SlideShare a Scribd company logo
1 of 21
Management Consulting | IAM and Data Protection | Governance Risk and Compliance

System Center
Endpoint Protection 2012 R2
Norman W. Mayes CISSP, MCSE: Private Cloud, ITIL-F
February 2014

© 2014 Edgile, Inc. – All Rights Reserved
Table of Contents

System Center Endpoint
Protection 2012 R2

1

Key Features and Benefits

2

Competitive Protection

2
System Center Endpoint Protection

Key Features and Benefits
Simplified
Administration

Comprehensive Protection Stack
Real time Endpoint Protection operations from console
Malware-driven operations from the console
Client-side merge of antimalware policies

Single administrator
experience for simplified
endpoint protection and
management

© 2014 Edgile, Inc. – All Rights Reserved

Simplified, 3X delivery of definitions through software updates
New and improved Endpoint Protection client

3
System Center Endpoint Protection

Comprehensive Protection Stack
Building on Windows Platform Security
System Center Configuration Manager and Endpoint Protection

Management

Software
Updates +
SCUP

Endpoint
Protection
Management

Settings
Management

Operating
System
Deployment

Software
Distribution

MDM

System Center 2012 Endpoint Protection

Antimalware

Antimalware

Behavior
Monitoring

Dynamic
Translation

Vulnerability
Shielding

Windows
Defender
Offline

Cloud Clean
Restore

ELAM and
Measured
Boot

Windows
AppLocker

BitLocker

Data
Execution
Prevention

Address Space
Layout
Randomization

Windows
Resource
Protection

Platform

Internet
Explorer

Secure Boot
Through UEFI

Early Launch
Antimalware
(ELAM)

Measured
Boot

User Access
Control

Available only in Windows 8.x
© 2014 Edgile, Inc. – All Rights Reserved

4
System Center Endpoint Protection

Real-Time Operations
 Endpoint protection operations
to clients in
<1 minute
 Available Endpoint
protection operations:
–
–
–
–
–
–

Run definition updates
Run quick scan
Run full scan
Allow threats
Exclude paths and/or files
Restore files quarantined by
threat

© 2014 Edgile, Inc. – All Rights Reserved

5
System Center Endpoint Protection

Malware Driven Operations
Admin can easily view and take follow up actions on
specific malware by type, and remediation status

© 2014 Edgile, Inc. – All Rights Reserved

6
System Center Endpoint Protection

Client-Side Merge
Endpoint Protection Policies
 Create granular policies
for specific scenarios and
have those merged on
the clients
 Removes overhead
of redundant policies
 Policies still honors relative
priority, and merge when
possible (exclusions, for
example)

© 2014 Edgile, Inc. – All Rights Reserved

7
System Center Endpoint Protection

Software Update Integration
Architectural Changes to Support Updates 3X per Day
 Category-based scans from clients
 Delta synchs between Software Update Point (SUP) and WSUS

Architectural Changes to Simplify SUP Setup
 Source top-level SUP from internal WSUS server
 Simplified, fault tolerant software update point setup (add multiple SUPs
as needed, up to 8 per Primary Site no NLB or active SUP requirements)
– Multiple SUP model is built for fault tolerance
– Best performance comes from using a shared SUSDB for your software update points
– Clients are optimized to NOT switch SUPs, and only do so after 4 failures (@ 30 minute
intervals)
– Full cross-forest support of SUPs including untrusted forests
– Clients optimized to fallback to SUPs within their own forest first
– Use Group Policy preferences if setting a WSUS server for client deployments

© 2014 Edgile, Inc. – All Rights Reserved

8
System Center Endpoint Protection

Software Update Overview
Hierarchy (Forest1)

Hierarchy (Forest2)

Primary Site
Software
Update Point 1

Software
Update Point 2

Software
Update Point 3

Software
Update Point 4

4X

Client

Client
Client.Forest1

© 2014 Edgile, Inc. – All Rights Reserved

Client.Forest2

9
System Center Endpoint Protection

Enhanced Protection
Enhanced Protection

Common antimalware platform across Microsoft AM clients

Proactive protection against known and unknown threats
Integration with UEFI Trusted Boot, early-launch antimalware
Reduced complexity while protecting clients
Protect against known and
unknown threats with
endpoint inspection at
behavior, application, and
network levels

© 2014 Edgile, Inc. – All Rights Reserved

Heterogeneous antimalware clients

Competitive protection: Endpoint Protection vs. Trend Micro

10
System Center Endpoint Protection

Common Antimalware Platform
Platform Overview
 Common platform for all of Microsoft’s antimalware clients
 Security Essentials alone has +100 million users (#1 in North America)
 +660 million executions of Malicious Software Removal Tool per month
 All of these clients service Microsoft’s protection services research
and response

Diagnostic
and Recovery
Toolkit

© 2014 Edgile, Inc. – All Rights Reserved

Windows
Defender
Offline

11
System Center Endpoint Protection

Reduced Complexity
Simple Interface
 Minimal, high-level user
interactions
Administrative Control
 User configurability options
 Central policy enforcement
 UI Lockdown and disable
Maintains High Productivity
 CPU throttling during scans
 Faster scans through
advanced caching
 Minimal network and client
© 2014 Edgile, Inc. – All Rights Reserved

12
System Center Endpoint Protection

Heterogeneous Antimalware Clients
Features
 Anti-virus and anti-malware support
 Machines connect directly to internet service for security content
 Client UI for user visibility and control
 SCOM monitoring pack for Linux with management control
Platforms
 Native support for Windows 8.1 and Windows Server 2012 R2
 Apple Mac (10.6-10.7)
 Linux Server: RedHat Enterprise 6, SuSE Linux 11

© 2014 Edgile, Inc. – All Rights Reserved

13
Table of Contents

System Center Endpoint
Protection 2012 R2

1

Key Features and Benefits

2

Competitive Protection

14
System Center Endpoint Protection

Competitive Protection
CHALLENGERS

Endpoint Protection

LEADERS
Symantec

McAfee

Trend
Micro

Kaspersky Lab
Sophos
Microsoft

Eset
Bitdefender

Ability to Execute

F-Secure

Panda Security
Webroot
IBM

Check Point
Software Technologies

LANDesk
Lumension
Security
ThreatTrack
Security

BeyondTrust

NICHE PLAYERS

Completeness of Vision

© 2014 Edgile, Inc. – All Rights Reserved

Arkoon
Network
Security

VISIONARIES

As of January 2014

 Microsoft's malware lab benefits from a vast
installation of the consumer version of the SCEP
engine and its online system check utilities,
which provide a large distribution of malware
samples
 System Center Configuration Manager
supports a dedicated endpoint protection role
configuration. SCEP also allows on-demand
signature updates from the cloud for suspicious
files and previously unknown malware
 Organizations licensed under Microsoft's
Enterprise CAL or Core CAL program receive
SCEP at no additional cost. Approximately onethird of enterprise customers are actively
considering Microsoft, during their next renewal
periods
 Microsoft offers advanced system file cleaning,
which replaces infected system files with clean
versions from a trusted Microsoft cloud

15
System Center Endpoint Protection

Competitive Protection
Endpoint Protection Challenges
 Microsoft System Center Configuration Manager is
a prerequisite to SCEP
 Microsoft's client anti-malware protection approach:
– Industry test scores are not has high as some competitors
– Focused on reducing the impact of prevalent malware in the
Windows installed base with the lowest false-positive rates in
the industry

 SCEP does not have some advanced features other
endpoint security solutions include
– Microsoft leverages other Windows security features: Windows
Firewall, BitLocker, AppLocker and Group Policy Objects
© 2014 Edgile, Inc. – All Rights Reserved

16
System Center Endpoint Protection

Competitive Protection
Trend Micro’s Challenges
 Historically, Trend Micro has been very conservative with new EPP
capabilities, such as encryption and application control
 The core endpoint offerings – OfficeScan and Deep Security – are two
separate products from separate teams with separate consoles. Deep Security
has not been integrated into TMCM for deployment and policy management,
but it has been integrated from a security reporting perspective

 Some capabilities (like encryption) that have been integrated into TMCM still
require their native consoles to be deployed, but from that point forward,
they can be managed within TMCM
 Trend Micro's installed base and market share in North America and EMEA
are not as strong as in Asia/Pacific

 There is no out-of-the-box security state assessment beyond the EPP agent
status, and no significant integration with operations tools, such as
vulnerability assessments
© 2014 Edgile, Inc. – All Rights Reserved

17
System Center Endpoint Protection

Competitive Protection
Cost Avoidance Potential
System Center 2012 R2 server
management licensing maximizes value
while simplifying purchasing. All server
management licenses (SMLs) include the
same components and the ability to
manage any workload. System Center
2012 R2 SMLs are available in two
editions differentiated by virtualization
rights only:
 Datacenter: Maximizes cloud capacity
with unlimited virtualization for high
density private clouds

 Standard: For lightly or non-virtualized
private cloud workloads.

© 2014 Edgile, Inc. – All Rights Reserved

Edition

Components Included
Operations Manager

Microsoft
System Center
2012 R2
Datacenter

Configuration Manager
Data Protection Manager

Service Manager
Virtual Machine Manager

Microsoft
System Center
2012 R2
Standard

Endpoint Protection
Orchestrator
App Controller

18
System Center Endpoint Protection

Competitive Protection
Cost Avoidance Potential
 Server Management Licenses are required for
managed devices that run server Operating
System Environments (OSEs). Licenses are
processor-based, with each license covering up
to two physical processors.
 The number of Server MLs required for each
managed server is determined by the number of
physical processor in the server for Datacenter
Edition and either number of physical processors
in the server or number of OSEs being managed
for Standard Edition (whichever is greater).

Example
4 Servers with 4 Cores
Each to Support System Center Roles

4 Servers * 4 Cores / 2 = 6 Server ML Licenses

© 2014 Edgile, Inc. – All Rights Reserved

Server ML Edition Comparison:
Datacenter

Standard

# of physical processors
per license

2

2

# of Managed Operating
System Environments
(OSEs) per license

Unlimited

2

Includes all System Center
server management
components

Yes

Yes

Right to run management
server software and
supporting SQL Server
Runtime (SQL Server
Standard Edition)

Yes

Yes

Manage any type of
supported workload

Yes

Yes

$3,607

$1,323

Open No Level (NL) License
and Software Assurance
(L&SA) 2-year price

19
System Center Endpoint Protection

Competitive Protection
Configuration
Manager
Client ML

Cost Avoidance Potential
Client Management Licenses (MLs)
are required for managed devices
that run non-server OSEs. There are
three System Center 2012 R2 Client
ML offerings:

Components
Included

Endpoint
Protection
Subscription

Client
Management
Suite Client
ML

Configuration
Manager

Endpoint
Protection

Service
Manager

Virtual
Machine
Manager

Operations
Manager
Data
Protection
Manager

 Configuration Manager Client ML

Orchestrator

 Endpoint Protection Subscription
 Client Management Suite Client
ML

Included in
Core CAL
Suite

Yes

Yes

No

Core CAL and Enterprise CAL Suites
will continue to be the most cost
effective way to purchase client
management products.

Included in
Enterprise
CAL Suite

Yes

Yes

Yes

Open NL
L&SA 2-year
price

$62

$22

$121

© 2014 Edgile, Inc. – All Rights Reserved

20
Wrap Up | Questions and Answers

Norman W. Mayes
425.749.7447
Norman.Mayes@Edgile.com

© 2014 Edgile, Inc. – All Rights Reserved

21

More Related Content

What's hot

System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Herman Arnedo
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012capriguy84
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekC/D/H Technology Consultants
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012DDLS
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical OverviewAmit Gatenyo
 

What's hot (20)

SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak Peek
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical Overview
 

Viewers also liked

System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRCNorman Mayes
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Jw history of written english 9.19.11
Jw history of written english 9.19.11Jw history of written english 9.19.11
Jw history of written english 9.19.11Angala Maria
 
Online LIbrary Challenges
Online LIbrary ChallengesOnline LIbrary Challenges
Online LIbrary ChallengesJulie Anne Kent
 
La caza como actividad sostenible en paracuellos
La caza como actividad sostenible en paracuellosLa caza como actividad sostenible en paracuellos
La caza como actividad sostenible en paracuellosedulorente
 
Adcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgAdcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgOdette Wyk
 
Finding Images using Google Images
Finding Images using Google ImagesFinding Images using Google Images
Finding Images using Google ImagesJulie Anne Kent
 
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)IFS Czech
 
Præsentation af Bronderslev Erhverv
Præsentation af Bronderslev ErhvervPræsentation af Bronderslev Erhverv
Præsentation af Bronderslev ErhvervBrønderslev Erhverv
 
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料櫻井啓一郎
 
The need for a new digital divide model
The need for a new digital divide modelThe need for a new digital divide model
The need for a new digital divide modelPetr Lupac
 
Create Linux Template VM Hardware Specs using VirtualBox
Create Linux Template VM Hardware Specs using VirtualBoxCreate Linux Template VM Hardware Specs using VirtualBox
Create Linux Template VM Hardware Specs using VirtualBoxImad Daou
 
Presentación internacionalización de diseño
Presentación internacionalización de diseñoPresentación internacionalización de diseño
Presentación internacionalización de diseñoGastón Marando
 

Viewers also liked (20)

System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRC
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Jw history of written english 9.19.11
Jw history of written english 9.19.11Jw history of written english 9.19.11
Jw history of written english 9.19.11
 
Online LIbrary Challenges
Online LIbrary ChallengesOnline LIbrary Challenges
Online LIbrary Challenges
 
La caza como actividad sostenible en paracuellos
La caza como actividad sostenible en paracuellosLa caza como actividad sostenible en paracuellos
La caza como actividad sostenible en paracuellos
 
Adcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgAdcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fg
 
Frenchaccounts2009 theaccountingreform
Frenchaccounts2009 theaccountingreformFrenchaccounts2009 theaccountingreform
Frenchaccounts2009 theaccountingreform
 
Finding Images using Google Images
Finding Images using Google ImagesFinding Images using Google Images
Finding Images using Google Images
 
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
 
Præsentation af Bronderslev Erhverv
Præsentation af Bronderslev ErhvervPræsentation af Bronderslev Erhverv
Præsentation af Bronderslev Erhverv
 
EHISTO Project flyers
EHISTO Project flyersEHISTO Project flyers
EHISTO Project flyers
 
079 fmi rapport
079 fmi  rapport079 fmi  rapport
079 fmi rapport
 
Presentation of the TACCLE3 Coding European Project
Presentation of the TACCLE3 Coding European ProjectPresentation of the TACCLE3 Coding European Project
Presentation of the TACCLE3 Coding European Project
 
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料
太陽光発電の環境性能 (EPT/EPR/EROEI/LCA/CO2排出量等) 参考資料
 
Evaluating websites
Evaluating websitesEvaluating websites
Evaluating websites
 
Illusions
IllusionsIllusions
Illusions
 
Jw day 6 (unit 3)
Jw day 6 (unit 3)Jw day 6 (unit 3)
Jw day 6 (unit 3)
 
The need for a new digital divide model
The need for a new digital divide modelThe need for a new digital divide model
The need for a new digital divide model
 
Create Linux Template VM Hardware Specs using VirtualBox
Create Linux Template VM Hardware Specs using VirtualBoxCreate Linux Template VM Hardware Specs using VirtualBox
Create Linux Template VM Hardware Specs using VirtualBox
 
Presentación internacionalización de diseño
Presentación internacionalización de diseñoPresentación internacionalización de diseño
Presentación internacionalización de diseño
 

Similar to System Center Endpoint Protection 2012 R2

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerNorman Mayes
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk Corporation
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Jeff Fisher
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationJeff Fisher
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoIndiaMART InterMESH Ltd
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieCor Ranzijn
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1Paul O'Doherty
 

Similar to System Center Endpoint Protection 2012 R2 (20)

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application Virtualization
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
Resume_Padmaja
Resume_PadmajaResume_Padmaja
Resume_Padmaja
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by Ramco
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategie
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

System Center Endpoint Protection 2012 R2

  • 1. Management Consulting | IAM and Data Protection | Governance Risk and Compliance System Center Endpoint Protection 2012 R2 Norman W. Mayes CISSP, MCSE: Private Cloud, ITIL-F February 2014 © 2014 Edgile, Inc. – All Rights Reserved
  • 2. Table of Contents System Center Endpoint Protection 2012 R2 1 Key Features and Benefits 2 Competitive Protection 2
  • 3. System Center Endpoint Protection Key Features and Benefits Simplified Administration Comprehensive Protection Stack Real time Endpoint Protection operations from console Malware-driven operations from the console Client-side merge of antimalware policies Single administrator experience for simplified endpoint protection and management © 2014 Edgile, Inc. – All Rights Reserved Simplified, 3X delivery of definitions through software updates New and improved Endpoint Protection client 3
  • 4. System Center Endpoint Protection Comprehensive Protection Stack Building on Windows Platform Security System Center Configuration Manager and Endpoint Protection Management Software Updates + SCUP Endpoint Protection Management Settings Management Operating System Deployment Software Distribution MDM System Center 2012 Endpoint Protection Antimalware Antimalware Behavior Monitoring Dynamic Translation Vulnerability Shielding Windows Defender Offline Cloud Clean Restore ELAM and Measured Boot Windows AppLocker BitLocker Data Execution Prevention Address Space Layout Randomization Windows Resource Protection Platform Internet Explorer Secure Boot Through UEFI Early Launch Antimalware (ELAM) Measured Boot User Access Control Available only in Windows 8.x © 2014 Edgile, Inc. – All Rights Reserved 4
  • 5. System Center Endpoint Protection Real-Time Operations  Endpoint protection operations to clients in <1 minute  Available Endpoint protection operations: – – – – – – Run definition updates Run quick scan Run full scan Allow threats Exclude paths and/or files Restore files quarantined by threat © 2014 Edgile, Inc. – All Rights Reserved 5
  • 6. System Center Endpoint Protection Malware Driven Operations Admin can easily view and take follow up actions on specific malware by type, and remediation status © 2014 Edgile, Inc. – All Rights Reserved 6
  • 7. System Center Endpoint Protection Client-Side Merge Endpoint Protection Policies  Create granular policies for specific scenarios and have those merged on the clients  Removes overhead of redundant policies  Policies still honors relative priority, and merge when possible (exclusions, for example) © 2014 Edgile, Inc. – All Rights Reserved 7
  • 8. System Center Endpoint Protection Software Update Integration Architectural Changes to Support Updates 3X per Day  Category-based scans from clients  Delta synchs between Software Update Point (SUP) and WSUS Architectural Changes to Simplify SUP Setup  Source top-level SUP from internal WSUS server  Simplified, fault tolerant software update point setup (add multiple SUPs as needed, up to 8 per Primary Site no NLB or active SUP requirements) – Multiple SUP model is built for fault tolerance – Best performance comes from using a shared SUSDB for your software update points – Clients are optimized to NOT switch SUPs, and only do so after 4 failures (@ 30 minute intervals) – Full cross-forest support of SUPs including untrusted forests – Clients optimized to fallback to SUPs within their own forest first – Use Group Policy preferences if setting a WSUS server for client deployments © 2014 Edgile, Inc. – All Rights Reserved 8
  • 9. System Center Endpoint Protection Software Update Overview Hierarchy (Forest1) Hierarchy (Forest2) Primary Site Software Update Point 1 Software Update Point 2 Software Update Point 3 Software Update Point 4 4X Client Client Client.Forest1 © 2014 Edgile, Inc. – All Rights Reserved Client.Forest2 9
  • 10. System Center Endpoint Protection Enhanced Protection Enhanced Protection Common antimalware platform across Microsoft AM clients Proactive protection against known and unknown threats Integration with UEFI Trusted Boot, early-launch antimalware Reduced complexity while protecting clients Protect against known and unknown threats with endpoint inspection at behavior, application, and network levels © 2014 Edgile, Inc. – All Rights Reserved Heterogeneous antimalware clients Competitive protection: Endpoint Protection vs. Trend Micro 10
  • 11. System Center Endpoint Protection Common Antimalware Platform Platform Overview  Common platform for all of Microsoft’s antimalware clients  Security Essentials alone has +100 million users (#1 in North America)  +660 million executions of Malicious Software Removal Tool per month  All of these clients service Microsoft’s protection services research and response Diagnostic and Recovery Toolkit © 2014 Edgile, Inc. – All Rights Reserved Windows Defender Offline 11
  • 12. System Center Endpoint Protection Reduced Complexity Simple Interface  Minimal, high-level user interactions Administrative Control  User configurability options  Central policy enforcement  UI Lockdown and disable Maintains High Productivity  CPU throttling during scans  Faster scans through advanced caching  Minimal network and client © 2014 Edgile, Inc. – All Rights Reserved 12
  • 13. System Center Endpoint Protection Heterogeneous Antimalware Clients Features  Anti-virus and anti-malware support  Machines connect directly to internet service for security content  Client UI for user visibility and control  SCOM monitoring pack for Linux with management control Platforms  Native support for Windows 8.1 and Windows Server 2012 R2  Apple Mac (10.6-10.7)  Linux Server: RedHat Enterprise 6, SuSE Linux 11 © 2014 Edgile, Inc. – All Rights Reserved 13
  • 14. Table of Contents System Center Endpoint Protection 2012 R2 1 Key Features and Benefits 2 Competitive Protection 14
  • 15. System Center Endpoint Protection Competitive Protection CHALLENGERS Endpoint Protection LEADERS Symantec McAfee Trend Micro Kaspersky Lab Sophos Microsoft Eset Bitdefender Ability to Execute F-Secure Panda Security Webroot IBM Check Point Software Technologies LANDesk Lumension Security ThreatTrack Security BeyondTrust NICHE PLAYERS Completeness of Vision © 2014 Edgile, Inc. – All Rights Reserved Arkoon Network Security VISIONARIES As of January 2014  Microsoft's malware lab benefits from a vast installation of the consumer version of the SCEP engine and its online system check utilities, which provide a large distribution of malware samples  System Center Configuration Manager supports a dedicated endpoint protection role configuration. SCEP also allows on-demand signature updates from the cloud for suspicious files and previously unknown malware  Organizations licensed under Microsoft's Enterprise CAL or Core CAL program receive SCEP at no additional cost. Approximately onethird of enterprise customers are actively considering Microsoft, during their next renewal periods  Microsoft offers advanced system file cleaning, which replaces infected system files with clean versions from a trusted Microsoft cloud 15
  • 16. System Center Endpoint Protection Competitive Protection Endpoint Protection Challenges  Microsoft System Center Configuration Manager is a prerequisite to SCEP  Microsoft's client anti-malware protection approach: – Industry test scores are not has high as some competitors – Focused on reducing the impact of prevalent malware in the Windows installed base with the lowest false-positive rates in the industry  SCEP does not have some advanced features other endpoint security solutions include – Microsoft leverages other Windows security features: Windows Firewall, BitLocker, AppLocker and Group Policy Objects © 2014 Edgile, Inc. – All Rights Reserved 16
  • 17. System Center Endpoint Protection Competitive Protection Trend Micro’s Challenges  Historically, Trend Micro has been very conservative with new EPP capabilities, such as encryption and application control  The core endpoint offerings – OfficeScan and Deep Security – are two separate products from separate teams with separate consoles. Deep Security has not been integrated into TMCM for deployment and policy management, but it has been integrated from a security reporting perspective  Some capabilities (like encryption) that have been integrated into TMCM still require their native consoles to be deployed, but from that point forward, they can be managed within TMCM  Trend Micro's installed base and market share in North America and EMEA are not as strong as in Asia/Pacific  There is no out-of-the-box security state assessment beyond the EPP agent status, and no significant integration with operations tools, such as vulnerability assessments © 2014 Edgile, Inc. – All Rights Reserved 17
  • 18. System Center Endpoint Protection Competitive Protection Cost Avoidance Potential System Center 2012 R2 server management licensing maximizes value while simplifying purchasing. All server management licenses (SMLs) include the same components and the ability to manage any workload. System Center 2012 R2 SMLs are available in two editions differentiated by virtualization rights only:  Datacenter: Maximizes cloud capacity with unlimited virtualization for high density private clouds  Standard: For lightly or non-virtualized private cloud workloads. © 2014 Edgile, Inc. – All Rights Reserved Edition Components Included Operations Manager Microsoft System Center 2012 R2 Datacenter Configuration Manager Data Protection Manager Service Manager Virtual Machine Manager Microsoft System Center 2012 R2 Standard Endpoint Protection Orchestrator App Controller 18
  • 19. System Center Endpoint Protection Competitive Protection Cost Avoidance Potential  Server Management Licenses are required for managed devices that run server Operating System Environments (OSEs). Licenses are processor-based, with each license covering up to two physical processors.  The number of Server MLs required for each managed server is determined by the number of physical processor in the server for Datacenter Edition and either number of physical processors in the server or number of OSEs being managed for Standard Edition (whichever is greater). Example 4 Servers with 4 Cores Each to Support System Center Roles 4 Servers * 4 Cores / 2 = 6 Server ML Licenses © 2014 Edgile, Inc. – All Rights Reserved Server ML Edition Comparison: Datacenter Standard # of physical processors per license 2 2 # of Managed Operating System Environments (OSEs) per license Unlimited 2 Includes all System Center server management components Yes Yes Right to run management server software and supporting SQL Server Runtime (SQL Server Standard Edition) Yes Yes Manage any type of supported workload Yes Yes $3,607 $1,323 Open No Level (NL) License and Software Assurance (L&SA) 2-year price 19
  • 20. System Center Endpoint Protection Competitive Protection Configuration Manager Client ML Cost Avoidance Potential Client Management Licenses (MLs) are required for managed devices that run non-server OSEs. There are three System Center 2012 R2 Client ML offerings: Components Included Endpoint Protection Subscription Client Management Suite Client ML Configuration Manager Endpoint Protection Service Manager Virtual Machine Manager Operations Manager Data Protection Manager  Configuration Manager Client ML Orchestrator  Endpoint Protection Subscription  Client Management Suite Client ML Included in Core CAL Suite Yes Yes No Core CAL and Enterprise CAL Suites will continue to be the most cost effective way to purchase client management products. Included in Enterprise CAL Suite Yes Yes Yes Open NL L&SA 2-year price $62 $22 $121 © 2014 Edgile, Inc. – All Rights Reserved 20
  • 21. Wrap Up | Questions and Answers Norman W. Mayes 425.749.7447 Norman.Mayes@Edgile.com © 2014 Edgile, Inc. – All Rights Reserved 21