Technet Spotlight On Demand Video - Stephen Lamb - Understanding Microsoft's Forefront security solution for businesses

Today’s security market landscape is complex and fragmented. Security offerings have not fully met customer needs for greater protection, integration with existing infrastructure, and control over network infrastructure security. The Microsoft Forefront family of security products for business helps to address these needs by providing defense-in-depth security at the client, server and network edge. In…

0

Technet Spotlight On Demand Video - Eric Berg, Jeff Wettlaufer - You're in Control: System Center and Forefront Security

This keynote is in two parts: firstly it covers the way in which Forefront Security and System Center management technologies work together to help IT professionals provide secure and reliable IT infrastructure. The second longer session covers the System Center product family in more detail. http://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=571

0

Technet Spotlight On Demand Video - John Craddock, Sally Storey - Vista Technologies

In this session we look at the key Vista security enhancements that impact our overall look at end-to end security framework. We explore User Account Control and the Secure Desktop. Examine how Vista can virtualize file and registry access and how solutions can be provided for Windows XP. You will learn about new core features…

0

Technet Spotlight On Demand Video - John Craddock, Sally Storey - Locking Down Servers and Workstations

Network connectivity is the life blood of your infrastructure but the TCP/IP stack, listening services and applications provide many entry points through which systems can be discovered and attacked. In this session we show you how to assess your systems through the use of network scanners, provide maximum protection through the use of host based…

0

Technet Spotlight On Demand Video - John Craddock, Sally Storey - Securing Your Network

Network connectivity is the life blood of your infrastructure but the TCP/IP stack, listening services and applications provide many entry points through which systems can be discovered and attacked. In this session we show you how to assess your systems through the use of network scanners, provide maximum protection through the use of host based…

0

Technet Spotlight On Demand Video - Darren Neimke - Upgrading applications to Windows Vista Part I

Windows Vista is a substantial advance in Windows, with significant innovations in the developer platform. The session will walk through “why” developers will consider to upgrade their application and the next two sessions will provide an overview of how to upgrade your applications to take advantage of these new features. Part one of this series…

0

Technet Spotlight On Demand Video - Jeff Alexander - Windows Vista Reliability and Security Enhancements

In this session, we will discuss many of the innovative design philosophies and development strategies involved in making Windows Vista the most secure Windows operating system to date. We will also look at the Reliability features in Windows Vista, we will start with how end users define reliability and how system downtime affects them. We…

0

Technet Spotlight On Demand Video - George Asgari, Simon Higgins - Microsoft Innovation Joint Keynote

The increasing sophistication or “intelligence” of software will dramatically impact business, science, medicine, the media, politics and ultimately people and society. Today’s challenges – security, compliance, or just keeping machines up and running – prevent organisations from fully benefiting from their investments in people and technology. The next generation of Windows Vista and Office “12”…

0

Technet Spotlight On Demand Video - Steve Riley -Windows Vista System Integrity Technologies

For most of the history of computing, operating systems have lived in their own little bubbles of trust. Every part of an operating system pretty much assumed that every other part was exactly what it claimed to be and performed only what it claimed it could do. Recent attacks, though, have shown that such implicit…

0