people-centric it customer conversation deck - short...

21
People-centric IT Jeff Chin and Desktop Technical Solutions Professional

Upload: others

Post on 12-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

People-centric IT

Jeff Chin and

Desktop Technical Solutions Professional

Page 2: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 3: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 4: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 5: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 6: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Challenges Solutions

Users want to use the device of their choice and have access to both their personal and work-related applications, data, and resources.

Users want an easy way to be able to access their corporate applications from anywhere.

IT departments want to empower users to work this way, but they also need to control access to sensitive information and remain in compliance with regulatory policies.

Users can register their devices, which makes them known to IT, who can then use device authentication as part of providing access to corporate resources.

Users can enroll their devices, which provides them with the company portal for consistent access to applications and data, and to manage their devices.

IT can publish access to corporate resources with conditional access based on the user’s identity, the device they are using, and their location.

Empower users

Page 7: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

IT can publish access to resources with the web application proxy based on device awareness and the users identity.

IT can provide seamless corporate access with DirectAccess and automatic connections with automatic VPN connections.

Users can work from anywhere on their devices with access to their corporate resources.

Users can register devices for single sign-on and access to corporate data with Workplace Join.

Users can enroll devices for access to the company portal for easy access to corporate applications.

IT can publish desktop virtualization resources for access to centralized resources.

Firewall

Page 8: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Users can sync their work data to their devices.

IT can publish access directly through a reverse proxy, or conditional access can be enforced via device registration through the web application proxy.

Users can register their devices to be able to sync data when IT enforces conditional access.

IT can configure a file server to provide Work Folder sync shares for each user to store data that syncs to their devices, including integration with Rights Management.

IT can selectively wipe the corporate data from Windows 8.1 clients.

Devices

Apps & Data

Page 9: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 10: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Unify your environment

Challenges Solutions

Providing users with a common identity when they are accessing resources that are located both on-premises in a corporate environment, and in cloud-based platforms.

Managing multiple identities and keeping the information in sync across environments is a drain on IT resources.

Users have a single sign-on experience when accessing all resources, regardless of location.

Users and IT can leverage their common identity for access to external resources through federation.

IT can consistently manage identities across on-premises and cloud-based identity domains.

Page 11: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

IT can provide users with a common identity across on-premises or cloud-based services, leveraging Windows Server Active Directory and Windows Azure Active Directory.

Users are more productive by having a single sign-on to all their resources.

IT can use Active Directory Federation Services to connect with Windows Azure for a consistent cloud-based identity.

Users get access through accounts in Windows Azure Active Directory to Windows Azure, Office 365, and third-party applications.

Developers can build applications that leverage the common identity model .

Page 12: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Users can access corporate applications and data wherever they are.

When a user registers a device, it becomes known and “trusted” to provide devicelevel authentication. IT can then publish access to resources based on registration plus the users identity.

IT can use Windows Server Remote Access to provide seamless application accessand automatic VPN connections with conditional access based on user and device validation.

Users are provided with a common identity when accessing cloud-based resources.

Devices

Apps & Data

Page 13: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Run Active Directory at scale with support for virtualization and rapid deployment through domain controller cloning.

Developers can integrate applications for single sign-on across on-premises and cloud-based applications.

Leverage cloud platforms to run Windows Server Active Directory and Active Directory Federation Servicesto reduce infrastructure on-premises.

Manage Active Directory using Windows PowerShell, use the improved deployment experience and leverage the Active Directory Administrative Center for centralized management

Activate clientsrunning Office on at least Windows 8 or Windows Server 2012 automatically using existing Active Directory infrastructure.

Page 14: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Allow users to manage their identity with an easy to use portal, tightly integrated with Office.

Self-service group and distribution list management, including dynamic membership calculation in these groups and distribution lists, is based on the user’s attributes.

Users can reset their passwords via Windows logon, significantly reducing help desk burden and costs.

Sync users identityacross directories, including Active Directory, Oracle, SQL Server, IBM DS, and LDAP.

Manage the complete life cycle of certificates and smart cards through integration with Active Directory.

Page 15: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Protect your data

Challenges Solutions

As users bring their own devices in to use for work, they will also want to access sensitive information and have access to this information locally on the device.

A significant amount of corporate data can only be found locally on user devices.

IT needs to be able to secure, classify, and protect data based on the content it contains, not just where it resides, including maintaining regulatory compliance.

Users can work on the device of their choice and be able to access all their resources, regardless of location or device.

IT can enforce a set of central access and audit polices, and be able to protect sensitive information based on the content of the documents.

IT can centrally audit and report on information access.

Page 16: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Desktop Virtualization

IT can publish resources using the web application proxy and create business-driven access policies with multi-factor authentication based on the content being accessed.

IT can audit user access to information based on central audit policies.

Users can access corporate data regardless of device or location with Work Folders for datasync and desktop virtualization for centralized applications.

IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies.

Centralized Data

Distributed Data

Devices

Page 17: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when
Page 18: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Centrally manage access control and audit polices from Windows Server Active Directory.

Automatically identify and classifydata based on content. Classification applies as files are created or modified.

Integration with Azure Rights Management Services provides automated encryption of documents.

Central access and audit policies can be applied across multiple file servers, with near real-time classification and processing of new and modified documents.

File classification, access policies and automated Rights Management works against client distributed data through Work Folders.

Page 19: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when

Enjoy 30% off Windows Intune or Intune Add On

Offer is valid for qualifying customers from September 1, 2013

through the remainder of the customer’s agreement.

Contact your account manager to schedule your POC today.

Page 21: People-centric IT Customer Conversation Deck - Short Deckdownload.microsoft.com/download/8/8/1/881A3C2B-343... · Challenges Solutions Providing users with a common identity when