<<

TOMORROW ON WHEELS STIJN VANNUT Citrix Partnership Microsoft Strategic Alliance Driving Forward with Cloud and Mobility

© 2016 Citrix. Confidential. Agenda Microsoft Strategic Relationship

• Why Citrix • Current solutions Microsoft & Citrix together • Azure solutions • Office 365 • • New strategic agreement on Cloud and Mobility

5 © 2016 Citrix. Confidential. Organizations Things

“Power a world where people, organizations, and things are securely connected and accessible, so that you can make the extraordinary possible “ Citrix Strategy Build the world’s best integrated technology services for secure delivery of apps and data—anytime, anywhere.

7 © 2016 Citrix | Confidential XenApp and XenDesktop Technology Deployment Options

On-Premises Citrix Cloud Citrix Service Providers (Traditional)

Public Or Private Corporate Data Center Service Provider Cloud Cloud Subscription Offerings Perpetual Offerings Service Provider Offerings: • Desktops Service • XenApp Advanced edition • Subscription offers by individual • Apps & Desktop Service • XenApp Enterprise edition Service Providers • XenApp Platinum edition • XenDesktop VDI edition • XenDesktop Enterprise ed. • XenDesktop Platinum ed.

8 © 2016 Citrix | Confidential Citrix Cloud Citrix Solutions Today-Azure, Office 365 and Windows 10

Current Azure Solutions Enterprise Cloud Enterprise File Enterprise App for Business Windows 10 App Delivery Networking Sync and Share Delivery Cloud Optimization Office 365 Delivery via IaaS

• BYOL/IaaS Solution • Enhance load balancing • Mobilize employees • Unify administration • Virtual Skype for • Accelerate Win10 • Centralize control • Deliver network • Provide anywhere • Smooth on-ramp to the Business solution only delivery • Increase mobility optimization access cloud available from Citrix • Secure Office 365 • Enable cloud • Cross security and control • Aggregate enterprise • Cross-service • Uncompromised • Deliver Windows apps management data coordination quality of voice and video

XenApp & XenDesktop Services Optimization Pack

10 © 2016 Citrix. Confidential. New Strategic Agreement

Citrix makes Azure it’s preferred and strategic cloud

Aligning Microsoft EMS & Intune and XenMobile & NetScaler Integrating Identity and Networking between NetScaler and Azure

Enabling XenDesktop VDI to deliver Windows 10 desktops from the Cloud on Azure

Building next generation RemoteApp Service to deliver apps from the Azure cloud Subscription-based model

11 © 2016 Citrix. Confidential. Citrix Cloud: XenDesktop for Windows 10 on Azure

SERVICE CAPABILITIES Management* Assign Desktops Yes, Win10 CBB Citrix Provisioning w/ Azure Resource Manager XenDesktop for Access Control Policy Available Windows 10 on Azure Desktop Modes Dedicated and Pooled Monitoring Full Director Access Citrix Cloud Alerting Available Customer Subscription End User Access Capability Full Storefront Access Smart Scale Available Auto Update VDA Service Available Hybrid Deployments Yes. Requires NetScaler on- CONNECTOR premises High Availability Yes (active/active for Control NetScaler WindowsServer WindowsServer Gateway 10Server 10Server Active Plan. VDA failover) VDAs VDAs Directory VDAs VDAs SLA 99.9% Customer’s Azure Subscription Support (24x7x365) Available

12 © 2016 Citrix. Confidential. Through Citrix Studio Citrix Cloud: XenApp “express“ SERVICE CAPABILITIES* Deployment Options Future of Azure RemoteApp Cloud • Non-domain joined • Azure AD Hybrid • Domain joined • On-premises AD or Azure AD VMs, Storage • Bring your own Azure subscription • Auto create Azure subscription if needed • • Allow instance size and region selection Apps/Images • Pre-canned Images with common apps provided by service • Upload custom Images • Create Image workflow (Phase 2) • Orchestration Multi-tenant service: • Creation of Resource Groups, Cloud Connectors, Availability Sets, and VDAs • Many-to-many mapping between Azure subscriptions and customers • Azure V2 support VNETs • Bring your own VNET • Auto create for customer if needed Management Console • Simple UI mode providing ARA like experience • (Image selector, compute selector, publish apps, assign users) • Advanced UI mode via Studio (Full flexibility as provided to existing XenApp customers) Power and Capacity • Allow customers to set the scheme Management Identity • On-premises AD • • Azure AD ( with Multi Factor Authentication) • FAS for single sign-on (Phase 2) Remoting protocol • HDX • RDP (Phase 2) Clients • All Citrix Receiver supported platforms Migration • Help migrate ARA customers to our service

13 © 2016 Citrix. Confidential. Citrix Cloud: XenApp "express"

Citrix Cloud

Simple Management UI Operated by Citrix Control Plane

Customer Subscription CONNECTOR Managed by Citrix

WindowsServer WindowsServer AppsServer AppsServer Active VDAs VDAs Directory VDAs VDAs Customer’s Azure Subscription

14 © 2016 Citrix. Confidential. Desktop and App Virtualization Range of Choices Traditional Cloud Cloud

On-prem / IaaS Service Provider

Traditional installable Comprehensive Hybrid Simple, Secure, cloud- Simplest way to publish Package End-to-end virtual apps Simple Window 10 VDI software for complete IT virtual apps & based web-browser remote applications in and desktops solution on Azure Description control desktop service solution the cloud Citrix Infra. IT Dept. Partner Citrix Citrix Citrix Citrix Management Workload IT Dept. / Partner Partner IT Dept. / Partner Managed by Citrix IT Dept. / Partner IT Dept. / Partner Management Perpetual + Subscription Subscription Subscription Subscription Subscription Licensing Maintenance (varies) (user/year) (user hours) (User/month) (User/month) Private cloud or Public Private, Partner, Cloud Partner Cloud Citrix Selected Azure-only Azure-only IaaS Public IaaS

RTM Normal Channel Normal Channel Normal Channel Normal Channel Azure Marketplace Azure Marketplace Available Today Future

15 © 2016 Citrix | Confidential Delivering Windows 10 VDI via Azure Traditional Cloud

On-prem / IaaS Virtual Desktop Offering

Package Traditional installable software for Cloud based VDI management service Simple Window 10 VDI on Azure Description complete control Leverage current hardware, add cloud Deliver multiple desktops types in the Fastest route to Windows 10 VDI and Why use? for burst and DR cloud of your choice avoid upfront CapEx investment Citrix Infra. IT Dept. / Partner Citrix Citrix Management Workload IT Dept. / Partner IT Dept. / Partner IT Dept. / Partner Management Deploy Infra. or workload VMs In Public Deploy workload VMs in one of: Deploy workload VMs in Azure Only Cloud for increased capacity Private, Public, Partner

Licensing/ 1,2,3 year term / subscription via Perpetual via normal channel Month-to-month subscription via transaction normal channel Azure Marketplace only

Available Today Future

16 © 2016 Citrix | Confidential Delivering Windows Apps Remotely via Azure Traditional Cloud

On-prem / IaaS Virtual Apps & Desktops Offering

Traditional installable software for Simple, Secure, cloud-based web- Simplest way to publish remote Package Cloud based VDI management service Description complete control browser solution applications in the cloud Leverage current hardware, add cloud Best way to enable Hybrid-IT for Quickly give access to web sites and Fastest route to delivering apps and Why use? for burst and DR strategic use of cloud / migration browsers not supported by IT avoid upfront CapEx investment Citrix Infra. IT Dept. / Partner Citrix Citrix Citrix Management Workload IT Dept. / Partner IT Dept. / Partner Citrix IT Dept. / Partner Management Deploy Infra. or workload VMs In Deploy workload VMs in one of: Selected by Citrix Deploy workload VMs in Azure Only Cloud Public for increased capacity Private, Public, Partner

Licensing/ Perpetual 1,2,3 year term/subscription Subscription (user hours) Month-to-month subscription via transaction via normal channel via normal channel via normal channel Azure Marketplace only

Available Today Future

17 © 2016 Citrix | Confidential WORK BETTER. LIVE BETTER.

18 © 2016 Citrix. Confidential. MIKE VAN ERMEN Windows 10 Security

EVOLUTION OF ATTACKS

Mischief Fraud and Theft Damage and Disruption

Script Organized Nations, Terror Groups, Kiddies Crime Activists

Unsophisticated More sophisticated Very sophisticated and well resourced ANATOMY OF AN ATTACK

Browser or Doc Exploit Delivery Malicious Attachment Delivery ENTER USER Phishing Attacks

Internet Service Compromise Browser or Doc Exploit Execution DEVICE ESTABLISH Malicious Attachment Execution Stolen Credential Use

Kernel Exploits Kernel-mode Malware EXPAND NETWORK Pass-the-Hash

ENDGAME

BUSINESS DISRUPTION LOST PRODUCTIVITY DATA THEFT ESPIONAGE, LOSS OF IP RANSOM ANATOMY OF AN ATTACK: STRONTIUM

PHISHING USER

DEVICE Browser or Doc Exploit Execution

PASS-THE-HASH NETWORK

ENDGAME

Theft of sensitive information, disruption of government. ANATOMY OF AN ATTACK: STRONTIUM

PHISHING USER

DEVICE Browser or Doc Exploit Execution

http://natoint.com/900117-spain-forces-conclude-mission-in-central-african-republic/

PASS-THE-HASH NETWORK

ENDGAME

Theft of sensitive information, disruption of government. ANATOMYTotal OF Elapsed AN ATTACK: Time: STRONTIUM00:00.1

PHISHING USER

DEVICE Browser or Doc Exploit Execution

PASS-THE-HASH ExploitNETWORK runs

Land on exploit page Redirected to legitimate page ENDGAME

Theft of sensitive information, disruption of government. THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

DeviceDevice integrity Health SmartScreen WindowsBuilt-in Hello 2FA :) DeviceBitLocker protection and / WindowsConditional Defender Access attestation DriveBitLocker encryption to Go ATP Device control WindowsAppLocker AccountCredential lockdown Guard Windows Defender Device Guard MicrosoftDevice Guard Edge EnterpriseWindows Data ATP Device Control Microsoft Passport InformationProtection WindowsDevice DefenderGuard Protection Conditional access Security policies WindowsNetwork/Firewall Defender Windows Hello :) ThreatGame changeprotection with overWindows time and Software Protection Gap CAPABILITY Attackersas a Services take advantage of Disruptperiods andbetween out innovate releases our adversaries by design

TIME

PRODUCT THREAT RELEASE SOPHISTICATION Security features

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

PRE-BREACH POST-BREACH Windows 10 Security on Legacy or Modern Devices (Upgraded from Windows 7 or 32-bit Windows 8)

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

PRE-BREACH POST-BREACH Windows 10 Security on Modern Devices (Fresh Install or upgraded from 64-bit Windows 8 )

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

PRE-BREACH POST-BREACH THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

DeviceDevice integrity Health SmartScreen Windows Hello :) BitLocker and Conditional Access attestation BitLocker to Go Device control Credential Guard Windows Defender Device Guard Windows ATP Device Control Information Device Guard Protection Security policies Windows Defender DEVICE PROTECTION SECURE ROOTS OF TRUST

Device integrity

Cryptographic processing

Biometrics sensors

Virtualization TRADITIONAL PLATFORM STACK

Apps

Windows Platform Services

Kernel

Device Hardware VIRTUALIZATION BASED SECURITY WINDOWS 10

Apps #1 #2 #3 Trustlet Trustlet Trustlet Windows Platform Services

Kernel Kernel

Windows System Container

Hyper-V Hyper-V

Device Hardware

Hypervisor VIRTUALIZATION BASED SECURITY THE FUTURE

Apps

Windows Platform Windows Platform Critical System Processes Services Services

Kernel Kernel Kernel

AppContainer Windows Operating System SystemContainer

Hyper-V Hyper-V

Device Hardware

Hypervisor THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

Device integrity SmartScreen Windows Hello :) BitLocker and Conditional Access BitLocker to Go Device control Windows Firewall Credential Guard Windows Defender Microsoft Edge Windows ATP Information Device Guard Protection Windows Defender TRADITIONAL APPROACH Type of threats to consider and mitigate

Device Tampering Vulnerabilities Malware Phishing COMPREHENSIVE THREAT RESISTENCE

Office ATP

SmartScreen Windows Firewall

External

Internal

Microsoft Edge Windows Defender

Device Guard Windows 10

PROTECT FROM THE EDGE Protect devices before they encounter threats PROACTIVE THREAT IDENTIFICATION AND PROTECTION

Microsoft SmartScreen  Phishing and malware filtering technology for Microsoft Edge and 11 in Windows 10.

 Provides protection from drive-by attacks.

 Cloud service is continuously updated, nothing for you to deploy.

Exchange Online Advanced Threat Protection  Cloud-based email filtering service helps protect against unknown malware and viruses.

 URL trace technology examines potentially harmful links. Windows 10

PROTECT FROM WITHIN Operating system used defense in depth to address threats that get inside the perimeter MICROSOFT EDGE: DESIGNED FOR SECURE BROWSING

Microsoft Edge is the most secure browser Microsoft has ever shipped

Tactics

Objective Strategy Eliminate vulnerabilities before attackers can find them

Make it difficult and Break exploitation techniques used by attackers Keep our customers costly for attackers to safe when browsing  find and exploit  the web vulnerabilities in Contain the damage when vulnerabilities are discovered Microsoft Edge

Prevent navigation to known exploit sites MICROSOFT EDGE: BUILDING A SAFER BROWSER Fundamentally improve security and enable users to confidently experience the web when using Windows 10

www

DEFEND USERS DEFEND THE BROWSER New

(SmartScreen) (Universal Windows Platform)

(Windows Address Space Layout Randomization on 64-bit systems) (Microsoft Passport and Windows Hello)

(MemGC)

(Cert. Reputation, EdgeHTML, W3C Content Security Policy, HTTP Strict Transport Security)

(Control Flow Guard) MICROSOFT EDGE SECURITY IMPROVEMENTS

Before – Full access to Win32.sys  Microsoft Edge and Flash no longer have full access to Microsoft Edge Browser Windows Kernel win32k.sys—API calls are filtered Edge Content Process Win32k.sys  Only 40% of interfaces are Flash Host Process available to Flash and Edge reducing attack surface Today – 60% less surface area of attack on a highly targeted library  Flash player moves into its own AppContainer Microsoft Edge Browser Windows Kernel  Working directly with Adobe to harden Flash player to be Edge Content Process Allowed Win32k.sys interfaces resistant to vulnerability Flash Host Process exploits Blocked Win32k.sys interfaces HARDWARE ISOLATION WITH WINDOWS DEFENDER APPLICATION GUARD

Microsoft Edge Apps

Windows Platform Windows Platform Critical System Processes Services Services

Kernel Kernel Kernel

Windows Defender Windows Operating System System Container Application Guard Container

Hyper-V Hyper-V

Device Hardware

Hypervisor

TODAY’S CHALLENGE:

APPS YOUR SECURITY DEPENDS ON A PLATFORM WHERE:

APPS MUST EARN TRUST BEFORE USE Windows 10

NEXT GENERATION APP CONTROL Secure your devices with Device Guard DEVICE GUARD Hardware Rooted App Control

Windows desktop can be locked down to only run trusted apps, just like many mobile OS’s (e.g.: Windows Phone) Untrusted apps and executables, such as malware, are unable to run Signed policy secures configuration from tampering Protects system core (kernel mode) and drivers from zero days and vulnerabilities Requires Windows 8 certified or greater hardware with VT-X and VT-D DEVICE GUARD IN VBS ENVIRONMENT DECISIVE MITIGATION

Apps #2 #3 DEVICE GUARD Trustlet Trustlet Windows Platform Services

Kernel Kernel

Windows Operating System SystemContainer

Hyper-V Hyper-V

Device Hardware

Hypervisor

WINDOWS DEFENDER ANTI-VIRUS PROTECTION

Protection that competes to win Scored 98.1% detection rating from AV Comparatives testing Microsoft Protection Stars AVTest against top competitors (March 2016). 6 5

Behavior and cloud-powered malware detection 4 Can detect fast changing malware varietals using behavior monitoring and cloud-powered protection that expedites signature delivery 3 2 Tamper Resistant Windows Trusted Boot and platform isolation protect 1 Windows Defender from attacks and enable it to self-repair 0 2014 2015 2016 Built into Windows and Always Up-To-Date No additional deployment & Infrastructure. Continuously up-to- date, lower costs VIDEO: HOW FAST CAN WINDOWS DEFENDER LEARN ABOUT NEW MALWARE AND BLOCK IT? THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

Device integrity SmartScreen Windows Hello :) BitLocker and Conditional Access BitLocker to Go Device control Windows Firewall Credential Guard Windows Defender Microsoft Edge Windows ATP Information Device Guard Protection Windows Defender WINDOWS 10 IDENTITY GOALS

Mainstream Make credentials Deliver solution Provide a two-factor theft resistant to both solution that authentication and breach and consumer and works in all phish proof business users scenarios and industries Windows 10

USER IDENTITY & AUTHENTICATION SHARED SECRETS

shhh! Easily mishandled or lost (Hint: The user is the problem) PKI SOLUTIONS

Complex, costly, and under attack ENTERPRISE DEMANDS

Simplify Reduce costs implementation WINDOWS HELLO FOR BUSINESS Device-Based Multi-Factor

USER CREDENTIAL

UTILIZE FAMILIAR SECURED BY DEVICES An asymmetrical key pair HARDWARE Provisioned via PKI or created locally via Windows 10 BIOMETRIC MODALITIES

 Improved security

 Fingerprint and facial recognition

 Ease of use

 Impossible to forget

 VBS support COMPANION DEVICE AUTHENTICATION

WINDOWS HELLO COMPANION DEVICE FRAMEWORK

Phone WearableBand 2 USB CardRFID COMPANION DEVICE SCENARIOS

Companion as second factor Credentials are mobile and remain on companion

Increase convenience and improve security. Adds additional security by storing creds off of the device. Helps with compliance and convenience. Windows 10

DERIVED CREDENTIALS & ACCESS TOKENS “PASS THE HASH” ATTACKS

Today’s security challenge TODAY’S SECURITY CHALLENGE: PASS THE HASH ATTACKS

1. 2. 3. Single IT Pro’s machine is Using IT Pros Repeat compromised attacker looks for kiosk/shared devices and IT Pro manages mines them for tokens kiosks/shared devices on network Attacker steals IT Pro’s Access to one access token device can lead to access to many TODAY’S SOLUTION: CREDENTIAL GUARD

 Pass the Hash (PtH) attacks are the #1 go-to tool for hackers. Used in Apps

nearly every major breach and APT #2 #3 type of attack Credential Credential Guard  Credential Guard uses VBS to isolate Trustlet Trustlet Windows Platform Windows authentication from Services Windows operating system

 Protects LSA Service (LSASS) and Kernel Kernel

derived credentials (NTLM Hash) Windows Operating System SystemContainer  Fundamentally breaks derived

credential theft using MimiKatz, Hyper-V Hyper-V

Device Hardware

Hypervisor

THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

Device integrity SmartScreen Windows Hello :) BitLocker and Conditional Access BitLocker to Go Device control Windows Firewall Credential Guard Windows Defender Microsoft Edge Windows ATP Information Device Guard Protection Windows Defender YOUR INFORMATION PROTECTION NEEDS

DEVICE DATA LEAK SHARING PROTECTION SEPARATION PROTECTION PROTECTION

BitLocker enhancementsProtect system andin Containment Prevent Protect data when Windowsdata when 8.1 device is Data separation unauthorized users shared with others, lost or stolen and apps from or shared outside InstantGo accessing and of organizational 3rd party adoption leaking data devices and control INFORMATION PROTECTION NEEDS

DEVICE DATA LEAK SHARING PROTECTION SEPARATION PROTECTION PROTECTION

Azure Rights Management BitLocker enhancements in Office 365 Windows 8.1 InstantGo 3rd partyBitLocker adoption Windows Information Protection Windows 10

DATA-AT-REST PROTECTION The threat of lost or stolen devices DEVICE ENCRYPTION BitLocker

Modern devices may be encrypted out- of-box with BitLocker technology Increased global acceptance of TPM TPM pervasive on Windows devices by end 2015 Easiest deployment, leading security, reliability, and performance Single sign-on for modern devices and configurable Windows 7 hardware Enterprise grade management (MBAM) and compliance (FIPS) INFORMATION PROTECTION NEEDS

DEVICE DATA LEAK SHARING PROTECTION SEPARATION PROTECTION PROTECTION

Protect system and Containment Prevent data when device is unauthorized apps Data separation lost or stolen from accessing data MARKET SOLUTIONS FOR DATA LOSS PREVENTION

Mobile Platforms Desktop Platforms

Using Containers Limited Platform Integration Compromised user experience Better user experience Ease of deployment Difficult to deploy Lowest cost Higher cost INTRODUCING WINDOWS INFORMATION PROTECTION Integrated protection against accidental data leaks

Protects data at rest locally and on removable storage.

Common experience across all Windows 10 devices with copy and paste protection. Corporate vs personal data identifiable wherever it rests on the device and can be wiped. Ships in the Windows 10 Anniversary Update

Prevents unauthorized apps Seamless integration into from accessing business data the platform, No mode and users from leaking data switching and use any app. via copy and paste protection. WINDOWS INFORMATION PROTECTION LIFECYCLE Corporate Data Private Data & & Apps Apps Block User is not allowed to copy/paste data

Override User gets prompted Y/N if he/she wants to Y/N copy/paste data

Silent User copy/paste data, but gets Logging audited Off No WIP

Encrypted Unencrypted Corporate Data & Apps Block Private Data & Apps

Can copy/paste but encrypted

Can attach and/or transfer the data decrypted

Encrypted INFORMATION PROTECTION NEEDS

DEVICE DATA LEAK SHARING PROTECTION SEPARATION PROTECTION PROTECTION

Containment Prevent Protect data when unauthorized apps shared with others, BYOD separation from accessing or shared outside data of organizational devices and control SHARING PROTECTION Rights Management Services

Protect all file types, everywhere they go, cloud, email, BYOD, …

Support for all commonly used devices and systems – Windows, OSX, iOS, Android

Support for B2B and B2B via Azure AD

Support for on premise and cloud based scenarios (e.g.: Office 365) Seamless, easy to provision and support for FIPS 140-2 regulation and compliance THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

Device integrity SmartScreen Windows Hello :) BitLocker and Conditional Access BitLocker to Go Device control Windows Firewall Credential Guard Windows Defender Microsoft Edge Windows ATP Information Device Guard Protection Windows Defender Windows 10

SECURE YOUR ENVIRONMENT WITH CONDITIONAL ACCESS Keep unhealthy devices out with Intune and Windows Device Health Attestation. UNKNOWN PC HEALTH

Important resources

Today health 1 is assumed 2 WINDOWS DEVICE HEALTH ATTESTATION ENABLES:

MDMS to gate access based on device integrity 3 4 Important resources and health 5

2

1 ATTACKS HAPPEN FAST AND ARE HARD TO STOP

If an attacker sends an email …23 people will open it… …11 people will open the …and six will do it in the to 100 people in your attachment… first hour. company… WINDOWS DEFENDER ADVANCED THREAT PROTECTION

DETECT ADVANCED ATTACKS AND REMEDIATE BREACHES

Built into Windows No additional deployment & Infrastructure. Continuously up-to-date, lower costs.

Behavior-based, cloud-powered breach detection Actionable, correlated alerts for known and unknown adversaries. Real-time and historical data.

Rich timeline for investigation Easily understand scope of breach. Data pivoting across endpoints. Deep file and URL analysis.

Unique threat intelligence knowledge base Unparalleled threat optics provide detailed actor profiles 1st and 3rd party threat intelligence data.

Secure Secured Information Threat devices identities protection resistance THE WINDOWS 10 DEFENSE STACK

PROTECT, DETECT & RESPOND

PRE-BREACH POST-BREACH

Breach detection Device Threat Identity Information investigation & protection resistance protection protection response

DeviceDevice integrity Health SmartScreen WindowsBuilt-in Hello 2FA :) DeviceBitLocker protection and / WindowsConditional Defender Access attestation DriveBitLocker encryption to Go ATP Device control WindowsAppLocker Firewall AccountCredential lockdown Guard Windows Defender Device Guard MicrosoftDevice Guard Edge Credential Guard EnterpriseWindows Data ATP Device Control Microsoft Passport InformationProtection WindowsDevice DefenderGuard Protection Conditional access Security policies WindowsNetwork/Firewall Defender Windows Hello :) STIJN VANNUT Windows 10 Offerings

Business Productivity Roadmap

Kick-off meeting

Discovery sessie

Business Requirements workshop

Architectuuranalyse

Project Roadmap Realdolmen Education offering

• Custom User Adoption Program

▶ Tailor-made

▶ Accompany the user in the journey towards a new way of working

• Systems management trainings

▶ Microsoft Certified Trainers

▶ Largest Microsoft Learning Partner in Belgium

▶ Open with guaranteed schedule

• More information

▶ http://education.realdolmen.com

[email protected]

▶ Open calendar training Supporting & Troubleshooting Windows 10, starting March 20 Upcoming event

• 21/2, Filliers Meeting Center, Deinze • 23/2, De Hoorn Leuven

• Voor wie? Zowel business als IT