide Mobile Worker Population 2007-2011 Forecast, Doc # 209813, December 2007

  11. Number Of Mobile Employees Increases Every Year • Enable employees to work in a security-enhanced environment, even from remote locations • Use a combination of encryption, communications, and identity management technologies to help maintain security and at the same time ensure that authorized users have access. • Execute updates, diagnostics, and other important tasks on remote users’ computers from the IT management console. • Be productive anywhere with the ability to access information whether you are in the office or not

  12. Maintain security • Execute important tasks • Be productive anywhere Enable Employees To Work Securely,Even From Remote Locations Microsoft Forefront has sophisticated encryption procedures, security- enhanced communications technologies, and identity management capabilities to give you control over who gets in and what they see. Windows 7 Enterprise provides the appropriate security control so that users can access the information they need to be productive, whether they are in the office or not. Microsoft System Center Essentials 2007 provides built-in tasks to remotely execute tasks on users’ computers. • [Insert Partner product here] • [Insert Partner product here] • [Insert Partner product here]

  13. Don’t let your information slip out through your computer recycling program. Tips And Tricks • When you’re getting rid of your older computers and drives, it’s important to establish clear plans for scrubbing your data. The U.S. Department of Defense standard calls for overwriting the disk at least three times, removing the disk from the computer, and destroying it.2 • If you’re considering desktop virtualization, be aware of the security issues. • The virtual technology must be hardened to protect your virtual machines from attack. Adding encryption and virus protection is a must, and other security features have to be put in place to keep virtual machines from accessing unauthorized corporate resources.3 • When you discover that one of your PCs has been infiltrated by a spyware application, the first thing to do is take it off the Internet. Don’t reconnect the suspect computer until it has been scanned, cleaned, and demonstrably cleared of unauthorized software.1 • Has one of your computers been infected with spyware? Isolate it. 1“FAQS on spyware and malware,” Ed Tittle; 2“Computer recycling: Dangers for even the well intentioned,” James M. Connolly; 3“Virtual desktops: Cheap and effective,” Herman Mehling.

  14. Test your backup and recovery plans in the real world. More Tips And Tricks • Once you have your recovery plans in place, and all your technical requirements completed, take the next step and stage a mock disaster. If your company is like many others, you‘ll observe a surprising amount of chaos and indecision, but you’ll be able to see clearly what additional steps you should take.4 • Should you develop your own security monitoring tools? • Many companies are finding that they just don’t have time to create a custom solution. Even when outsourced to a competent vendor, this process can take six months to a year. Off-the-shelf solutions can often be installed in as little as 30 days and require significantly less staff time to monitor and maintain.5 • [Insert Partner tip] • [Insert Partner Tip] 4“Disaster recovery planning off CIOs' plate -- Sort of,” Zach Church; 5“Security monitoring tools: Better to buy than build?” Michael Ybarra.

  15. Take The Next Step Go to the Microsoft Business website at www.microsoft.com/businessfor complete information about Microsoft solutions for small and midsized businesses: • Demo software • Free trial downloads • Personalized support • Licensing

  16. Is your IT working for you, or are you working for it? Microsoft Product Details

  17. Windows Server 2008 R2 • Apply security policies with ease.Group Policy enables administrators to manage configurations for groups of computers and users, reducing your total cost of ownership. • Lay a solid foundation for your business.Help ensure your critical applications and data are available when you need them. Microsoft Windows Server Backup incorporates fast backup technology that simplifies the restoration of your data or operating system. Minimize the attack surface area of your system.Configure the operating system for minimal installations in which only the server roles and features you need are installed. Protect against malicious software. Use Network Access Protection to help ensure that client computers on a private network meet administrator-defined requirements for system health.

  18. Windows 7 Enterprise • Move to a fundamentally more secure operating system. Enhanced audit capabilities make it easier for your organization to meet its regulatory and business compliance requirements. • Help secure access anywhere.Windows 7 provides the necessary security control so users can access the information they need to be productive, whether they are in the office or not. • Protect data from unauthorized viewing. With Windows 7 Enterprise, you can protect the data on lost, stolen or decommissioned computers. • Protect against security and privacy threats. Internet Explorer 8 deliver improved protection, including the ability to identify malicious sites and block the download of malicious software.

  19. Microsoft Forefront Client and Server OS Network Edge Server Applications • Help safeguard sensitive data and protect intellectual property. Help ensure the confidentiality and authenticity of your information with a combination of application-specific filters stationed throughout your network. • Tightly control access to your system. You can have control over who gets in and what they can see. Use multiple layers to help guard your critical server applications. Microsoft Forefront provides end-to-end protection for your IT environment with an integrated set of security products. Aggressively protect your operating system. Microsoft Forefront Client Security’s powerful anti-malware capabilities help you keep your system pristine.

  20. Microsoft System Center Essentials 2007 • Troubleshoot problems quickly. With Microsoft System Center Essentials 2007, you can diagnose and fix problems with key products by using our detailed knowledge base. • Improve your users’ up time. With Microsoft System Center Essentials 2007, it’s easy to collect application and operating system errors. • Automatically keep your network up-to-date. You can have critical updates deployed automatically—or hold them for your approval. Keep your applications and network up and running. You can easily monitor application data and the status of devices in your network using the many provided charts, tables, and reports.

  21. Additional Products • [Partners – add your own products here, related to the customer issues you are addressing at this event]

  22. Additional Offers • [Partners – add your own offers here, related to the products you are demonstrating during the event]

  23. How To Purchase: Open Programs The Open Programs are a convenient and simple way for small and midsize organizations with five or more desktop computers to acquire the latest Microsoft technology. With a customizable platform and volume discounts for minimal up-front purchases, Open Programs provide value and flexibility in a convenient Microsoft Volume Licensing program.

  24. How To Purchase: Total Solution Financing Total Solution Financing provides an easy, affordable way to get everything you need from one simple source. When you finance your IT solutions through Microsoft Financing, you get predictable monthly payments that are spread over the life of your IT investment, so you avoid straining your credit lines and needing to make big upfront cash investments. That's technology financing that makes good business sense. • Finance one or more parts of the solution that includes Microsoft software for improved scalability. • Take advantage of competitive rates. • Simplify financing with a streamlined process. • Use one resource for all your solution needs. • Spread payments over an extendedperiod of time. • Preserve financing resources and improve cash flow. • Balance project results with cash outflows.

  25. How To Purchase: Partner Solutions • [Partners – add your own purchasing options here, related to the products you are demonstrating during the event]

  26. Insert Partner Logo Insert Partner Logo Insert Partner Logo Insert Partner Logo Insert Partner Logo

More Related