Mohit Saxena Senior Technical Lead Microsoft Corporation

Size: px
Start display at page:

Download "Mohit Saxena Senior Technical Lead Microsoft Corporation"

Transcription

1

2 Mohit Saxena Senior Technical Lead Microsoft Corporation

3 Session Objectives And Takeaways UAG Overview & Vision Deep dive to some features: Array NLB Remote Desktop Services Portal Exchange

4 Today's workforce is mobile

5 5 The new information workplace Home USB Drive Mobile Devices The flow of information has no boundaries Information is shared, stored and accessed outside the control of its owner Partner Organization

6 UAG Solution Architecture Data Center / Corporate Network Exchange Mobile CRM SharePoint IIS based Home / Friend / Kiosk Internet Layer3 VPN HTTPS (443) IBM, SAP, Oracle Terminal / Remote Desktop Services DirectAccess Non web Business Partners / Sub-Contractors AD, ADFS, RADIUS, LDAP. NPS, ILM Employees Managed Machines

7 UAG Vision Increasingly, people envision a world of anywhere access - a world in which the information, the communities, and the content that they value is available instantly and easily, no matter where they are. Bill Gates Enabling Secure Anywhere Access in a Connected World, Feb 2007

8 Roadmap Forefront Edge Security and Access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructures Today Tomorrow Protection Access

9 + UAG is optimized for the broad range of Exchange solutions, delivering secure, anywhere access for employees and partners. Anywhere Access Deliver simple and secure remote access to Exchange from any location or device through integrated SSL VPN capabilities. Improve productivity by easily publishing client/server applications and networking resources alongside messaging. Integrated Security Drive compliance using out-of-the-box rules and policies created for Exchange. Easily integrate strong authentication and endpoint health assessment into Exchange security policies. Limit information access and prevent data leakage. Simplified Management Easily create and publish remote access policies for Outlook Web Access, Outlook Anywhere, and ActiveSync. Manage all remote access to Exchange through single gateway. Scale remote access deployments for Exchange with integrated load balancing.

10 + UAG is optimized for SharePoint, delivering secure, anywhere access for your employees, partners and customers. Anywhere Access Deliver a simple and secure remote user experience for SharePoint through integrated SSL VPN capabilities. Extend SharePoint portal functionality by integrating client/server applications and networking resources. Enables easy, secure access to multiple SharePoint portals through integration with Active Directory and web-based single sign-on. Integrated Security Drive compliance through out-of-the-box rules and built-in policies for SharePoint. Easily integrate strong authentication and endpoint assessment into access policies. Limit information access and prevent data leakage. Simplified Management Easily create and publish remote access policies for SharePoint extranets. Manage all remote access to SharePoint through a single gateway. Simplify deployment and ongoing tasks through wizards and built-in policies.

11 DirectAccess Providing seamless, secure access to enterprise resources from anywhere Provides seamless, always-on, secure connectivity to on-premise and remote users alike Eliminates the need to connect explicitly to corpnet while remote Facilitates secure, end-to-end communication and collaboration Leverages a policy-based network access approach Enables IT to easily service/secure/update/provision mobile machines whether they are inside or outside the network Available in Windows 7 and Windows Server 2008 R2

12 UAG and DirectAccess better together: Extends access to line of business servers with IPv4 support Access for down level and non Windows clients Enhances scalability and management Simplifies deployment and administration Hardened Edge Solution Always On IPv6 IPv6 SSL-VPN + IPv4 IPv6 or IPv4

13 Now lets deep dive into the features.

14 UAG In a Glance Web Application Publishing SSL VPN Layer 3 VPN SSL Network Tunneling, SSTP Enhanced Protection Edge Ready Terminal Services RemoteApps, RemoteDesktop, VDI DirectAccess Enhanced Authentication & Identity Unified Management Enterprise Readiness Interoperability

15 Array Array is a set of UAG machines which: Share the same configuration (trunks, applications) Managed as a unit Why? Increased Availability Increased Scalability Centralized Management UAG Array Manager External UAG array member How? Internal One node serves as the manager Other nodes are members Configuration is propagated from manager to members UAG array member

16 Integrated NLB Once array is setup, admin can easily configure and activate Windows NLB from within UAG console:

17 Remote Desktop (AKA Terminal Services) UAG seamlessly integrates Remote Desktop Gateway (RDG/TSG) to provide application level gateway for TS applications. RD/TS Client (MSTSC) HTTPS Tunnel IAG RDP RD Session Host (TS Server) RD/TS Client (MSTSC) RDP over HTTPS UAG + RDG RDP RD Session Host (TS Server)

18 Remote Desktop (AKA Terminal Services) Brings VPN, RemoteApps, RemoteDesktop and Web applications together: Same portal Integrated management Single sign-on Enhanced Security Granular policies based on client health: No anti-virus no driver sharing

19 Portal

20 Exchange Publishing ActiveSync UAG Client Access Server Outlook Web Access Internet HTTPS (443) Client Access Server Client Access Server OutlookAnywhere Authentication End-point health detection Enterprise Readiness Edge Ready Load Balancing SSO

21 UAG Beta Portal

22 More UAG Features SharePoint 2010, SharePoint 2010 Mobile Integrated SSTP support NAP integration SCOM Management Pack and more

23

24 Resources Microsoft Certification & Training Resources Resources for IT Professionals Resources for Developers

25 Complete an evaluation on CommNet and enter to win!

26 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Henk Den Baes Technology Advisor Microsoft BeLux

Henk Den Baes Technology Advisor Microsoft BeLux Henk Den Baes Technology Advisor Microsoft BeLux Home USB Drive Independent Consultant Mobile Devices The flow of information has no boundaries Information is shared, stored and accessed outside the control

More information

Vishal Shirodkar Technology Specialist Microsoft India Session Code:

Vishal Shirodkar Technology Specialist Microsoft India Session Code: Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing

More information

Windows Server Network Access Protection. Richard Chiu

Windows Server Network Access Protection. Richard Chiu Windows Server 2008 Network Access Protection Richard Chiu Network Access Protection Solution Overview Policy Validation Determines whether the computers are compliant with the company s security policy.

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is   Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de How to configure Forefront UAG as a SSTP VPN Server Abstract In this article I will show you

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Authlogics Forefront TMG and UAG Agent Integration Guide

Authlogics Forefront TMG and UAG Agent Integration Guide Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The

More information

Kunal Mahajan Microsoft Corporation

Kunal Mahajan Microsoft Corporation Kunal Mahajan Microsoft Corporation 65+ Million Customer hosted Mailboxes 30+ Million Partner hosted Mailboxes 1,800 Partners Strategic Business Challenges Our Sales teams need to connect with the right

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary Description Course Summary The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively plan, deploy and manage Microsoft Forefront Threat

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Integrating Microsoft Forefront Unified Access Gateway (UAG)

Integrating Microsoft Forefront Unified Access Gateway (UAG) Integrating Microsoft Forefront Unified Access Gateway (UAG) EventTracker v7.x Publication Date: Sep 17, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Network. Arcstar Universal One

Network. Arcstar Universal One Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than

More information

Designing Windows Server 2008 Network and Applications Infrastructure

Designing Windows Server 2008 Network and Applications Infrastructure Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

SOLO NETWORK. Windows 7 At-A-Glance. For Enterprise and Mid Market SI Partners

SOLO NETWORK. Windows 7 At-A-Glance. For Enterprise and Mid Market SI Partners (11) 4062-6971 (21) 4062-6971 (31) 4062-6971 (41) 4062-6971 (48) 4062-6971 (51) 4062-6971 (61) 4062-6971 Windows 7 At-A-Glance For Enterprise and Mid Market SI Partners (11) 4062-6971 (21) 4062-6971 (31)

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

The SonicWALL SSL-VPN Series

The SonicWALL SSL-VPN Series The SSL-VPN Series SSL-V PN Simple, Affordable, Secure and Clientless Remote Access Seamless integration behind virtually any firewall Clientless connectivity Unrestricted concurrent user tunnels NetExtender

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

SSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing

SSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing SSL VPNs or IPsec VPNs The Challenges of Remote Access February 2 nd, 2007 Chris Witeck- Director of Product Marketing Agenda Remote access challenges Drivers for remote access New challenges for IT Remote

More information

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT Business today runs on technology 71% of surveyed internet, technology and social experts predict: In 2016, 82% of server workloads will be running in virtual environments. Total IT services spend: 45%

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Introduction...

More information

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018 REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 70-647 Title : Windows Server 2008,Enterprise Administrator

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is   Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront UAG Publishing Microsoft Exchange Server 2010 Outlook Anywhere and Exchange

More information

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business

More information

Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure

Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure Course 6439A - Five days - Instructor-led - Hands-on Introduction This course introduces students to a series of Windows Server

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances TMG Server 2010 Appliance (ntmg or ntmge Series) provides value to IT managers, network administrators,

More information

App Gateway Deployment Guide

App Gateway Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move Onur Dogruoz Agenda Provide an introduction to Azure Infrastructure as a Service (IaaS) Walk through the Azure portal Help you understand role-based access control Engage in an overview of the calculator

More information

visionapp Workspace Management 2008 (vwm)

visionapp Workspace Management 2008 (vwm) 2008 (vwm) Value-Add to Citrix Products Product Information Head Office Frankfurt a.m. (D) Helfmann-Park 2 65760 Eschborn phone: +49-69-79583-0 www.visionapp.com Office London (UK) Office Washington (US)

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

Anywhere Access to the People and Information You Need Every Day. Name Title Microsoft Corporation

Anywhere Access to the People and Information You Need Every Day. Name Title Microsoft Corporation Anywhere Access to the People and Information You Need Every Day Name Title Microsoft Corporation Business Challenges The Promise of Unified Communications Office Communicator Mobile Benefits Advanced

More information

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand Workspace Lausanne 09.03.2017 Laurent Strauss Christophe Beaugrand WorkspaceSuite Improve employee productivity Deliver a high performance user experience Empower entire workforce Secure enterprise content

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is   Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront UAG How to configure arrays in Forefront UAG Abstract This is a two part

More information

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Presented by. Steven Audis. Microsoft Education Technology Advisor

Presented by. Steven Audis. Microsoft Education Technology Advisor Presented by Steven Audis Microsoft Education Technology Advisor More Pressure than Ever on IT Technology Change Regulatory Compliance Competition Security Cost Reduction Keep Business Up & Running Customer

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate May 2007 Trusted Computing Group 3855 SW 153 rd Dr. Beaverton, OR 97006 TEL: (503) 619-0563 FAX: (503) 664-6708 admin@trustedcomputinggroup.org

More information

Windows 8: Enabling Flexible Workstyles

Windows 8: Enabling Flexible Workstyles Assaf Jacoby assafj@microsoft.com Windows 8: Enabling Flexible Workstyles Windows Strategy for Business Devices and Experiences Users Love Enterprise-Grade Solutions Flexible workstyle scenarios Work

More information

VISIT US: goverlan.com

VISIT US: goverlan.com VISIT US: goverlan.com CALL US: +1.888.330.4188 (US) +1.305.442.4788 (INT) Goverlan enables you to seamlessly support all your users, no matter where they are, and without the need for a VPN. Features

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure

More information

Microsoft Configuring and Troubleshooting Windows Server 2008 Application Infrastructure

Microsoft Configuring and Troubleshooting Windows Server 2008 Application Infrastructure 1800 ULEARN (853 276) www.ddls.com.au Microsoft 6439 - Configuring and Troubleshooting Windows Server 2008 Application Infrastructure Length 5 days Price $4290.00 (inc GST) Overview This course introduces

More information

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver :

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver : Exam : 070-647 Title : PRO: Windows Server 2008, Enterprise Administrator Ver : 06-26-2008 QUESTION 1 You are an enterprise administrator for Certkiller. The company has a head office in San Diego and

More information

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer 1 BIG-IP APM: Access Policy Manager v11 David Perodin Field Systems Engineer 3 Overview What is BIG-IP Access Policy Manager (APM)? How APM protects organization-facing applications by providing policy-based,

More information

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways Onur Dogruoz Agenda Previous Sessions: Introduction to Azure Infrastructure as a Service (IaaS), Azure portal, role-based access control (RBAC), calculator overview VM Types, Azure Hybrid Use Benefits(AHUB),

More information

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Page 1 of 10 Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Course 6416D: 4 days; Instructor-Led

More information

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Citrix XenApp 6 on Remote Desktop Services Extending the Microsoft platform New features in XenApp

More information

IBM Lotus Domino Product Roadmap

IBM Lotus Domino Product Roadmap IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration

More information

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service DATASHEET VMWARE 7 AT A GLANCE 7 delivers virtualized or hosted desktops and applications through a single platform to end users. These desktop and application services including Remote Desktop Services

More information

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that

More information

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology

More information

Microsoft Office 365. Identity Beta Service Description. Published: March 2011

Microsoft Office 365. Identity Beta Service Description. Published: March 2011 Microsoft Office 365 Identity Beta Service Description : The information contained in this document relates to pre-release software and services, which may be substantially modified before the first commercial

More information

Address new markets with new services

Address new markets with new services Address new markets with new services Programs Deployment Options On-premises Private Cloud Pre-configured Private Cloud Hosted Private Cloud Hyper-V Cloud Deployment Guides Hyper-V Cloud Fast Track Hyper-V

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Module Overview. works Identify NAP enforcement options Identify scenarios for NAP usage

Module Overview. works Identify NAP enforcement options Identify scenarios for NAP usage Module 6: Network Policies and Access Protection Module Overview Describe how Network Policies Access Protection (NAP) works Identify NAP enforcement options Identify scenarios for NAP usage Describe Routing

More information

Vendor: Microsoft. Exam Code: Exam Name: Administering Office 365. Version: DEMO

Vendor: Microsoft. Exam Code: Exam Name: Administering Office 365. Version: DEMO Vendor: Microsoft Exam Code: 70-323 Exam Name: Administering Office 365 Version: DEMO QUESTION 1 Your company has a Microsoft Exchange Server 2003 organization. Users access their mailbox by using RPC

More information

Cisco AnyConnect Secure Mobility & VDI Demo Guide

Cisco AnyConnect Secure Mobility & VDI Demo Guide Cisco AnyConnect Secure Mobility & VDI Demo Guide (partner version) Overview... 2 Value Proposition... 2 Deployment Scenario... 3 Role Play Demo Script... 5 Demo Equipment Bill of Material... 9 Demo Documentation

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Design and deliver cloud-based apps and data for flexible, on-demand IT

Design and deliver cloud-based apps and data for flexible, on-demand IT White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

Simplify, Strengthen and Unify your security.

Simplify, Strengthen and Unify your security. www.portsys.com info@portsys.com Simplify, Strengthen and Unify your security. TAC secures mobility, cloud and corporate-based access to all your valuable resources, in one highly scalable, integrated

More information

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information

More information

Microsoft IT deploys Work Folders as an enterprise client data management solution

Microsoft IT deploys Work Folders as an enterprise client data management solution Microsoft IT deploys Work Folders as an enterprise client data management solution Published May 2014 The following content may no longer reflect Microsoft s current position or infrastructure. This content

More information

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE Table of Contents Component Design: Unified Access Gateway Architecture Design Overview Network Deployment Options Authentication

More information

Name : Bobby Davasia Title : Technology Specialist Company : Microsoft India

Name : Bobby Davasia Title : Technology Specialist Company : Microsoft India Name : Bobby Davasia Title : Technology Specialist Company : Microsoft India Session Objectives And Takeaways Get Overview of Security Compliance Management Toolkit Series Learn Easy Security Baseline

More information

Office 365: Fact Sheet

Office 365: Fact Sheet Office 365: Fact Sheet Microsoft Office 365 from 3C Technology Ltd brings together cloud versions of our most trusted communication and collaboration products with the latest version of our desktop suite.

More information

Jim Tsui Sr. Solution Manager Mobile Communications Business Microsoft Corporation WMB202

Jim Tsui Sr. Solution Manager Mobile Communications Business Microsoft Corporation WMB202 Jim Tsui Sr. Solution Manager Mobile Communications Business Microsoft Corporation WMB202 Agenda Microsoft Mobility Vision Windows Mobile for You Windows Mobile for Your Customers What s New in 6.5 and

More information

Aventail ST2 SSL VPN New Features Guide

Aventail ST2 SSL VPN New Features Guide Aventail ST2 SSL VPN New Features Guide Summary of New Features and Functionality for the Aventail ST2 SSL VPN Platform Upgrade Release August, 2006 2006 Aventail Corporation. All rights reserved. Aventail,

More information

WorldExtend Environment Preparation Guide

WorldExtend Environment Preparation Guide WorldExtend Environment Preparation Guide WorldExtend IronDoor Version 3.5 WorldExtend, LLC. Published: March 2008 Abstract This guide explains how to prepare your application environment for WorldExtend

More information

Course Outline. Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led

Course Outline. Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led Enabling and Managing Office 365 Course 20347A: 5 days Instructor Led About this course This is a 5-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in

More information

Avaya Aura. Unified, Real-time Communications. avaya.com

Avaya Aura. Unified, Real-time Communications. avaya.com Avaya Aura Unified, Real-time Communications Avaya Aura is a breakthrough in business communications Avaya s core communications platform supporting mid to large enterprises, enabling unified communications,

More information

Providing Security and Acceleration for Remote Users

Providing Security and Acceleration for Remote Users F5 White Paper Providing Security and Acceleration for Remote Users Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely

More information

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy 1 work-life blur more mobile digital generation multiple devices CONSUMERIZATION tech fast savvy VIRTUALIZATION CLOUD paced 2 By Avanade Global Research Study 2013 2 3 Embracing the consumerization of

More information

Clients for Unified Communications

Clients for Unified Communications Mobile Collaboration with Avaya one-x Clients for Unified Communications Avaya one-x clients deliver a softwarebased user experience that lets you easily deploy consistent mobility and communications strategies

More information

Junos Pulse Secure Access Service Supported Platforms Guide

Junos Pulse Secure Access Service Supported Platforms Guide Junos Pulse Secure Access Service Supported Platforms Guide 8.0R1 (Build 27973) December 2, 2013 Revision 01 Contents Introduction........................................................ 2 Administrator

More information

Extranets in SharePoint 2010 and 2013

Extranets in SharePoint 2010 and 2013 Extranets in SharePoint 2010 and 2013 Presented by Peter Carson President, Envision IT April 11, 2013 Rob Karimi Account Manager, Envision IT e: rkarimi@envisionit.com m: (416) 473 4726 LinkedIn: http://ca.linkedin.com/in/robkarimi

More information

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong Session objectives & takeaways Session objectives: Overview of information protection solutions How to

More information

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE A Clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. Abstract The consumerization

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published:

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134

More information

Microsoft Forefront Security For Sharepoint User Guide

Microsoft Forefront Security For Sharepoint User Guide Microsoft Forefront Security For Sharepoint User Guide Updated security guides: Take advantage of the deep security expertise and best practices in the Applying the Principle of Least Privilege to User

More information

Windows Vista and the Optimized Desktop. Danny Beck Senior Enterprise Windows Manager Microsoft Australia

Windows Vista and the Optimized Desktop. Danny Beck Senior Enterprise Windows Manager Microsoft Australia Windows Vista and the Optimized Desktop Danny Beck Senior Enterprise Windows Manager Microsoft Australia danbeck@microsoft.com Today s Agenda Introduction to the Infrastructure Optimization Model The Path

More information

Retired. For more information on HP's ProLiant Security Server visit:

Retired. For more information on HP's ProLiant Security Server visit: Overview The HP running Microsoft Internet Security & Acceleration (ISA) Server 2006 is an advanced firewall, VPN, and Web caching solution that can be quickly and easily deployed in multiple network environments

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

MCSA Windows Server 2012

MCSA Windows Server 2012 MCSA Windows Server 2012 This Training Program prepares and enables learners to Pass Microsoft MCSA: Windows Server 2012 exams 1. MCSA: Windows Server 2012 / 70-410 Exam (Installing and Configuring Windows

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs. Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,

More information