3. Portal &
Collaboration
Content &
Enterprise
Search
Project Accounting &
Grants Mgmt
Identity
Single
Domain
Workflow &
Automation
Budget Planning &
Formulation
Policy
Enforcement
On Premise
BI & Data
Mining
Productivity
Budget
Management
Information
Security &
Privacy
Language
Translation
Human Resources
Mgmt & Payroll
Data Loss
Prevention
Big Data & Social
Media Analytics
Assessment
Database/
Geo Location &
Data Warehousing
Maps
Private Cloud
Email &
Calendar
Information
Gathering
Middleware, &
Interoperability
Enterpris
Commu
Infor
Dissem
Disaster Re
Business C
Public Cloud
4. User and Device
Management in Microsoft
Tony Seno Hartono
National Technology Officer
Microsoft Indonesia
5. Today’s challenges
Users
Devices
Apps
Data
Users expect to be able to
work in any location and
have access to all their
work resources.
The explosion of devices is
eroding the standards-based
approach to corporate IT.
Deploying and managing
applications across
platforms is difficult.
Users need to be productive
while maintaining
compliance and reducing
risk.
6. User and Device Management
Enable users
Access to company resources
consistently across devices
Simplified registration and
enrollment of devices
Synchronized corporate data
Unify your environment
Protect your data
On-premises and cloud-based
management of devices within a
single console.
Protect corporate information by
selectively wiping apps and data
from retired/lost devices
Simplified, user-centric application
management across devices
A common identity for accessing
resources on-premises and in
the cloud
Comprehensive settings
management across platforms,
including certificates, VPNs, and
wireless network profiles
Identify which mobile devices
have been compromised
7. Help protect corporate information and manage risk
Lost or Stolen
Retired
Lost or
Enrollment Stolen
• Identify at-risk devices through jailbreak and root
Retired
detection
Users can access
corporate data regardless
of device or location with
Work Folders for data
sync and desktop
virtualization for
centralized applications.
IT can provide a secure and
familiar solution for users to
access sensitive corporate data
from anywhere with VDI and
RemoteApp technologies.
• Selective wipe removes corporate applications, data,
Personal Apps
and Data
Company Apps
and Data
certificates/profiles, and policies Company Apps supported by
based as
and Data
each platform
Remote App
Centralized
Data
• Full wipe as supported by each platform
Remote App
• Can be executed by IT or by user via Company Portal
Policies
Policies
• Sensitive data or applications can be kept off device and
accessed via Remote Desktop Services
Personal
Apps and
Data
10. HEADLINES
How hackers allegedly
stole “unlimited”
amounts of cash US economy up to
Cybercrime costs from
banks in just a few hours
$140 billion annually, report says
Politics.co.uk [2013]
Ars Technica [2013]
Los Angeles Times [2013]
Malware burrows deep
into computer BIOS to
escape AV
The Register [September 2011]
Researchers have discovered one of the
first pieces ever used in the wild that
modifies the software on the motherboard
of infected computers to ensure the
infection can’t be easily eradicated…
Cyberspace changes
the fog of war
Universities face a
rising barrage of
cyberattacks
Ars Technica [2013]
Cyberattacks on the rise
against US corporations
Espionage malware
infects rafts of
governments,
industries around
the world
New York Times [2013]
Ars Technica [2013]
Forget carjacking, soon
it will be carhacking
The Sydney Morning Herald [2013]
Rising cyber security risks to drivers as
their cars become increasingly powered
by and connected to computers have
prompted the US auto-safety regulator to
start a new office focusing on the threat…
34. Modern Application Lifecycle Management
Define
Ideation
Implement
Develop
Idea to working
software
Monitor
Operate
Working software
in production
Value realization
44 agile planning
Team Integration | Increased Efficiency | Shorter Cycle Times | Reduced Costs
35. Define
Ideation
Microsoft Office
REQUIREMENTS
PRODUCT
BACKLOG
Visual Studio 11
Application Lifecycle
Management
Expression Blend/
SketchFlow
Develop
Idea to working software
Third Party Tools
Sprint
Visual Studio
Operate
Monitor
TEAM
FOUNDATION
SERVER
Systems Center
OPS
BACKLOG
Project Server
WORKING SOFTWARE
Deployment to feedback
Windows Azure
Windows Server
37. Planning for continuous value delivery
Manage Demand
and Define Requirements
Minimal Planning
Minimal Risk
Most
Value
Continuous cadence of value delivery
47 agile planning
Highest
Value
Features
38. Build, Measure, Learn - Repeat
Traditional Planning
Agile Planning
Increased
value
over time
Value
Value
Time spent on planning
48 agile planning
Time spent on planning
40. Roles
Product Owner
Scrum Master
Development
Team
Events
The Sprint
Sprint Planning
Meeting
Daily Scrum
Sprint Review
Sprint Retrospective
Note: All Events are timeboxed
Artifacts
Product Backlog
Sprint Backlog
The Increment
(of working software)
49. Document requirements
as BRDs and
functional specs
QA
Write code to
implement
requirements
UA
T
Testing post
implementation. Mostly
manual with limited
automation.
Operations
readiness
verification
UAT post
implementation
and systems
testing
Pre-deployment
verification