SlideShare uma empresa Scribd logo
1 de 34
Jeremy Chapman
Office and Office 365 STPM
   Microsoft Office Division
Strengths
  No footprint on device
  Works on most common browsers
  (IE, Safari, Chrome, Firefox)
  Files are rendered remotely in full fidelity*
  Multiple paths in - SharePoint, Office 365 and Windows Live

Weaknesses
  Much less functionality compared to native apps
  Fidelity loss in edit mode
  Requires SharePoint access in managed
  environments.
 *except, OneNote and OWA. They do not use remote rendering
Office Web Apps
Worker Processes

                                                                                                                              Functionality
Word Viewing [or PowerPoint] Service                                                                                               Highly sandboxed
                                                       6                                                    Workers                processes
Application                                                                                                                        Converts document or
                       Functionality                                                                                               presentation to series
                                                                                                                                   of images or XAML
                            Services conversion
                                                                                                                                   Temporarily stores
      Application           requests for
                                                                                                                                   output locally on disk
      Manager               documents
                            Creates and manages                     Web Application
                            workers
                            Stores output to Web
                            Apps Cache                                                           Proxy Group
                                                                                    Home
                                                                Sites                                                       Functionality
                                                                                                       Word Viewing              Provides
                                                                                                       [or PowerPoint]
                                                                                                                G                location of
                                                                                                       Service                   service
                                                                                                       Application               applications in
                    5                                                                                  Proxy                     farm.
                                                   4




                                                                                             3
                    7
                                                                                                                      Functionality - ASPX
                                                                                                                           Provides HTML
                                                                                                 WordViewer.aspx           Checks cache for
                                                                                   Layouts                                 renditions
                                                                                                 (& handlers)
                                                                                                                           Request renditions
                                                                                             2                             from service app.

                    8                                                                                                    Functionality - Cache
                                                           Office Web Apps Cache
                                                                                                                             Stores rendered
                                                                                                                             documents

                                                                                             1
3      Web Application

                                             Functionality
                    Home                         Provides HTML
    Sites                                        Translates .DOCX
            Layouts                              and .ONE files to
                           OneNote.aspx /
                                                 lightweight HTML / JS
                           WordEditor.aspx       Caches updates on
2                                                server
                                                 OneNote only – auto
                                                 saves notebook




                      1
Excel Calculation Service                                                                            Proxy Group

                                Functionality                                                                                      Functionality
                                       Manages editing                                                        Excel                    Provides
          Excel
          Calculation
                                       sessions                                                                         G
                                                                                                              Calculation
                                                                                                                                       location of
                                       Autosaves workbook                                                                              service
          Service                                                                                             Service                  applications in
                                       Responsible for re-
                                       calc
                                                                                                              Proxy                    farm.
                                       Connects to external      Web Application
                                       data sources (if
                                       applicable)
                                                                              Home
                                                              Sites

                                                 3                                                 2

                                   4

6




                                                                                                         Functionality - EWA
                                                                                                             Provides HTML
                                                                            Layouts       Excel Web          Load-balances
                                                                                                             sessions between
                                                                                          Access (EWA)
                                                                                                             Excel Calculation
                                                                                                             Services
                                                                                                             Dispatches requests
                                                                                                             to the ECS



                                                                                      5


                                                                                      1
Strengths
  Offline capability
  Tailored to device UI and usage

Weaknesses
  Self-Provisioning via App Store & Android Market
  May not have access to central and secure storage
  User needs to apply updates
  Files may be cached or saved to the device.
Platform-Specific Apps
Strengths
  No footprint on device
  Manageable configuration
  Citrix ica clients available for most common device types
  Uses remote resources to render and compute
  Enables core platform deficiencies, such as printing

Weaknesses
  User experience
  Hard to get and keep running
  Multiple points of failure.
Remoting Into Windows
Control file traffic to
trusted devices & users
  How to define and enforce what “trusted”
  means?

  Can you enforce enough configuration?

  How good is device crypto?

  How are untrusted devices connecting to
  network resources?
Exchange ActiveSync on the Server
http://www.apple.com/ipad/business/integration
                      /
Limiting Access to Data and Network Resources

              The Traditional Management
              vs. Consumerization Tug of
              War
                 Rights Management
                 Reduce what untrusted devices can see and connect
                 to
                 Limit the amount of data kept on devices
                 (for example, mailbox sizes)
                 Allow doc reading, but not editing or local saving on
                 untrusted devices
                 Keep data central with secure remote access
http://mac2.microsoft.com/help/office/14/en-
                                                us/admin/item/846e1b28-0ae8-40fa-adba-
http://go.microsoft.com/fwlink/?LinkId=201940
                                                1ea5d96fd656
Configuring Remote Office Installs for
RDS/Citrix
Identity-based protection
Controls access to information across the information
lifecycle
Authorized access based on trusted identity
Secures transmission and storage of sensitive information
Embeds digital usage policies (print, view, edit, expiration
etc. ) in to the content to help prevent misuse after delivery
View Protected attachments in OWA
           IRM in Exchange Active Sync
           Enhanced collaboration using Microsoft Federation
           Gateway
           Cross Premises IRM support for Exchange Online
Transport Protection Rule
Outlook Protection Rule
Journal Report Decryption
Transport Pipeline Decryption
IRM in OWA
                                                               Exchange
Protected Voice Message
                                         Exchange
                                                               2010 SP1
                                         2010 RTM
                          Exchange
                          2007
Keep Everything in the Data Center


                     Deliver Cloud Services
                     Remote Desktop Solutions

                     Host data in your private cloud

                     You don’t need to say “no”, but you will need to ask for
                     resources

                     The end user experience may not be ideal, but both
                     parties get what they want
Controlling File Access Based on Device Type
There is no one-size fits all solution here
Security is a sliding scale; lock down as needed
To be “policy-managed” is not a checkbox; it varies
dramatically from vendor to vendor
You can limit access to documents without completely cutting
unmanageable devices off
You can give people access to restricted resources, but it
can be expensive
This is a catalyst to get more resources and cement IT as
thought leaders in your organization!
thank you
Office and Office 365 STPM overview

Mais conteúdo relacionado

Mais procurados

Jfokus 2012 : The Java EE 7 Platform: Developing for the Cloud
Jfokus 2012 : The Java EE 7 Platform: Developing for the CloudJfokus 2012 : The Java EE 7 Platform: Developing for the Cloud
Jfokus 2012 : The Java EE 7 Platform: Developing for the CloudArun Gupta
 
FUJIFILM XMF Remote product brochure
FUJIFILM XMF Remote product brochureFUJIFILM XMF Remote product brochure
FUJIFILM XMF Remote product brochureMichael Mostyn
 
Cognos Technical Super Session 2012
Cognos Technical Super Session 2012Cognos Technical Super Session 2012
Cognos Technical Super Session 2012barnaby1502
 
Topologies share pointserver2010
Topologies share pointserver2010Topologies share pointserver2010
Topologies share pointserver2010Ard van Someren
 
Java EE Technical Keynote at JavaOne Latin America 2011
Java EE Technical Keynote at JavaOne Latin America 2011Java EE Technical Keynote at JavaOne Latin America 2011
Java EE Technical Keynote at JavaOne Latin America 2011Arun Gupta
 
Understanding Oracle ADF and its role in Oracle Fusion Middleware
Understanding Oracle ADF and its role in Oracle Fusion MiddlewareUnderstanding Oracle ADF and its role in Oracle Fusion Middleware
Understanding Oracle ADF and its role in Oracle Fusion MiddlewareRefundation
 
Upgrade services share_pointserver
Upgrade services share_pointserverUpgrade services share_pointserver
Upgrade services share_pointserverArd van Someren
 
Advanced mysql replication techniques
Advanced mysql replication techniquesAdvanced mysql replication techniques
Advanced mysql replication techniquesGiuseppe Maxia
 
Deploying the share point user profile service
Deploying the share point user profile serviceDeploying the share point user profile service
Deploying the share point user profile serviceAndries den Haan
 
01.egovFrame Training Book II
01.egovFrame Training Book II01.egovFrame Training Book II
01.egovFrame Training Book IIChuong Nguyen
 
Jfokus 2012: PaaSing a Java EE Application
Jfokus 2012: PaaSing a Java EE ApplicationJfokus 2012: PaaSing a Java EE Application
Jfokus 2012: PaaSing a Java EE ApplicationArun Gupta
 
TDC 2011: OSGi-enabled Java EE Application
TDC 2011: OSGi-enabled Java EE ApplicationTDC 2011: OSGi-enabled Java EE Application
TDC 2011: OSGi-enabled Java EE ApplicationArun Gupta
 
Java Summit Chennai: Java EE 7
Java Summit Chennai: Java EE 7Java Summit Chennai: Java EE 7
Java Summit Chennai: Java EE 7Arun Gupta
 
Anish Karmakar S C A
Anish  Karmakar    S C AAnish  Karmakar    S C A
Anish Karmakar S C ASOA Symposium
 
1006 Z2 Intro Complete
1006 Z2 Intro Complete1006 Z2 Intro Complete
1006 Z2 Intro CompleteHenning Blohm
 
Sp2010 high availlability_sql
Sp2010 high availlability_sqlSp2010 high availlability_sql
Sp2010 high availlability_sqlSamuel Zürcher
 
Viestinnän seminaari 8.11.2012 / SharePoint
Viestinnän seminaari 8.11.2012 / SharePointViestinnän seminaari 8.11.2012 / SharePoint
Viestinnän seminaari 8.11.2012 / SharePointSalcom Group
 

Mais procurados (20)

Jfokus 2012 : The Java EE 7 Platform: Developing for the Cloud
Jfokus 2012 : The Java EE 7 Platform: Developing for the CloudJfokus 2012 : The Java EE 7 Platform: Developing for the Cloud
Jfokus 2012 : The Java EE 7 Platform: Developing for the Cloud
 
FUJIFILM XMF Remote product brochure
FUJIFILM XMF Remote product brochureFUJIFILM XMF Remote product brochure
FUJIFILM XMF Remote product brochure
 
Cognos Technical Super Session 2012
Cognos Technical Super Session 2012Cognos Technical Super Session 2012
Cognos Technical Super Session 2012
 
Topologies share pointserver2010
Topologies share pointserver2010Topologies share pointserver2010
Topologies share pointserver2010
 
Java EE Technical Keynote at JavaOne Latin America 2011
Java EE Technical Keynote at JavaOne Latin America 2011Java EE Technical Keynote at JavaOne Latin America 2011
Java EE Technical Keynote at JavaOne Latin America 2011
 
Understanding Oracle ADF and its role in Oracle Fusion Middleware
Understanding Oracle ADF and its role in Oracle Fusion MiddlewareUnderstanding Oracle ADF and its role in Oracle Fusion Middleware
Understanding Oracle ADF and its role in Oracle Fusion Middleware
 
Upgrade services share_pointserver
Upgrade services share_pointserverUpgrade services share_pointserver
Upgrade services share_pointserver
 
Advanced mysql replication techniques
Advanced mysql replication techniquesAdvanced mysql replication techniques
Advanced mysql replication techniques
 
Deploying the share point user profile service
Deploying the share point user profile serviceDeploying the share point user profile service
Deploying the share point user profile service
 
01.egovFrame Training Book II
01.egovFrame Training Book II01.egovFrame Training Book II
01.egovFrame Training Book II
 
Jfokus 2012: PaaSing a Java EE Application
Jfokus 2012: PaaSing a Java EE ApplicationJfokus 2012: PaaSing a Java EE Application
Jfokus 2012: PaaSing a Java EE Application
 
TDC 2011: OSGi-enabled Java EE Application
TDC 2011: OSGi-enabled Java EE ApplicationTDC 2011: OSGi-enabled Java EE Application
TDC 2011: OSGi-enabled Java EE Application
 
Java Summit Chennai: Java EE 7
Java Summit Chennai: Java EE 7Java Summit Chennai: Java EE 7
Java Summit Chennai: Java EE 7
 
Anish Karmakar S C A
Anish  Karmakar    S C AAnish  Karmakar    S C A
Anish Karmakar S C A
 
1006 Z2 Intro Complete
1006 Z2 Intro Complete1006 Z2 Intro Complete
1006 Z2 Intro Complete
 
Ldap sync with sap(rfc)
Ldap sync with sap(rfc)Ldap sync with sap(rfc)
Ldap sync with sap(rfc)
 
SQL Server User Group 02/2009
SQL Server User Group 02/2009SQL Server User Group 02/2009
SQL Server User Group 02/2009
 
Sp2010 high availlability_sql
Sp2010 high availlability_sqlSp2010 high availlability_sql
Sp2010 high availlability_sql
 
Viestinnän seminaari 8.11.2012 / SharePoint
Viestinnän seminaari 8.11.2012 / SharePointViestinnän seminaari 8.11.2012 / SharePoint
Viestinnän seminaari 8.11.2012 / SharePoint
 
Asap session 1
Asap session 1Asap session 1
Asap session 1
 

Destaque

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Shakas Technologies
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseEMC
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתShirley Kantor
 
Pharm mon to perfect
Pharm mon to perfectPharm mon to perfect
Pharm mon to perfectTravis Klein
 
Different games in the phillippines
Different  games in the phillippinesDifferent  games in the phillippines
Different games in the phillippinesjanerosco
 
D penilaian-assesment-materi-6xxx
D penilaian-assesment-materi-6xxxD penilaian-assesment-materi-6xxx
D penilaian-assesment-materi-6xxxEko Bozz
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democraciaLauma1416
 

Destaque (15)

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתית
 
01 3 reform
01 3  reform01 3  reform
01 3 reform
 
Pharm mon to perfect
Pharm mon to perfectPharm mon to perfect
Pharm mon to perfect
 
Different games in the phillippines
Different  games in the phillippinesDifferent  games in the phillippines
Different games in the phillippines
 
Wed thurs reform
Wed thurs reformWed thurs reform
Wed thurs reform
 
Mon eq p
Mon eq pMon eq p
Mon eq p
 
Flip book
Flip bookFlip book
Flip book
 
Doc2
Doc2Doc2
Doc2
 
D penilaian-assesment-materi-6xxx
D penilaian-assesment-materi-6xxxD penilaian-assesment-materi-6xxx
D penilaian-assesment-materi-6xxx
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democracia
 

Semelhante a Office and Office 365 STPM overview

Soa Based Integration
Soa Based IntegrationSoa Based Integration
Soa Based Integrationbslook
 
Fusion app customization_con8719_pdf_8719_0001
Fusion app customization_con8719_pdf_8719_0001Fusion app customization_con8719_pdf_8719_0001
Fusion app customization_con8719_pdf_8719_0001jucaab
 
SharePoint Careers and Introduction to SharePoint 2013 Services and Topology
SharePoint Careers and Introduction to SharePoint 2013 Services and TopologySharePoint Careers and Introduction to SharePoint 2013 Services and Topology
SharePoint Careers and Introduction to SharePoint 2013 Services and TopologyEli Robillard
 
Scalable Services For Digital Preservation Ross King
Scalable Services For Digital Preservation Ross KingScalable Services For Digital Preservation Ross King
Scalable Services For Digital Preservation Ross KingDigitalPreservationEurope
 
Google App Engine At A Glance
Google App Engine At A GlanceGoogle App Engine At A Glance
Google App Engine At A GlanceStefan Christoph
 
Resource Oriented Architecture in Wireless Sensor Network
Resource Oriented Architecture in Wireless Sensor NetworkResource Oriented Architecture in Wireless Sensor Network
Resource Oriented Architecture in Wireless Sensor NetworkThomas Pham
 
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-22012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2tcloudcomputing-tw
 
04.egovFrame Runtime Environment Workshop
04.egovFrame Runtime Environment Workshop04.egovFrame Runtime Environment Workshop
04.egovFrame Runtime Environment WorkshopChuong Nguyen
 
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your applicationjavablend
 
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3SAP Portal
 
Oracle DBA Competency Roadmap
Oracle DBA Competency RoadmapOracle DBA Competency Roadmap
Oracle DBA Competency RoadmapMahesh Vallampati
 
IBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsIBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsSanjeev Sharma
 
SharePoint Server 2013 Workflows
SharePoint Server 2013 WorkflowsSharePoint Server 2013 Workflows
SharePoint Server 2013 WorkflowsSPC Adriatics
 
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3SAP Portal
 
Build Your Business Process On A Solid Foundation–Web Sphere Application Server
Build Your Business Process On A Solid Foundation–Web Sphere Application ServerBuild Your Business Process On A Solid Foundation–Web Sphere Application Server
Build Your Business Process On A Solid Foundation–Web Sphere Application ServerCarly Snodgrass
 

Semelhante a Office and Office 365 STPM overview (20)

Soa Based Integration
Soa Based IntegrationSoa Based Integration
Soa Based Integration
 
Fusion app customization_con8719_pdf_8719_0001
Fusion app customization_con8719_pdf_8719_0001Fusion app customization_con8719_pdf_8719_0001
Fusion app customization_con8719_pdf_8719_0001
 
SharePoint Careers and Introduction to SharePoint 2013 Services and Topology
SharePoint Careers and Introduction to SharePoint 2013 Services and TopologySharePoint Careers and Introduction to SharePoint 2013 Services and Topology
SharePoint Careers and Introduction to SharePoint 2013 Services and Topology
 
Grottarossa:Why?
Grottarossa:Why?Grottarossa:Why?
Grottarossa:Why?
 
Scalable Services For Digital Preservation Ross King
Scalable Services For Digital Preservation Ross KingScalable Services For Digital Preservation Ross King
Scalable Services For Digital Preservation Ross King
 
Google App Engine At A Glance
Google App Engine At A GlanceGoogle App Engine At A Glance
Google App Engine At A Glance
 
Resource Oriented Architecture in Wireless Sensor Network
Resource Oriented Architecture in Wireless Sensor NetworkResource Oriented Architecture in Wireless Sensor Network
Resource Oriented Architecture in Wireless Sensor Network
 
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-22012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-2
 
04.egovFrame Runtime Environment Workshop
04.egovFrame Runtime Environment Workshop04.egovFrame Runtime Environment Workshop
04.egovFrame Runtime Environment Workshop
 
Hadoop + Forcedotcom = Like
Hadoop + Forcedotcom = LikeHadoop + Forcedotcom = Like
Hadoop + Forcedotcom = Like
 
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application
[Pilarczyk] Adrenaline programing implementing - SOA and BPM in your application
 
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3
Best Practices for Upgrading Your Portal to SAP NetWeaver 7.3
 
Compiere ERP
Compiere ERPCompiere ERP
Compiere ERP
 
Oracle DBA Competency Roadmap
Oracle DBA Competency RoadmapOracle DBA Competency Roadmap
Oracle DBA Competency Roadmap
 
Orange is v cloud 3
Orange is v cloud 3Orange is v cloud 3
Orange is v cloud 3
 
IBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsIBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile Apps
 
SharePoint Server 2013 Workflows
SharePoint Server 2013 WorkflowsSharePoint Server 2013 Workflows
SharePoint Server 2013 Workflows
 
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3
Top Five Reasons to Upgrade to SAP NetWeaver Portal 7.3
 
Build Your Business Process On A Solid Foundation–Web Sphere Application Server
Build Your Business Process On A Solid Foundation–Web Sphere Application ServerBuild Your Business Process On A Solid Foundation–Web Sphere Application Server
Build Your Business Process On A Solid Foundation–Web Sphere Application Server
 
Orange is v cloud 3
Orange is v cloud 3Orange is v cloud 3
Orange is v cloud 3
 

Mais de Microsoft TechNet - Belgium and Luxembourg

Mais de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Office and Office 365 STPM overview

  • 1. Jeremy Chapman Office and Office 365 STPM Microsoft Office Division
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Strengths No footprint on device Works on most common browsers (IE, Safari, Chrome, Firefox) Files are rendered remotely in full fidelity* Multiple paths in - SharePoint, Office 365 and Windows Live Weaknesses Much less functionality compared to native apps Fidelity loss in edit mode Requires SharePoint access in managed environments. *except, OneNote and OWA. They do not use remote rendering
  • 10. Worker Processes Functionality Word Viewing [or PowerPoint] Service Highly sandboxed 6 Workers processes Application Converts document or Functionality presentation to series of images or XAML Services conversion Temporarily stores Application requests for output locally on disk Manager documents Creates and manages Web Application workers Stores output to Web Apps Cache Proxy Group Home Sites Functionality Word Viewing Provides [or PowerPoint] G location of Service service Application applications in 5 Proxy farm. 4 3 7 Functionality - ASPX Provides HTML WordViewer.aspx Checks cache for Layouts renditions (& handlers) Request renditions 2 from service app. 8 Functionality - Cache Office Web Apps Cache Stores rendered documents 1
  • 11. 3 Web Application Functionality Home Provides HTML Sites Translates .DOCX Layouts and .ONE files to OneNote.aspx / lightweight HTML / JS WordEditor.aspx Caches updates on 2 server OneNote only – auto saves notebook 1
  • 12. Excel Calculation Service Proxy Group Functionality Functionality Manages editing Excel Provides Excel Calculation sessions G Calculation location of Autosaves workbook service Service Service applications in Responsible for re- calc Proxy farm. Connects to external Web Application data sources (if applicable) Home Sites 3 2 4 6 Functionality - EWA Provides HTML Layouts Excel Web Load-balances sessions between Access (EWA) Excel Calculation Services Dispatches requests to the ECS 5 1
  • 13. Strengths Offline capability Tailored to device UI and usage Weaknesses Self-Provisioning via App Store & Android Market May not have access to central and secure storage User needs to apply updates Files may be cached or saved to the device.
  • 15. Strengths No footprint on device Manageable configuration Citrix ica clients available for most common device types Uses remote resources to render and compute Enables core platform deficiencies, such as printing Weaknesses User experience Hard to get and keep running Multiple points of failure.
  • 17.
  • 18.
  • 19.
  • 20. Control file traffic to trusted devices & users How to define and enforce what “trusted” means? Can you enforce enough configuration? How good is device crypto? How are untrusted devices connecting to network resources?
  • 22.
  • 24. Limiting Access to Data and Network Resources The Traditional Management vs. Consumerization Tug of War Rights Management Reduce what untrusted devices can see and connect to Limit the amount of data kept on devices (for example, mailbox sizes) Allow doc reading, but not editing or local saving on untrusted devices Keep data central with secure remote access
  • 25. http://mac2.microsoft.com/help/office/14/en- us/admin/item/846e1b28-0ae8-40fa-adba- http://go.microsoft.com/fwlink/?LinkId=201940 1ea5d96fd656
  • 26. Configuring Remote Office Installs for RDS/Citrix
  • 27. Identity-based protection Controls access to information across the information lifecycle Authorized access based on trusted identity Secures transmission and storage of sensitive information Embeds digital usage policies (print, view, edit, expiration etc. ) in to the content to help prevent misuse after delivery
  • 28. View Protected attachments in OWA IRM in Exchange Active Sync Enhanced collaboration using Microsoft Federation Gateway Cross Premises IRM support for Exchange Online Transport Protection Rule Outlook Protection Rule Journal Report Decryption Transport Pipeline Decryption IRM in OWA Exchange Protected Voice Message Exchange 2010 SP1 2010 RTM Exchange 2007
  • 29. Keep Everything in the Data Center Deliver Cloud Services Remote Desktop Solutions Host data in your private cloud You don’t need to say “no”, but you will need to ask for resources The end user experience may not be ideal, but both parties get what they want
  • 30. Controlling File Access Based on Device Type
  • 31.
  • 32. There is no one-size fits all solution here Security is a sliding scale; lock down as needed To be “policy-managed” is not a checkbox; it varies dramatically from vendor to vendor You can limit access to documents without completely cutting unmanageable devices off You can give people access to restricted resources, but it can be expensive This is a catalyst to get more resources and cement IT as thought leaders in your organization!