Die Präsentation wird geladen. Bitte warten

Die Präsentation wird geladen. Bitte warten

Product Solution Manager| Windows Client | Microsoft Deutschland GmbH

Ähnliche Präsentationen


Präsentation zum Thema: "Product Solution Manager| Windows Client | Microsoft Deutschland GmbH"—  Präsentation transkript:

1 Product Solution Manager| Windows Client | Microsoft Deutschland GmbH
Der Geschäftsnutzen Windows vision is simple, and it’s global A highly valued Windows experience on every desk, in every home, and for every person. Windows is about giving customers the best computing experience possible by taking advantage of the depth and breadth of our platform. Windows supports the widest range of applications, services and hardware in a familiar way – so each person can easily and confidently use technology to achieve their goals and pursue their passions. Windows Vista is the biggest release of Windows ever Windows Vista is the largest development project and largest investment that Microsoft has ever made. It is fundamentally different from any earlier version of Windows, and this difference is already sparking innovation and opportunity across the entire computer industry. Significant release for all customers – this presentation is focused on businesses We expect Windows Vista to be a significant release for all Windows customers - enterprises, small and medium-sized businesses, consumers, and developers and partners and we will have versions that meet the needs of different audiences. For the purposes of this presentation however we will focus on Windows for corporations and what they should do next to take advantage of this next wave of industry innovation. This presentation is targeted at senior business and financial executives, IT decision makers who are concerned with or make decisions about their organization’s investments, IT strategy or have an interest in ensuring the productivity of their company’s workforce. Bastian Braun Product Solution Manager| Windows Client | Microsoft Deutschland GmbH

2 IT Heute… Herausforderungen und Möglichkeiten
Hardware Varianten Teamarbeit / Zusammenarbeit Verteilte Arbeitsstätten Kostensenkung Geschäftswissen Gesetzliche Anforderungen Systemverfügbarkeit Unterschiedliche Formfaktoren und Netzwerke [DRAFT SPEAKER NOTES] This slide highlights challenges facing organizations today and industry trends that are driving tomorrow’s opportunities. Today’s challenges – security, compliance, or just keeping machines up and running – take a huge amount of the typical IT organization’s time. IT Pros find themselves running in place to keep up the status quo rather than focusing on new opportunities that can drive business value. The next generation of Windows needs to address these challenges, making it easier and more cost-effective for organizations to address the problems they have today, freeing up time for high-value work. But the next generation of Windows needs to do more than address today’s challenges. It needs to make it easier for organizations to take advantage of new opportunities. Industry trends such as peer-to-peer connections, unified communication, and hardware enhancements and new form factors offer great opportunities to companies that leverage them effectively. Windows Vista does both. It will help you effectively address today’s challenges, driving down IT costs, and makes it much easier for you to integrate new technology into the way your company does business. Challenges Today Security Security Exposure and pressure to reduce direct costs of managing desktops are top concerns. Large organizations allocate 1-5% of total IT budget to security (Source: 2004 CSI/FBI Computer Crime and Security Survey Viruses, denial of service, and theft of proprietary info are top 3 causes of data loss (Source: 2004 CSI/FBI Computer Crime and Security Survey ) Laptop stolen in Berkeley last month had 98,000 record of SSN and other personal data of grad students- data was not protected (Source: SF Chronicle) Pressure to Reduce Costs Cost of deploying and managing desktops Large organizations spend up to $100K per OS image/ year today with hundreds of images to maintain (Source: Meta Group; 100K is an annual compensation + benefits of a full time person, as it is estimated 1 FT IT person is needed to support and service an OS image, that includes app compat testing, etc) OS deployment and user migration takes big companies up to 6-7 hrs / PC today (Source: Wipro/ Microsoft study) Total cost of ownership for a desktop can reach up to $5,520 per PC per year in non well-managed environments (Source: Gartner) Productivity Hidden costs and wasted productivity is also a concern and a potential opportunity to add money back to business, if addressed >80% of enterprise's digitized information reside in individual hard drives and files (Source: Microsoft) Companies spend up to $18K/yr per employee in lost productivity when employees can’t find data and/ or have to re-create misplaced documents. This doesn’t include opportunity cost. (Source: IDC, $$ derived from time KWs employees spend on searching for info and their compensation ) Growing complexity The need to support increasingly complex environment adds to costs and complexity Employees get 50%-75% of their relevant information directly from other people (Source: Gartner) The client market is rapidly fragmenting from few form factors to many (Source: IDC) The total number of wireless hotspots WW is estimated to reach 250,000 WW by 2008 (Source: IDC) Keep Systems Up & Running Reliable, scalable, high-performing infrastructure Opportunities Tomorrow: Hardware Abundance Incredible power, storage and connectivity New form factors Evolving User Model From browse, to search, to subscribe Access not enough Peer-to-Peer Connections going direct Unified communication Sicherheit Anwender Schnelle Markteinführung

3 Windows Vista Geschäftsszenarien
Optimierung der Desktop Infrastruktur Produktivität Sicherheit und gesetzliche Anforderungen Mobiles Arbeiten Security & Compliance Security Exposure and pressure to comply with regulatory requirements Viruses, denial of service (unauthorized access), and theft of proprietary info are top 3 causes of data loss (Source: 2004 CSI/FBI Computer Crime and Security Survey ) Nearly half of all enterprises had laptops stolen causing $4.1M in damage in hardware only (CSI/FBI) It is estimated that one stolen notebook can cost a business as much as $89K (CSI/FBI) Laptop stolen in Berkeley last month had 98,000 record of SSN and other personal data of grad students- data was not protected (Source: SF Chronicle) Large organizations allocate up to 5% of total IT budget to security (Source: 2004 CSI/FBI Computer Crime and Security Survey Security vulnerabilities have increased desktop TCO approximately $200 per user per year (Gartner) Companies are being required to adhere to increasing strict regulatory requirements, including: Sarbanes-Oxley (addresses practices and controls around financial accounting preparation at public companies) 21 CFR Part 11 (addresses acceptance of Electronic Records and Electronic Signatures by the FDA) HIPAA (addresses the use and disclosure of health information for companies subject to the Privacy Rule, including health plans and health care providers) Desktop Management Pressure to reduce direct costs of managing desktops Large organizations spend up to $100K per OS image/ year today with hundreds of images to maintain (Source: Meta Group; 100K is an annual compensation + benefits of a full time person, as it is estimated 1 FT IT person is needed to support and service an OS image, that includes app compat testing, etc) OS deployment and user migration takes big companies up to 6-7 hrs / PC today (Source: Wipro/ Microsoft study) Total cost of ownership for a desktop can reach up to $5,520 per PC per year in non well-managed environments (Source: Gartner) Empowered Professional Leveraging corporate knowledge assets to make faster, better decisions More than 90% of private sector and 40% of public sector have at least one KM initiative Recent initiatives by GE and BofA suggest 7-20% improvement in productivity gains possible Potential Scenarios: INFORMATION MANGEMENT ACCELERATOR (shared organizational memory) FINANCIAL SYSTEMS INTEGRATION PORTAL (Bank integration) GOVERNEMENT RECORD ARCHIVAL (giving individuals easier access to government information) CALL CENER (leverage support information to reduce call time) VIRTUAL MARKETPLACE (Build content and services on a mobile platforma that can be virtually delivered anywhere Hidden costs and wasted productivity is also a concern and a potential opportunity to add money back to business 68% of US midsize businesses reported that improving productivity was their #1 business priority in 2005 >80% of enterprise's digitized information reside in individual hard drives and files (Source: Microsoft) Companies spend up to $18K/yr per employee in lost productivity when employees can’t find data and/ or have to re-create misplaced documents. This doesn’t include opportunity cost. (Source: IDC, $$ derived from time KWs employees spend on searching for info and their compensation ) Enabling Virtual Workforce Improving efficiency and reducing support costs of mobile workers and branch offices Mobile PC growth outpacing desktop growth – 2005, 6.4% of workers migrating to mobile PCs (Gartner) 30% of businesses have remote sites, 55% of enterprise headcount in branch sites Branches consume nearly 33% of IT budgets LORGS spend $25B on WANs in 2003 The total number of wireless hotspots WW is estimated to reach 250,000 WW by 2008 (Source: IDC) Growing cost and complexity of supporting a collaborative work environment Employees get 50%-75% of their relevant information directly from other people (Source: Gartner) The client market is rapidly fragmenting from few form factors to many (Source: IDC) Demand for new technologies that more efficiently foster collaboration, such as software that allows virtual meetings, where everyone doesn't need to be present simultaneously. "Our communication tools are woefully inadequate," says Alph Bingham, a top executive at Eli Lilly who is vice-president of e.Lilly. "We are still relying on sticking everyone in a room and hammering it out. It's untenable globally.“ (BusinessWeek) Confident Delayed adoption can actually cost organizations more money due to increased IT support requests, increased desktop-management costs, ineffective security measures, and other direct and indirect IT costs The new security features in Windows Vista protect information-based businesses from unauthorized, accidental, and intentional misuse of intellectual property. These features provide a foundation on which partners can build additional security solutions that protect against particular risks that an organization faces. Reduce end-user disruptions, because this downtime costs organizations millions of dollars in lost productivity every day Faster deployment and easier maintenance, allowing organizations to reduce inefficiencies and executives to focus attention on other organizational goals End users experience less downtime and disruption, which translates into greater productivity and a higher overall ROI Windows Vista is more efficient to deploy than earlier versions of Windows. Windows Vista will lower the time and cost of deployment by providing features like image-based setup; image creation, editing, and servicing tools; and scriptable migration of applications and data Windows Vista is more reliable than any other version of Windows Applications will launch faster, helping users get to work faster and reducing a common frustration Clear Nearly 75 percent of the value of refreshing the desktop client is derived directly from business-related benefits.[1] [1] Gartner Research, “Empowering Business on the Desktop: Using Gartner TVO to Measure the Financial Value of Enterprise Client Refresh” (December 2003). Most organizations don’t fully leverage the information they’ve accumulated, as they have a limited means by which to organize and retrieve knowledge from it. To address this need, Windows Vista provides tools for faster searching and better data organization. Windows Vista provides comprehensive, out-of-the-box organization and search features that deliver a core information-management platform. These features are customizable and provide a foundation for future business needs. These tools are the basis for the Windows Vista knowledge-management capabilities, which are easier to use and more cost-effective than dedicated third-party information-management With file-based metadata, an organization can specify how it wants to describe and classify business information. This feature provides organizations with unparalleled access to and control over information Connected Approximately 30% of businesses have remote sites, and 55% of large organizations’ headcount is in branch sites[1]. Many organizations struggle to leverage technology to enhance communication and collaboration between their increasingly fragmented people and processes. Currently, access to corporate networks is fragile, requiring complex, unstable connections though Virtual Private Networks (VPNs), remote dialers, and other third-party software. Proprietary solutions are expensive and often only work in limited scenarios. [1] Microsoft Research Windows Vista enables mobile, remote, and disconnected employees to be more productive regardless of their location. Windows Vista mobility features enable greater flexibility and lower end-user disruption by providing faster access to information and quicker mobile transitions. The Synchronization Manager provides seamless synchronization. To a mobile workforce, the availability of data is critical. The Synchronization Manager allows users to synchronize business information seamlessly between online and offline states, providing them with local copies of important files that are automatically synchronized when a connection is available Collaboration features allow employees to interact regardless of location. Windows Vista provides out-of-the-box collaboration features. The ad-hoc peer-to-peer Connection Manager enables mobile employees to collaborate simply and securely without access to the corporate network, for example

4 Optimierung der Desktop Infrastruktur
Driving IT Efficiency Technologies, Tools, Best Practices Optimierung der Desktop Infrastruktur IT Effizienz steigern Technologien, Werkzeuge, bewährte Lösungen Trends und Fakten Die Kosten für die Bereitstellung reichen von 200$ bis mehr als 1000$/ PC Große Deploymentprojekte können 18 bis 24 Monate dauern Jährliche IT Arbeitskosten pro PC: $, abhängig vom Automatisierungsgrad der IT Supportanrufe: im Durchschnitt 20$/Anruf, ca. 10 Anrufe/Anwender in großen Unternehmen Komplexität der Netzwerke erhöht die Kosten (bis zu 10% des IT Budgets wird teilweise in Netzwerke investiert) Kosteneffiziente Netzwerke Reduktion der Supportkosten Vereinfachtes Desktop-Management Senkung der Kosten für die Bereitstellung der PC Quellen: Gartner, Microsoft, Wipro

5 Optimierung der Desktop Infrastruktur
Senkung der Kosten für die Bereitstellung der PC Vereinfachtes Desktop-Management Anwendungskompatibilität (Werkzeuge und Online Community) Hardware- und sprachunabhängiges Image BDD als DAS Instrument für die Bereitstellung der PC Erweiterte Gruppenrichtlinien Offene, XML-basierte Ereignisbericht-Schnittstelle Integration mit Managementwerkzeugen Optimierung der Desktop Infrastruktur Supportkosten reduzieren With Windows Vista, you are in control and can take more granted. Significant investments have been made in the fundamentals of the operating system to free you from worrying about security, reliability and management of the PC. Windows Vista will be more secure and easier to manage, with new features that improve performance and reliability. Deployment and Servicing Single WW Binary – Each image costs corps ~$100K/yr. [Meta] HAL is no longer a constraint, (in-built HAL detection), settings migrate File-based imaging with WIM, reduces increases hardware independence! Patch Images Directly – Also Restart Manager allows you to patch with fewer reboots, service images offline with the same patch you would apply onto a running OS. Application compatibility [NEED PROBLEM STATEMENT AND DESCRIPTION OF IMPROVEMENTS] Performance & Reliability More Responsive: Smart Caching Load Times – SuperFetch SuperFetch proactively gets the right content into memory to optimize app launch and file-load times. Prefetch based on current and historical use patterns Page priority not based on simple Least Recently Used Takes into account frequency of page usage, usage of page in context of other pages in memory Adapts to memory usage patterns, including complex usage scenarios Intelligent algorithms and new technology ensure consistent performance Optimizes based on usage patterns over time All pages that flow through memory are tracked Low priority I/O - Low impact pre-fetching and pre-population Fewer reboots, crashes and hangs: Meta Group: 7.33 hrs / yr / user rebooting PC due to crash Resource exhaustion detection and recovery can detect when your computer is about to hang and warn you before data is lost Fast boot –design goals 2-3 second resume from Sleep 10-15 seconds from cold boot.  Management Built-in Diagnostics. Developers can access data and OS will automatically mine this data and take action. More Group Policy Settings, Easier to Use: Policy settings added to manage removable storage devices, printers, IE settings, power settings, etc. Unified Event Log: All operational information is available in a single place – the easy-to-use redesigned Event Viewer Reliability and Supportability The Reliability Monitor displays data collected from RAC in a stability chart and correlates the computer's stability index with important events that are likely to affect stability, such as driver failures and software installation. Kosteneffiziente Netzwerke Eingebaute Selbstdiagnose und Selbstheilung des Systems Dynamisches Hilfe-System Leistungsbewertung und Tools Transparente IPv6 Unterstützung Granulare Netzwerk-Gruppenrichtlinien Selbstoptimierendes Netzwerk

6 Sicherheit und gesetzliche Anforderungen
Mehrere Sicherheitsebenen Trends und Fakten Durchschnittlich $ Sicherheitsbedingte Ausgaben/Mitarbeiter Vermehrte Verluste durch Informationsdiebstahl und unberechtigten Zugriff Notwendige Einhaltung gesetzlicher Bestimmungen Mehr als Laptops gingen 2005 in den USA verloren Steigender Mißbrauch persönlicher Daten (Phishing) Wiederherstellung und Schutz von Informationen Identitäts- und Zugriffskontrolle Verminderung von Bedrohungen und Sicherheitslücken Fundamental sichere Plattform Quellen: CSI/FBI Computer Crime & Security Survey 2005; Safeware Insurance Agency

7 Sicherheit und gesetzliche Anforderungen
Verminderung von Bedrohungen & Sicherheitslücken Fundamental sichere Plattform Konstante Weiterentwicklung der Sicherheitsfunktionen Nachbildung von Gefahrensszenarien und Codeüberprüfung Zertifikate öffentlicher Einrichtungen IE abgesicherter Modus; Anti-phishing Anti-Spyware (Windows Defender) Absicherung der Windows Dienste Sicherheit und gesetzliche Anforderungen Wiederherstellung und Schutz von Informationen Fundamentally Secure Platform We have several processes in place to ensure that Windows Vista is secure by design. First of all every developer has gone through mandatory security training. That is not a one-time event. We do that on an ongoing basis to ensure that developers are re-trained with latest techniques and tools. The net result of engineering excellence is making sure that we have fewer vulnerabilities in our products. We think the best approach from a patch management standpoint is to have as few patches as possible for you. During the requirements phase, the product team makes contact with the central security team to request the assignment of a security advisor (referred to as the "security buddy") who serves as point of contact, resource, and guide as planning proceeds. The security advisor assists the product team from project inception through completion of the Final Security Review and software release. The third piece is threat modeling in the design phase. Now product teams are required to conduct threat modeling at a component-by-component level. Threat modeling is a structured methodology to identify potential threats to the assets managed by the software. The next part is ensuring that in our ship schedule, we have formal security reviews and testing built into that. And finally we have metrics for the product teams around security. So people’s performance is evaluated on the security of their code. These are all critical things in making sure that Windows Vista is the most secure operating system we've ever shipped. Common Criteria (CC) certification provides a high level of assurance for a secure end-to-end computing environment. Windows Vista is independently tested in 3rd party labs using criteria set by the International Standards Organization (ISO). We are targeting EAL4 and Single Level OS Protection Profile certifications for Windows Vista. Threat and Vulnerability Mitigation IE7 on Vista offers major security improvements: ActiveX Opt-in and Protected Mode and Anti-phishing filter: ActiveX Opt-in is designed to give users more control over the software running on their PCs. To reduce the attack surface, ActiveX Opt-in will disable by default ActiveX controls that are rarely used or were never intended to be invoked in IE.  Controls that users have installed via a web download or have been used in IE before upgrading to IE7 will be enabled by default. Users will have the option to enable controls as needed using the same Information Bar they have used to install new controls since Windows XP SP2. While the final implementation is still being developed, the goal is a safer browsing experience for users with the add-ons they value already enabled and ready for use. Protected Mode offers users a powerful security enhancement by reducing the severity of threats faced by malicious attacks. A new feature in IE7 for Windows Vista, Protected Mode eliminates the silent install of malicious code through software vulnerabilities. Protected mode accomplishes this by running IE in isolation from any other application or process in the operating system and limiting the IE process from writing to any location beyond Temporary Internet Files without explicit user consent. Running IE in isolation prevents it from accessing other applications, even other instances of IE, removing any potential for escalation of privilege by using a buffer overrun attack. A Protected Mode IE session will still enable users to enjoy the powerful extensibility and unique website features they are used to having with IE. Protected Mode will only be available in Windows Vista. Phishing Filter helps users identify malicious websites that might seek to extract personal information or install malware. The Phishing Filter uses heuristics (ie, images hosted on another server, IP address instead of domain name) to identify suspicious websites. It also checks sites against a list of known phishing sites. Colored Address Bar & Improved SSL In IE7 we use the address bar as a visual queue to convey information about the intent of a website: green (known good), yellow (suspicious), red (known bad) Defender -Improved detection and removal. Based on a new engine, Windows Defender is able to detect and remove more threats posed by spyware and other potentially unwanted software. Real-time protection, which helps prevent unwanted software from being installed, has also been enhanced to better monitor critical points in the operating system for changes. A redesigned and simplified user interface. The Windows Defender user interface has been redesigned to make common tasks such as scanning and removal easier to accomplish, and offers a warning system that adapts alert levels according to the severity of a threat. (** Mention spynet sharing here). Protection for all users. Windows Defender can now be run by all users on a computer with or without administrative privileges. This ensures that all users on a computer are protected by Windows Defender.Differences from Windows Defender for XP: Faster scanning than in XP;Tighter integration with Windows Security Center Service Hardening Let me talk a little bit more about another great Windows Vista security feature which is something that we call “Windows Service Hardening.” Windows Service Hardening is all about our Defense In Depth strategy. What we’re doing in service hardening is making sure that even if there is a vulnerability in a service, and that vulnerability is compromised by exploit code, that exploit code isn’t allowed to propagate to other machines on the network. If you look at something like the Blaster Worm that happened a couple years ago, what it did was exploit vulnerability in the RPC Service and it forced RPC to write a file to the file system that RPC shouldn’t be able to do. It actually wrote a Run Key in the Registry to make sure that it would persist after a reboot. And also actively talked outbound on the network and tried to infect other machines. With service hardening, we reduce the size of high risk layers in other words protecting the kernel and system files. We do that by profiling the entire core Windows services and determining access boundaries such as what part of the file system, registry and ports the service can write to or manipulate. We will enforce that behavior at run time. If necessary we segment the services to ensure pieces of the services that need to run with higher privileges are separated from the one which doesn’t require that level of privileges. Network Access Protection is a set of technologies built into Windows Vista and Windows Server Longhorn that will make it easier for your IT administrators to require compliance to health policies as a pre-requisite for accessing the corporate network. What happens to a client when it tries to access the network in a NAP-enabled world? Lets go through the process. : Client requests access to network and presents current health status DHCP, VPN or Switch Router relays health status to Microsoft’s AAA server, called Network Policy Server The Network Policy Server validates this against IT-defined health policies If the machine is policy compliant, it’s given immediate access to the corporate network If the machine is not policy compliant, it is put in a restricted VLAN and given access to fix up resources to download patches, configurations, signatures, etc. With real time assessment, containment and remediation, Network Access Protection ensures that only healthy systems connect. The NAP platform gives you the flexibility to enforce access through a variety of means – be it via DHCP, VPN, IPsec and/or 802.1X. This means that your company can design and scope your deployment to suit your unique business requirements. You can configure a system specific to the risks and threat levels you face. Network Access Protection platform integrates with Active Directory, SMS, Security Center, Microsoft Update and Windows Update. We also look to our partners to help. Microsoft has made Network Access Protection an open platform for the industry. Our partners have announced support of the NAP platform in their product lines. This responds to our common customers’ requirements to provide a multi-vendor, interoperable, end-to-end solution. Identity and Access Control UAC Reduce the attack surface. Do this by running almost everything as Standard User. Even if you log on as admin! We have to make sure that applications still work! Even ones that are designed to the Win95 security model. Put the admins back in control of their machines. You should know when something impactful is going to happen to your machine Change the way Windows runs—common user tasks and applications won’t need administrator access Provide simple mechanism for elevating privilege for install/uninstall Make it easy even for local admins to run with least privilege Fix some common inappropriate admin checks—installing printer, changing the clock When users run with least privilege, malware has little opportunity to do damage Smartcards Windows Vista includes new advances in the smartcard infrastructure components, such as a common Cryptographic Service Provider (CSP) and integrated third-party Card Communication Modules. Card Communication Modules facilitate rapid deployment and enable more secure, predictable communications between the CSP and the card middleware. The Microsoft base smartcard CSP implements all of the standard back-end cryptographic functions for hardware manufacturers and software developers. With a common CSP, the resulting security model is dramatically simplified, much less error-prone, and more secure—providing a more reliable total solution and allowing for simpler integration. Information Protection Bitlocker BitLocker Drive Encryption is a hardware-based data protection feature that addresses the growing concern over corporate and customer data on lost or stolen machines. The feature uses full volume encryption to ensure that a thief or hacker who obtains a system is not able to access the data that resides on it. Data is protected by preventing unauthorized users from breaking Windows file and system protection on lost or stolen computers. This protection is achieved by encrypting the entire Windows volume. This improves data security and reduces equipment repurposing concerns. The feature is simple to deploy, use and enables easy recovery. Customers have several choices of how to deploy BitLocker, with a range of Ease of Use/Security choices: From an ease of use standpoint, the TPM-only solution is completely transparent to the end user. There is no special end user interaction necessary in this mode. The decryption key is released if the operating system hasn’t been tampered with, based on operating system measurements that are stored in the TPM chip. If you want to deploy BitLocker to a machine without a TPM chip, the dongle-only solution is the only choice. The key to decrypt the volume is stored on a USB flash device with this deployment method. The end user has to plug in the USB dongle each time the machine is booted, so ease of use isn’t as good as with the TPM. The major downside to this deployment method is that it’s reliant on human behavior. If the end user leaves the USB flash drive with the decryption key in their laptop bag, and the thief gets the laptop bag, he can decrypt the user’s data. With this deployment method, the user needs to keep the USB flash device separate from their laptop, perhaps on their keychain. A TPM + PIN solution is the best balance between security and usability. With this solution, the user simply has to enter a PIN each time the system is booted. That is low overhead on the end user, and the system won’t boot at all unless the PIN is entered. The most secure, and least usable, way of deployment is TPM + Dongle. With this deployment method, the system will only boot if the OS hasn’t been tampered with while offline, and if the user inserts the correct USB flash device. This is more of a three-letter government agency solution than it is something that the average corporation would deploy. Identitäts- und Zugriffskontrolle Verbessertes Berechtigungssystem Erweiterte Benutzer-Authentifzierung Granulare Protokollierung sicherheitsrelevanter Ereignisse Festplattenverschlüsselung (Windows BitLocker™ Drive Encryption) Schattenkopie und Sicherung des Systemzustands (Schnappschuß)

8 vereinfachte Benutzeroberfläche
Produktivität Mitarbeiter im Fokus Trends und Fakten Geschäftserfolg entsteht durch Mitarbieter In den meisten Branchen sind Personalkosten höher als Investitionskosten Informationsbeschaffung ist teurer als deren Wert (sagen 60% der Manager) Bis zu $ Produktivitätsverlust pro Mitarbeiter um verlorene Informationen zu finden oder wieder herzustellen Anwender Selbsthilfe: Std./ Jahr vereinfachte Benutzeroberfläche Online-Produktivität Informationen leicht finden Leistungsstarker und zuverlässiger PC Quellen: Harvard Business Review; IDC; Microsoft

9 Erfolgreiche Mitarbeiter
Finden und Verwalten von Informationen Leistungsstarker und zuverlässiger PC Problemdiagnose und Lösung Leistungssteigerung durch SuperFetch™ Speichererweiterung durch USB-Speicher schnelle, integrierte Desktopsuche Organisation auf Basis von Metadaten XPS Dokumentenformat Erfolgreiche Mitarbeiter Vereinfachte Benutzeroberfläche Online-Produktivität Why it Matters to IT Departments Fewer support calls for hard-to-find stuff Faster performance, happy internal users Maximizing hardware investments Windows Vista will help your company PC users to get more work done by providing them with intuitive tools to organize information, enabling multiple collaboration and data sharing scenarios and streamlining the user interface The graphical experience increases clarity, productivity and focus for the end user.  Moving beyond generic "icons" Windows Vista now represents your files in more intuitive ways -visually capturing the "live" contents of your work and simplifying the process of locating your information. Windows Vista also introduces a brand new way of organizing your information –providing a flexible way to store, manage, find and organize the data that you work with every day. This helps you make the most of your time to be creative; generate new ideas, solve problems, be artistic or just relax and be entertained. You can make the most of your time and do what you want. Problem statement. (According to an MSFT study) Instant Search: 38% of managers waste substantial time locating information; 60% - the cost of gathering information outweighs its value; Windows Vista provides powerful, integrated search capabilities help you find just about anything on your PC without having to manually search for it. Just type in a keyword or any part of the file name and instantly find the exact item you are looking for. Enterprise-ready Fast, integrated desktop search Start menu quick search Organizing: Search is important, but a symptom of a problem. We don’t know where our stuff is. New information management tools in Windows Vista make it easy to view and organize your files any way you want. With just a click, you can instantly see all of the files across your personal computer in ways that make sense to you New Search Folders and views [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Filter-based column controls [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Metadata support [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Visualization: New live icons help you see past traditional system icons, so you can see live previews of applications, documents, photos and videos and the data underneath. Clearly see what is there and go directly to the item that you want – just like you would be able to at your own desk Live Icons: See your information, get what you need faster Preview and Reading Pane: [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Efficient Windows management: [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] UI is responsive and provides feedback – things happen naturally instead of just appearing on screen Not just about looking great, but enabling greater productivity and richer experiences Taskbar thumbnails Flip and Flip 3D Performance: New technology in Windows Vista makes your PC significantly more responsive in performing everyday tasks. Improved Startup, Shutdown and Sleep performance helps both desktop and mobile PCs get up and running quicker. And Windows Vista manages both memory and I/O devices more efficiently, making the computer more responsive to user applications. In addition to in-the-box improvements, Windows Vista is designed to take advantage of the latest hardware to improve system performance. External Memory Devices (EMD) boost performance without the need to add RAM. Windows Vista also takes advantage of Hybrid Hard Drive technology to improve reliability, battery life, and performance. Finally, state-of-the-art self-tuning and diagnostics make it much easier for users and IT administrators to manage performance effectively. RSS Feeds - With new RSS Reader in Internet Explorer you can stay up to date of the latest information from your favorite websites by subscribing, viewing, and managing RSS feeds from supporting web sites from one central location on your Windows personal computer. Background information on RSS Feeds: RIFFS ON RSS: RSS: [SHOULD WE HAVE A BACK-UP SLIDE ON RSS???] Digital content can be customized. Search, targeting and content management software make it possible for every individual’s experience in a digital day to be unique. Unique to their interests. Unique to their locations. Unique even to their personalities. The staggering amount of content makes it possible for individuals to demand relevance. Newspapers and magazines, regardless of their global reach are personalizing to better compete in a world where individual relevance has become expected by their readers. “National” magazines routinely publish editorial and advertising tailored to specific cities. In some extreme cases, even to individual neighborhoods.  In the same way, more people are using technology such as digital video recorders to identify and capture the specific content customized to their particular viewing habits and interests. Similarly, people are always looking for ways to make the Web more focused and relevant to them. The Web used to be about browsing – clicking around different sites until you find something interesting. Then it was about searching – typing in keywords and sifting through the results until you found what you wanted. RSS adds a new way to interact with the sites users are already familiar with – enabling them to subscribe to the content they want and stay up to date automatically. Today’s blogs and news sites use RSS to deliver content to users, but this powerful new technology will soon enhance nearly everything that’s on the Web today. (Tivo the web) Subscribing changes the way you interact with information – just as digital video recorders ushered in an entirely new way to watch television, subscriptions and RSS give you a whole new kind of Web. Right now, you need to check and recheck web sites for updated information – but a subscription through RSS allows you to find the source of information you like once, and then have smart software deliver it to you automatically on a regular basis. Subscribing to content is a powerful new model of Internet usage that today is primarily used for news sites and blogs– but it has the potential to be more discoverable and the information it delivers more integrated across applications. Subscribing to information doesn’t replace searching or even browsing, but once you find something interesting, the user experience enabled by the subscribe model is substantially different and more compelling. Microsoft believes that there is a great deal of user benefit from this new model of subscribing to information. The power of RSS is its ability to enable the subscribe model across a wide variety of experiences. Our goal is deliver support for RSS so that developers and users can easily take advantage of this new model of information interaction.  There are many experiences today that work with RSS, and people use them in great and useful ways.  But we want Windows to go further to fill the gap between what is offered to today and the opportunities our developers see for the future Neue Reiterfunktionalität - Fenstervorschau / schnelles Umschalten RSS Feed Unterstützung Optimales Drucken von Internetseiten Windows Aero Windows Sidebar Visualisierung von Informationen

10 Mobiles arbeiten Die neue Art des Arbeitens fördern Trends und Fakten
Der Absatz von mobilen Geräten wird den von Desktops übertreffen (Vorhersage für USA in 2007) In Japan sind 56% der verkauften PCs Notebooks Die Gesamtzahl drahtloser Zugriffspunkte wird bis 2008 ca Stück erreichen 30% der Unternehmen haben dezentrale Betriebsstätten Zweigstellen benötigen ca. 33% des gesamten IT-Budgets Synchronisierte Informationen verbinden, zusammen arbeiten, Informationen teilen Optimiert für mobile Hardware Von Anfang an sicher und geschützt Quellen: IDC, Gartner, Microsoft

11 Mobiles Arbeiten Von Anfang an sicher & geschützt
Optimiert für mobile Hardware Netzwerkabhängige Firewall; erhöhte Sicherheit beim Zugriff auf kabellose Netzwerke Netzwerk Zugriffskontrolle Festplattenverschlüsselung durch Windows BitLocker™ Drive Encryption Windows Mobility Center Energieverwaltung; schnelles Ein-/Ausschalten Tablet PC (jetzt mit Touchpad-Unterstützung); SideShow Mobiles Arbeiten verbinden, zusammen arbeiten, Informationen teilen Windows Vista will make it easier for your company to keep your users connected to the data they need - in office and on the road – by enabling secure and reliable networks discovery and connectivity, including scenarios when they switch between networks and greatly improving device &data synch. Moving beyond the PC, Windows Vista ushers in a whole new way of connecting with the people, places and devices in your life –at home, at work and on the go. Whether connecting to another machine, device or person, Windows Windows Vista simplifies the experience, clearly connecting you to your other pc’s, cell phones, friends, family and co-workers. You are the network. Networking Simplified network setup Re-written TCP/ IP stack – better performance World ready with full IPv6 support Wireless: Performance and hotspot/WLAN roaming improvements Network diagnostics for end users and IT pros Discover and join networks easily: [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Easy to setup and connect to wireless networks Secure, reliable wireless networking: [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Access corporate server-based applications with no VPN: [NEED TO PROVIDE DETAILS OF HOW THIS WORKS] Securely access your LOB applications and files shares over any internet connection and easily take files "offline“ and work with them when you are not connected. Mobility: Realize the full potential of mobile personal computers so your PC goes where you go and work in natural ways - laptops will have longer battery life and the system includes built in support for advanced wireless standards and support ink and touch input making mobile PCs will be useful in more places than they are today Windows Mobility Center: Mobility Center to control all mobile settings from one location (there is a screenshot in the back-up module) Auxiliary Displays Quick presentation set-up Seamless connections to external displays/projectors: Presentation Mode Network Projection Hybrid Hard Drive Support: A Hybrid hard drive is a hard drive with an integrated non-volatile flash memory buffer. Read and write operations to buffer may not require disk spin up. This process is completely transparent to application execution Hybrid hard drives accelerate system transitions, such as boot, hibernate & resume. They also drive battery life improvements, as laptop hard drives can stay spun down for minutes And, they improve reliability since the vibration or impact during writes not a problem with NV memory [NEED TO ADD INFORMATION ABOUT WHO IS MANUFACTURING THESE DRIVES] Tablet PC enhancements Touch and pen gesture support in Tablet Tablet PC in all Vista Pro SKUs – single image Collaboration Face-to-face collaboration on shared networks: With Windows Shared View, you can collaborate more easily, whether you are in face-to-face or attending a meeting as a remote participant. Now you can easily securely transfer files and broadcast presentations and documents directly to each other’s personal computers - making meetings more productive and efficient. Easy ad hoc network creation Present to multiple PCs Peer to peer discovery; Pass control among attendees: file sharing, PC to PC projection, IM chats Broadcast presentations, transfer files Digital Handouts Easy sharing of folders and files: [NEED PROBLEM STATEMENT AND DESCRIPTION OF FEATURE] Publish and subscribe to lists and saved queries Create P2P sharing between PCs Easy PC-to-PC Sync – always in-sync Synchronization: As people rely more and more on devices like cell phones and PDAs – it gets more complex to keep all your devices in sync. Improved folder redirection and roaming user profiles Take files offline seamlessly from corporate servers (on-line/offline) Always work locally – more reliable no weird hand-off Can redirect any folder – can only do 5 today Integrated Sync Center: The new Windows provides one place to quickly and easily set up devices and keep everything up to date Up or down – all changes there Universal sync manager for devices Platform for mobile devices Aux Display - Instant access to schedule/calendar data, system status information from any power state, with lid closed Synchronisierte Informationen Network Center & Netzwerk Einrichtungsassistent Netzwerkdiagnose Windows Collaboration – Werkzeuge zur einfachen Zusammenarbeit Effiziente offline und umgeleitete Dateien Integriertes Synchronisations-Center

12 Neue Großkunden Lösung Windows Vista Enterprise
Windows Vista Enterprise IST Windows Vista Business PLUS erweiterte Funktionen, um IT Kosten und die Komplexität in großen Organisationen zu reduzieren Exklusiv verfügbar für Software Assurance Kunden Datenschutz Applikations- kompatibilität Weltweites ausrollen verbesserter Daten- schutz mit Windows® BitLocker™ Drive Encryption Virtual PC Sprachpakete (MUI-Unterstützung) Windows Vista Enterprise is designed to help mid-market and larger organizations to significantly lower IT costs and improve IT efficiency Windows Vista Enterprise provides a unique set of tools to lower IT costs and complexity: Enhanced data protection with Full Volume Encryption: helps protect sensitive data and intellectual property from being compromised on a lost, stolen or recycled machine. Native hardware and software support for encryption of hard drives and file system ensures that corporate and client data never falls into the wrong hands Support for advanced application compatibility scenarios with Virtual PC Express by enabling customers to run legacy applications in a virtual machine and Subsystem for Unix-based Applications (SUA) Integration of all Windows user interface languages enabling IT pros to easily and cost effectively configure a single, worldwide disk image that spans all languages, all PC form factors and all hardware configurations More Information on Subsystem for Unix-based applications: SUA is a one the 3 main components that used to make up Services for Unix. The latter will no longer be supported as a stand alone product and has become native support in the Server (Server gets all components) as well as in the Client (gets SUA). And the positioning of the functionality differs from Virtual PC Express because SUA still promotes the live interaction with the legacy app in the sense that it allows in-house Unix skills to be leveraged as well as let them interact between the unix environment and the windows environment. An example would be a large financial corporation created a unix-based custom mortgage calculator but the rest of the IT infrastructure is in Windows. That application still needs updates once in a while to comply with new customer requirements, yet it is no longer developed, yet not quite ready to be migrated to windows either. SUA will allow the “maintenance” of this app. Here a few more details on SUA: A Windows component that provides platform services for UNIX-based applications: Eases integration between Windows and UNIX/Linux environments Helps with migration of UNIX-based applications to Windows by re-compiling of UNIX-based applications on Windows Includes 64-bit support Also includes database connectivity libraries SUA is an optional install in Windows Vista Enterprise Additional utilities, SDK are available as a web download Subsystem für Unix-basierte Applikationen (SUA)

13 Großes pharmazeutisches Unternehmen Windows Vista TCO Engagement
wichtigste Nutzentreiber 1 Image durch Vista weniger OS Verwundbarkeiten Service desk re-imaging verbessertes Datenmanagement Verbesserte Standards zur Einhaltung gesetzlicher Bestimmungen Direkte Einsparungen Drittsoftware = 5$/PC IT Arbeiten = 92$/PC Indirekte Einsparungen Endanwender Arbeitsabläufe und Ausfallzeiten = 332$/PC Gesamte Einsparungen $/ PC Profil (Heute) PCs, 3&4 Jahre Lebenszyklus Standardisierte IT Umgebung Windows 2000 Ausgelagerte IT (innerhalb der U.S.A.) Hohe Beschäftigungsrate Hohe Kosten zur Einhaltung gesetzlicher Bestimmungen 19 Images

14 © 2006 Microsoft Corporation. All rights reserved.
This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.


Herunterladen ppt "Product Solution Manager| Windows Client | Microsoft Deutschland GmbH"

Ähnliche Präsentationen


Google-Anzeigen